Sciweavers

2022 search results - page 246 / 405
» Trust in Multi-Agent Systems
Sort
View
INFOCOM
2012
IEEE
12 years 3 days ago
SybilDefender: Defend against sybil attacks in large social networks
—Distributed systems without trusted identities are particularly vulnerable to sybil attacks, where an adversary creates multiple bogus identities to compromise the running of th...
Wei Wei, Fengyuan Xu, Chiu Chiang Tan, Qun Li
IFIP
2005
Springer
14 years 3 months ago
A Logic for Analysing Subterfuge in Delegation Chains
Abstract. Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic cre...
Hongbin Zhou, Simon N. Foley
IQ
2007
13 years 11 months ago
When Interactive TV Meets Online Auction: A Study On Factors Affecting User Adoption
: This research has attempted to find the impact of information quality (IQ) and system quality (SQ) on users’ attitude to adopt the interactive TV based auction service. The pri...
Jaeheung Yoo, Imsook Ha, Junkyun Choi
SIGECOM
2000
ACM
117views ECommerce» more  SIGECOM 2000»
14 years 2 months ago
An exception-handling architecture for open electronic marketplaces of contract net software agents
Software agent marketplaces require the development of new architectures, which are capable of coping with unreliable computational and network infrastructures, limited trust amon...
Chrysanthos Dellarocas, Mark Klein, Juan A. Rodr&i...
SIGOPSE
2004
ACM
14 years 3 months ago
Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors
Secure systems are best built on top of a small trusted operating system: The smaller the operating system, the easier it can be assured or verified for correctness. In this pape...
Michael Hohmuth, Michael Peter, Hermann Härti...