One of the dominant properties of a global computing network is the incomplete information available to principals about each other. This was the motivation of using the notion of probabilistic trust as an approach to security sensitive decision making in modern open and global computing systems. In such systems any principal A uses the outcomes of past interactions with another principal B to construct a probabilistic model approximating the behaviour of B. Using this model, the principal A can take decisions regarding interactions with B by estimating its future actions. Many existing frameworks adopt the so-called ‘Beta model’. The main limitation of these frameworks is that they assume the behaviour of any principal to be fixed, which i...
We present a formal analysis technique for probabilistic security properties of peer-to-peer communi...
Online trading takes place in a very complex environment full of uncertainty in which deceitful serv...
We use the probabilistic model checker PRISM to analyze the Crowds system for anonymous Web browsing...
One of the dominant properties of a global computing network is the incomplete information available...
Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern...
Abstract. Probabilistic trust has been adopted as an approach to taking security sensitive decisions...
International audienceIn modern global networks, principals usually have incomplete information abou...
AbstractResearch in models for experience-based trust management has either ignored the problem of m...
AbstractThe application scenarios envisioned for ‘global ubiquitous computing’ have unique requireme...
The application scenarios envisioned for ‘global ubiquitous computing’ have unique requirements that...
Abstract. Research in models for experience-based trust management has either ignored the problem of...
The existing analysis of the Crowds anonymity protocol assumes that a participating member is either...
Abstract. Research in models for experience-based trust management has either ignored or provided ad...
In traditional security systems, for each task, we either trust an agent or we don\u27t. If we trust...
Emergent networks like mobile ad hoc networks, sensor networks, opportunistic networks, peer-to-peer...
We present a formal analysis technique for probabilistic security properties of peer-to-peer communi...
Online trading takes place in a very complex environment full of uncertainty in which deceitful serv...
We use the probabilistic model checker PRISM to analyze the Crowds system for anonymous Web browsing...
One of the dominant properties of a global computing network is the incomplete information available...
Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern...
Abstract. Probabilistic trust has been adopted as an approach to taking security sensitive decisions...
International audienceIn modern global networks, principals usually have incomplete information abou...
AbstractResearch in models for experience-based trust management has either ignored the problem of m...
AbstractThe application scenarios envisioned for ‘global ubiquitous computing’ have unique requireme...
The application scenarios envisioned for ‘global ubiquitous computing’ have unique requirements that...
Abstract. Research in models for experience-based trust management has either ignored the problem of...
The existing analysis of the Crowds anonymity protocol assumes that a participating member is either...
Abstract. Research in models for experience-based trust management has either ignored or provided ad...
In traditional security systems, for each task, we either trust an agent or we don\u27t. If we trust...
Emergent networks like mobile ad hoc networks, sensor networks, opportunistic networks, peer-to-peer...
We present a formal analysis technique for probabilistic security properties of peer-to-peer communi...
Online trading takes place in a very complex environment full of uncertainty in which deceitful serv...
We use the probabilistic model checker PRISM to analyze the Crowds system for anonymous Web browsing...