Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
Interacting with intelligent systems in general and ambient intelligent systems in particular, requires that these systems have the ability to build a trust relationship with the u...
The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes. The security itself ...
Carol J. Fung, Olga Baysal, Jie Zhang, Issam Aib, ...
This paper contributes to the analysis of the question how altruistic behaviour can be in an agent’s own interest. The question is addressed by involving a temporal dimension in ...
Tibor Bosse, Martijn C. Schut, Jan Treur, David We...
In the literature, the validity of theories or models for trust is usually based on intuition and common sense. Theories and models are not often verified experimentally. The rese...
Catholijn M. Jonker, Joost J. P. Schalken, Jan The...