Sciweavers

585 search results - page 87 / 117
» Blind Electronic Commerce
Sort
View
SAC
2004
ACM
14 years 1 months ago
Trust enhanced ubiquitous payment without too much privacy loss
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
Jean-Marc Seigneur, Christian Damsgaard Jensen
WPES
2004
ACM
14 years 1 months ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
AMEC
2004
Springer
14 years 29 days ago
Multi-attribute Bilateral Bargaining in a One-to-Many Setting
Negotiations are an important way of reaching agreements between selfish autonomous agents. In this paper we focus on one-to-many bargaining within the context of agent-mediated e...
Enrico H. Gerding, D. J. A. Somefun, Han La Poutr&...
AMEC
2004
Springer
14 years 29 days ago
Bidding for Customer Orders in TAC SCM
Abstract. Supply chains are a current, challenging problem for agentbased electronic commerce. Motivated by the Trading Agent Competition Supply Chain Management (TAC SCM) scenario...
David Pardoe, Peter Stone
FC
2004
Springer
88views Cryptology» more  FC 2004»
14 years 29 days ago
Mental Models of Computer Security
Improved computer security requires improvements in risk communication to naive end users. Efficacy of risk communication depends not only on the nature of the risk, but also on t...
L. Jean Camp