Results 1 - 10
of
930
Protecting Mobile Agents Against Malicious Hosts
, 1997
"... A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under execution and (b) the mobile code against tampering attempts by the executing host. Many techniques for the first ..."
Abstract
-
Cited by 325 (1 self)
- Add to MetaCart
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under execution and (b) the mobile code against tampering attempts by the executing host. Many techniques for the first
Reputation-based framework for high integrity sensor networks
- In SASN ’04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
, 2004
"... The traditional approach of providing network security has been to borrow tools from cryptography and authentication. However, we argue that the conventional view of security based on cryptography alone is not sufficient for the unique characteristics and novel misbehaviors encountered in sensor net ..."
Abstract
-
Cited by 257 (7 self)
- Add to MetaCart
with cryptography for the development of trustworthy sensor networks. Following this approach, we propose a reputation-based framework for sensor networks where nodes maintain reputation for other nodes and use it to evaluate their trustworthiness. We will show that this framework provides a scalable, diverse and a
Developing an Integrated Trust and Reputation Model for Open Multi-Agent Systems
, 2004
"... Trust and reputation are central to effective interactions in open multi-agent systems in which agents, that are owned by a variety of stakeholders, can enter and leave the system at any time. This openness means existing trust and reputation models cannot readily be used. To this end, we present FI ..."
Abstract
-
Cited by 210 (12 self)
- Add to MetaCart
FIRE, a trust and reputation model that integrates a number of information sources to produce a comprehensive assessment of an agent's likely performance. Specifically, FIRE incorporates interaction trust, role-based trust, witness reputation, and certified reputation to provide a trust metric
Learning from imbalanced data
- IEEE Trans. on Knowledge and Data Engineering
, 2009
"... Abstract—With the continuous expansion of data availability in many large-scale, complex, and networked systems, such as surveillance, security, Internet, and finance, it becomes critical to advance the fundamental understanding of knowledge discovery and analysis from raw data to support decision-m ..."
Abstract
-
Cited by 260 (6 self)
- Add to MetaCart
, principles, algorithms, and tools to transform vast amounts of raw data efficiently into information and knowledge representation. In this paper, we provide a comprehensive review of the development of research in learning from imbalanced data. Our focus is to provide a critical review of the nature
An incentive compatible reputation mechanism
- In Proceedings of the IEEE Conference on E-Commerce
, 2003
"... Traditional centralised approaches to security are difficult to apply to large, distributed marketplaces in which software agents operate. Developing a notion of trust that is based on the reputation of agents can provide a softer notion of security that is sufficient for many multi-agent applicatio ..."
Abstract
-
Cited by 72 (1 self)
- Add to MetaCart
Traditional centralised approaches to security are difficult to apply to large, distributed marketplaces in which software agents operate. Developing a notion of trust that is based on the reputation of agents can provide a softer notion of security that is sufficient for many multi
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools
- In Proc. Network and Distributed Systems Security Symposium
, 2003
"... System call interposition is a powerful method for regulating and monitoring application behavior. In recent years, a wide variety of security tools have been developed that use this technique. This approach brings with it a host of pitfalls for the unwary implementer that if overlooked can allow hi ..."
Abstract
-
Cited by 137 (1 self)
- Add to MetaCart
System call interposition is a powerful method for regulating and monitoring application behavior. In recent years, a wide variety of security tools have been developed that use this technique. This approach brings with it a host of pitfalls for the unwary implementer that if overlooked can allow
Robust statistical methods for securing wireless localization in sensor networks
- In Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN
, 2005
"... Abstract — Many sensor applications are being developed that require the location of wireless devices, and localization schemes have been developed to meet this need. However, as location-based services become more prevalent, the localization infrastructure will become the target of malicious attack ..."
Abstract
-
Cited by 132 (4 self)
- Add to MetaCart
attacks. These attacks will not be conventional security threats, but rather threats that adversely affect the ability of localization schemes to provide trustworthy location information. This paper identifies a list of attacks that are unique to localization algorithms. Since these attacks are diverse
A Socially Inspired Reputation Model
- Proceedings of 1st European PKI Workshop. Volume 3093 of Lecture Notes in Computer Science., Springer-Verlag (2004) 191–204
, 2004
"... Abstract. In recent years we have observed a huge evolution of services deployed over the Internet, in particular by the World Wide Web; the development of Web Services has enabled Business-to-Business (B2B) relationships, i.e., the exchange of services over the Internet between different, possibly ..."
Abstract
-
Cited by 10 (1 self)
- Add to MetaCart
mutually distrustful, organisations. Unfortunately, Web Services themselves do not provide all the features that are needed to implement and enforce B2B relationships; organisations have to be provided with security and trust guarantees so as to trust their services to be safely provided over the Internet
Metrics GUNNAR
"... Web applications ’ functionality and user base have evolved along with the threat landscape. Although controls such as network firewalls are essential, they’re wholly insufficient for providing overall Web application security. They provide security for underlying hosts and a means of communication, ..."
Abstract
- Add to MetaCart
Web applications ’ functionality and user base have evolved along with the threat landscape. Although controls such as network firewalls are essential, they’re wholly insufficient for providing overall Web application security. They provide security for underlying hosts and a means of communication
Directions in Security Metrics Research
, 2009
"... Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and produc ..."
Abstract
-
Cited by 22 (0 self)
- Add to MetaCart
Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development
Results 1 - 10
of
930