Sciweavers

220 search results - page 12 / 44
» Trusted business system model using context sensitiveness
Sort
View
SPW
2000
Springer
14 years 10 days ago
Users and Trust in Cyberspace
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Pekka Nikander, Kristiina Karvonen
CLIMA
2007
13 years 10 months ago
Fuzzy Argumentation for Trust
In an open Multi-Agent System, the goals of agents acting on behalf of their owners often conflict with each other. Therefore, a personal agent protecting the interest of a single...
Ruben Stranders, Mathijs de Weerdt, Cees Witteveen
MR
2007
173views Robotics» more  MR 2007»
13 years 8 months ago
A maintenance planning and business case development model for the application of prognostics and health management (PHM) to ele
- This paper presents a model that enables the optimal interpretation of Prognostics and Health Management (PHM) results for electronic systems. In this context, optimal interpreta...
Peter A. Sandborn, Chris Wilkinson
RAID
2005
Springer
14 years 2 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
AIEDAM
2004
77views more  AIEDAM 2004»
13 years 8 months ago
The role of trust in distributed design
Automated support of design teams, consisting of both human and automated systems, requires an understanding of the role of trust in distributed design processes. By explicitating ...
Niek J. E. Wijngaards, Hidde M. Boonstra, Frances ...