Sciweavers

581 search results - page 93 / 117
» Managing Trust in Distributed Agent Systems
Sort
View
SAC
2004
ACM
14 years 2 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
POLICY
2009
Springer
14 years 3 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
WOA
2001
13 years 10 months ago
A Contract Decommitment Protocol for Automated Negotiation in Time Variant Environments
Negotiation is a fundamental mechanism in distributed multi-agent systems. Since negotiation is a time-spending process, in many scenarios agents have to take into account the pas...
Federico Bergenti, Agostino Poggi, Matteo Somacher
ATAL
2003
Springer
14 years 1 months ago
Providing Effective Access to Shared Resources: A COIN Approach
Managers of systems of shared resources typically have many separate goals. Examples are efficient utilization of the resources among its users and ensuring no user’s satisfacti...
Stéphane Airiau, Sandip Sen, David Wolpert,...
SAC
2004
ACM
14 years 2 months ago
A mobile agent approach for global database constraint checking
Integrity constraints are valuable tools for enforcing consistency of data in a database. Global integrity constraints ensure integrity and consistency of data spanning multiple d...
Praveen Madiraju, Rajshekhar Sunderraman