Sciweavers

282 search results - page 16 / 57
» Private Policy Negotiation
Sort
View
CRYPTO
2005
Springer
96views Cryptology» more  CRYPTO 2005»
14 years 28 days ago
Privacy-Preserving Set Operations
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private i...
Lea Kissner, Dawn Xiaodong Song
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
14 years 1 months ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright
CCS
2005
ACM
14 years 28 days ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
ARGMAS
2005
Springer
14 years 28 days ago
Practical Strategic Reasoning and Adaptation in Rational Argument-Based Negotiation
Recent years have seen an increasing interest of multiagent system research in employing the theory of argumentation for the development of communication protocols. While signific...
Michael Rovatsos, Iyad Rahwan, Felix A. Fischer, G...
AI
2004
Springer
13 years 7 months ago
An agenda-based framework for multi-issue negotiation
This paper presents a new model for multi-issue negotiation under time constraints in an incomplete information setting. The issues to be bargained over can be associated with a s...
S. Shaheen Fatima, Michael Wooldridge, Nicholas R....