Sciweavers

4897 search results - page 40 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
14 years 3 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
ISEM
2008
88views more  ISEM 2008»
13 years 9 months ago
Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments
As it lacks central management in Peer-to-Peer (P2P) e-commerce environments, prior to new transactions with an unknown peer, the trust evaluation is critical, which relies on the ...
Yan Wang 0002, Duncan S. Wong, Kwei-Jay Lin, Vijay...
AAI
2004
112views more  AAI 2004»
13 years 9 months ago
Devising A Trust Model For Multi-Agent Interactions Using Confidence And Reputation
In open environments in which autonomous agents can break contracts, computational models of trust have an important role to play in determining who to interact with and how inter...
Sarvapali D. Ramchurn, Nicholas R. Jennings, Carle...
ICPP
2002
IEEE
14 years 2 months ago
Integrating Trust into Grid Resource Management Systems
Grid computing systems that have been the focus of much research activities in recent years provide a virtual framework for controlled sharing of resources across institutional bo...
Farag Azzedin, Muthucumaru Maheswaran
AINA
2007
IEEE
14 years 3 months ago
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Abstract— Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user ...
Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Pa...