Sciweavers

132 search results - page 22 / 27
» Privacy-Preserving Trust Negotiations
Sort
View
CSREASAM
2006
13 years 8 months ago
A Framework for the User-Oriented Personal Information Protection
- Thanks to the spread of mobile technologies, we can access to the network anytime and from anywhere. In the near future, we will enable to realize the ubiquitous computing enviro...
Kenichi Takahashi, Kouichi Sakurai
ATAL
2010
Springer
13 years 8 months ago
DipGame: a testbed for multiagent systems
There is a chronic lack of shared application domains to test the research models and agent architectures on areas like negotiation, argumentation, trust and reputation. In this d...
Angela Fabregues, David Navarro, Alejandro Serrano...
CCS
2004
ACM
14 years 24 days ago
Concealing complex policies with hidden credentials
Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing ...
Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons
WPES
2003
ACM
14 years 20 days ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
DEXAW
2000
IEEE
134views Database» more  DEXAW 2000»
13 years 11 months ago
Agent-Oriented Concepts to Foster the Automation of E-Business
Improving the efficiency of e-Business usage requires the further development of automation techniques for interorganizational business processes as a major driver. Automation ca...
Andreas Bartelt, Winfried Lamersdorf