Sciweavers

150 search results - page 5 / 30
» StereoTrust: a group based personalized trust model
Sort
View
SPC
2005
Springer
14 years 29 days ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
JTAER
2010
100views more  JTAER 2010»
13 years 5 months ago
Determinants of Consumers' Perceived Trust in IT-Ecosystems
Digital ecosystems, or IT-ecosystems (ITEs), are composed of multiple and independent entities such as individuals, organizations, services, software, and applications. Together, ...
Klaus-Peter Wiedmann, Nadine Hennigs, Dieter Varel...
ATAL
2008
Springer
13 years 9 months ago
Multi-agent approach to network intrusion detection
Our demo presents an agent-based intrusion detection system designed for deployment on high-speed backbone networks. The major contribution of the system is the integration of sev...
Martin Rehák, Michal Pechoucek, Pavel Celed...
DSOM
2008
Springer
13 years 9 months ago
Trust Management for Host-Based Collaborative Intrusion Detection
The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes. The security itself ...
Carol J. Fung, Olga Baysal, Jie Zhang, Issam Aib, ...
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 7 months ago
Personality Trait Based Simulation Model of the E-mail System
Within the area of criminal and terrorist social network analysis, there is little research being done on analysing the communication behavior of criminal and terrorist groups. In...
Mark Jyn-Huey Lim, Michael Negnevitsky, Jacky Hart...