Sciweavers

JCS
2010
104views more  JCS 2010»
13 years 10 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith
AAI
2004
112views more  AAI 2004»
13 years 11 months ago
Devising A Trust Model For Multi-Agent Interactions Using Confidence And Reputation
In open environments in which autonomous agents can break contracts, computational models of trust have an important role to play in determining who to interact with and how inter...
Sarvapali D. Ramchurn, Nicholas R. Jennings, Carle...
WECWIS
2009
IEEE
198views ECommerce» more  WECWIS 2009»
14 years 6 months ago
Bridging the Gap between User Attributes and Service Policies with Attribute Mapping
—People, companies, and public authorities can now have a strong on-line presence and a huge amount of interactions on the Internet, made possible by the impressive growth of the...
Davide Cerri, Francesco Corcoglioniti