Sciweavers

178 search results - page 7 / 36
» Dependability Arguments with Trusted Bases
Sort
View
JSAC
2006
181views more  JSAC 2006»
13 years 7 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu
AAAI
2007
13 years 9 months ago
Action-Based Alternating Transition Systems for Arguments about Action
This paper presents a formalism to describe practical reasoning in terms of an Action-based Alternating Transition System (AATS). The starting point is a previously specified acc...
Katie Atkinson, Trevor J. M. Bench-Capon
ESWS
2006
Springer
13 years 11 months ago
WSTO: A Classification-Based Ontology for Managing Trust in Semantic Web Services
The aim of this paper is to provide a general ontology that allows the specification of trust requirements in the Semantic Web Services environment. Both client and Web Service can...
Stefania Galizia
IDC
2009
Springer
14 years 1 months ago
A Trusted Defeasible Reasoning Service for Brokering Agents in the Semantic Web
Abstract. Based on the plethora of proposals and standards for logic- and rulebased reasoning for the Semantic Web (SW), a key factor for the success of SW agents is interoperabili...
Kalliopi Kravari, Efstratios Kontopoulos, Nick Bas...
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
13 years 11 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten