Sciweavers

1022 search results - page 23 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
IDC
2009
Springer
14 years 2 months ago
A Trusted Defeasible Reasoning Service for Brokering Agents in the Semantic Web
Abstract. Based on the plethora of proposals and standards for logic- and rulebased reasoning for the Semantic Web (SW), a key factor for the success of SW agents is interoperabili...
Kalliopi Kravari, Efstratios Kontopoulos, Nick Bas...
ICDCS
2007
IEEE
14 years 2 months ago
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations
Trust negotiation supports authentication and access control across multiple security domains by allowing parties to use non-forgeable digital credentials to establish trust. By t...
Anna Cinzia Squicciarini, Alberto Trombetta, Elisa...
MBEES
2007
13 years 9 months ago
Towards Tool Support for Service-Oriented Development of Embedded Automotive Systems
: The development of embedded systems is a challenging task because of the distributed, reactive and real-time nature of such systems. Distribution of embedded components across bu...
Vina Ermagan, To-ju Huang, Ingolf H. Krüger, ...
FAC
2006
122views more  FAC 2006»
13 years 7 months ago
The verified software repository: a step towards the verifying compiler
The Verified Software Repository is dedicated to a long-term vision of a future in which all computer systems justify the trust that Society increasingly places in them. This will ...
Juan Bicarregui, C. A. R. Hoare, J. C. P. Woodcock
SAC
2010
ACM
14 years 2 months ago
Ontology-based generation of IT-security metrics
Legal regulations and industry standards require organizations to measure and maintain a specified IT-security level. Although several IT-security metrics approaches have been de...
Stefan Fenz