Sciweavers

1139 search results - page 183 / 228
» Trust Management Survey
Sort
View
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 2 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
HICSS
2007
IEEE
123views Biometrics» more  HICSS 2007»
14 years 2 months ago
The Case of Honda: A Dialectical yet Coherent Firm
—This conceptual paper proposes that Honda’s innovative prowess of producing both radical and disruptive innovations within their aerospace and automotive/pick-up truck develop...
W. David Holford, Mehran Ebrahimi
ATAL
2007
Springer
14 years 2 months ago
An agent-based approach for privacy-preserving recommender systems
Recommender Systems are used in various domains to generate personalized information based on personal user data. The ability to preserve the privacy of all participants is an ess...
Richard Cissée, Sahin Albayrak
ATAL
2007
Springer
14 years 2 months ago
An equal excess negotiation algorithm for coalition formation
Coalition formation is an important form of interaction in multiagent systems. It enables the agents to satisfy tasks that they would otherwise be unable to perform, or would perf...
Hrishikesh J. Goradia, José M. Vidal
ECUMN
2007
Springer
14 years 2 months ago
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Maryline Laurent-Maknavicius