Sciweavers

671 search results - page 119 / 135
» Trust evaluation in ad-hoc networks
Sort
View
ICAI
2004
14 years 9 days ago
Evaluation of an Agent-Mediated Social Network
The goal of this work is to design and implement an agent-based system that facilitates interaction among a group of individuals who are part of an organization, observe types and...
Taneem Ibrahim, Aaron Arthurs, Henry Hexmoor
EDBTW
2004
Springer
14 years 4 months ago
SPROUT: P2P Routing with Social Networks
In this paper, we investigate how existing social networks can benefit P2P data networks by leveraging the inherent trust associated with social links. We present a trust model t...
Sergio Marti, Prasanna Ganesan, Hector Garcia-Moli...
COMSNETS
2012
222views more  COMSNETS 2012»
12 years 6 months ago
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan, X...
SRDS
2007
IEEE
14 years 5 months ago
Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage
We are witnessing a revival of Storage Service Providers in the form of new vendors as well as traditional players. While storage outsourcing is cost-effective, many companies are...
Vishal Kher, Yongdae Kim
CCS
2004
ACM
14 years 4 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii