• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 930
Next 10 →

Protecting Mobile Agents Against Malicious Hosts

by Tomas Sander, Christian F. Tschudin , 1997
"... A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under execution and (b) the mobile code against tampering attempts by the executing host. Many techniques for the first ..."
Abstract - Cited by 325 (1 self) - Add to MetaCart
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under execution and (b) the mobile code against tampering attempts by the executing host. Many techniques for the first

Reputation-based framework for high integrity sensor networks

by Saurabh Ganeriwal, Mani B. Srivastava - In SASN ’04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks , 2004
"... The traditional approach of providing network security has been to borrow tools from cryptography and authentication. However, we argue that the conventional view of security based on cryptography alone is not sufficient for the unique characteristics and novel misbehaviors encountered in sensor net ..."
Abstract - Cited by 257 (7 self) - Add to MetaCart
with cryptography for the development of trustworthy sensor networks. Following this approach, we propose a reputation-based framework for sensor networks where nodes maintain reputation for other nodes and use it to evaluate their trustworthiness. We will show that this framework provides a scalable, diverse and a

Developing an Integrated Trust and Reputation Model for Open Multi-Agent Systems

by Dong Huynh, Nicholas R. Jennings, Nigel R. Shadbolt , 2004
"... Trust and reputation are central to effective interactions in open multi-agent systems in which agents, that are owned by a variety of stakeholders, can enter and leave the system at any time. This openness means existing trust and reputation models cannot readily be used. To this end, we present FI ..."
Abstract - Cited by 210 (12 self) - Add to MetaCart
FIRE, a trust and reputation model that integrates a number of information sources to produce a comprehensive assessment of an agent's likely performance. Specifically, FIRE incorporates interaction trust, role-based trust, witness reputation, and certified reputation to provide a trust metric

Learning from imbalanced data

by Haibo He, Edwardo A. Garcia - IEEE Trans. on Knowledge and Data Engineering , 2009
"... Abstract—With the continuous expansion of data availability in many large-scale, complex, and networked systems, such as surveillance, security, Internet, and finance, it becomes critical to advance the fundamental understanding of knowledge discovery and analysis from raw data to support decision-m ..."
Abstract - Cited by 260 (6 self) - Add to MetaCart
, principles, algorithms, and tools to transform vast amounts of raw data efficiently into information and knowledge representation. In this paper, we provide a comprehensive review of the development of research in learning from imbalanced data. Our focus is to provide a critical review of the nature

An incentive compatible reputation mechanism

by Radu Jurca, Boi Faltings - In Proceedings of the IEEE Conference on E-Commerce , 2003
"... Traditional centralised approaches to security are difficult to apply to large, distributed marketplaces in which software agents operate. Developing a notion of trust that is based on the reputation of agents can provide a softer notion of security that is sufficient for many multi-agent applicatio ..."
Abstract - Cited by 72 (1 self) - Add to MetaCart
Traditional centralised approaches to security are difficult to apply to large, distributed marketplaces in which software agents operate. Developing a notion of trust that is based on the reputation of agents can provide a softer notion of security that is sufficient for many multi

Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools

by Tal Garfinkel - In Proc. Network and Distributed Systems Security Symposium , 2003
"... System call interposition is a powerful method for regulating and monitoring application behavior. In recent years, a wide variety of security tools have been developed that use this technique. This approach brings with it a host of pitfalls for the unwary implementer that if overlooked can allow hi ..."
Abstract - Cited by 137 (1 self) - Add to MetaCart
System call interposition is a powerful method for regulating and monitoring application behavior. In recent years, a wide variety of security tools have been developed that use this technique. This approach brings with it a host of pitfalls for the unwary implementer that if overlooked can allow

Robust statistical methods for securing wireless localization in sensor networks

by Zang Li, Yanyong Zhang, Badri Nath - In Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN , 2005
"... Abstract — Many sensor applications are being developed that require the location of wireless devices, and localization schemes have been developed to meet this need. However, as location-based services become more prevalent, the localization infrastructure will become the target of malicious attack ..."
Abstract - Cited by 132 (4 self) - Add to MetaCart
attacks. These attacks will not be conventional security threats, but rather threats that adversely affect the ability of localization schemes to provide trustworthy location information. This paper identifies a list of attacks that are unique to localization algorithms. Since these attacks are diverse

A Socially Inspired Reputation Model

by Nicola Mezzetti - Proceedings of 1st European PKI Workshop. Volume 3093 of Lecture Notes in Computer Science., Springer-Verlag (2004) 191–204 , 2004
"... Abstract. In recent years we have observed a huge evolution of services deployed over the Internet, in particular by the World Wide Web; the development of Web Services has enabled Business-to-Business (B2B) relationships, i.e., the exchange of services over the Internet between different, possibly ..."
Abstract - Cited by 10 (1 self) - Add to MetaCart
mutually distrustful, organisations. Unfortunately, Web Services themselves do not provide all the features that are needed to implement and enforce B2B relationships; organisations have to be provided with security and trust guarantees so as to trust their services to be safely provided over the Internet

Metrics GUNNAR

by Elizabeth A, Arctec Group
"... Web applications ’ functionality and user base have evolved along with the threat landscape. Although controls such as network firewalls are essential, they’re wholly insufficient for providing overall Web application security. They provide security for underlying hosts and a means of communication, ..."
Abstract - Add to MetaCart
Web applications ’ functionality and user base have evolved along with the threat landscape. Although controls such as network firewalls are essential, they’re wholly insufficient for providing overall Web application security. They provide security for underlying hosts and a means of communication

Directions in Security Metrics Research

by Wayne Jansen, Wayne Jansen, Patrick D. Gallagher, Deputy Director , 2009
"... Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and produc ..."
Abstract - Cited by 22 (0 self) - Add to MetaCart
Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development
Next 10 →
Results 1 - 10 of 930
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University