Sciweavers

27 search results - page 5 / 6
» Trusted Autonomy
Sort
View
COMSWARE
2008
IEEE
13 years 9 months ago
Collaborative group membership and access control for JXTA
Abstract-- This paper presents a proposal for group membership and access control services for JXTA, both based on the principle of self-organization and collaboration of peer grou...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
CCS
2005
ACM
14 years 1 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
HOLOMAS
2007
Springer
14 years 1 months ago
Agent Methods for Network Intrusion Detection and Response
While the need to build the Intrusion Detection Systems (IDS) based on on a distributed and cooperative (P2P) paradigm is being generally acknowledged, the field has been disconne...
Martin Rehák, Michal Pechoucek, David Medvi...
RAS
1998
81views more  RAS 1998»
13 years 7 months ago
Towards a theory of delegation for agent-based systems
In this paper a theory of delegation is presented. There are at least three reasons for developing such a theory. First, one of the most relevant notions of "agent" is b...
Cristiano Castelfranchi, Rino Falcone
POLICY
2004
Springer
14 years 1 months ago
Policy Based Management for Internet Communities
Policy Based Management (PBM) is a research topic that has been driven by the tremendous complexity inherent in the administration and management of present-day networking and tel...
Kevin Chekov Feeney, David Lewis, Vincent P. Wade