A new adaptive trust and reputation model for Mobile Agent Systems
暂无分享,去创建一个
Yousof Al-Hammadi | Mahmoud Al-Qutayri | Chan Yeob Yeun | Mohamed Jamal Zemerly | Jiankun Hu | Dina Shehada | Jiankun Hu | Yousof Al-Hammadi | C. Yeun | M. Al-Qutayri | D. Shehada | M. Zemerly
[1] Jordi Sabater-Mir,et al. Reputation-based decisions for logic-based cognitive agents , 2010, Autonomous Agents and Multi-Agent Systems.
[2] Jamal Bentahar,et al. CRM : An efficient trust and reputation model for agent computing , 2011 .
[3] David Stuart Robertson,et al. Secure information sharing in social agent interactions using information flow analysis , 2018, Eng. Appl. Artif. Intell..
[4] Jong Hyuk Park,et al. Secure and efficient public key management in next generation mobile networks , 2011, Personal and Ubiquitous Computing.
[5] Yanjun Zuo,et al. A reputation-based model for mobile agent migration for information search and retrieval , 2017, Int. J. Inf. Manag..
[6] Guiran Chang,et al. Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments , 2011 .
[7] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[8] Jordi Sabater-Mir,et al. Social ReGreT, a reputation model based on social relations , 2001, SECO.
[9] S. Buchegger,et al. A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks , 2004 .
[10] Amirreza Masoumzadeh,et al. A survey of security issue in multi-agent systems , 2011, Artificial Intelligence Review.
[11] Giuseppe M. L. Sarnè,et al. An agent‐oriented, trust‐aware approach to improve the QoS in dynamic grid federations , 2015, Concurr. Comput. Pract. Exp..
[12] Boi Faltings,et al. An incentive compatible reputation mechanism , 2003, AAMAS '03.
[13] Kwangjo Kim,et al. Secure authenticated group key agreement protocol in the MANET environment , 2008, Inf. Secur. Tech. Rep..
[14] Yousof Al-Hammadi,et al. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications , 2017, Secur. Commun. Networks.
[15] Jong Hyuk Park,et al. A scalable and efficient key escrow model for lawful interception of IDBC‐based secure communication , 2011, Int. J. Commun. Syst..
[16] Francesco Buccafurri,et al. Experimenting with Certified Reputation in a Competitive Multi-Agent Scenario , 2016, IEEE Intelligent Systems.
[17] Munindar P. Singh,et al. An evidential model of distributed reputation management , 2002, AAMAS '02.
[18] Mihaela Ulieru,et al. The State of the Art in Trust and Reputation Systems: A Framework for Comparison , 2010, J. Theor. Appl. Electron. Commer. Res..
[19] Chan Yeob Yeun,et al. Recent Advances in VANET Security: A Survey , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).
[20] Alicia Y. C. Tang,et al. Certainty, trust and evidence: Towards an integrative model of confidence in multi-agent systems , 2015, Comput. Hum. Behav..
[21] Chuanlei Zhang,et al. BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks , 2016, J. Netw. Comput. Appl..
[22] Nicholas R. Jennings,et al. An integrated trust and reputation model for open multi-agent systems , 2006, Autonomous Agents and Multi-Agent Systems.
[23] Vijay Varadharajan,et al. MobileTrust: a trust enhanced security architecture for mobile agent systems , 2010, International Journal of Information Security.
[24] Jie Zhang,et al. Filtering unfair ratings from dishonest advisors in multi-criteria e-markets: a biclustering-based approach , 2015, Autonomous Agents and Multi-Agent Systems.
[25] Jie Zhang,et al. A biclustering-based approach to filter dishonest advisors in multi-criteria e-marketplaces , 2014, AAMAS.
[26] G. Geetha,et al. Data Security in Free Roaming Mobile Agents , 2011 .
[27] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[28] Nicholas R. Jennings,et al. TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources , 2006, Autonomous Agents and Multi-Agent Systems.
[29] Mahmoud Al-Qutayri,et al. A secure mobile agent protocol for vehicular communication systems , 2015, 2015 11th International Conference on Innovations in Information Technology (IIT).
[30] Timothy W. Guinnane,et al. Trust: A Concept Too Many , 2005 .
[31] Chih-Hsiung Tu,et al. On-line learning migration: from social learning theory to social presence theory in a CMC environment , 2000, J. Netw. Comput. Appl..
[32] Samira Sadaoui,et al. A dynamic stage-based fraud monitoring framework of multiple live auctions , 2016, Applied Intelligence.
[33] Yang Liu,et al. Towards Robust and Effective Trust Management for Security: A Survey , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[34] Mahmoud Al-Qutayri,et al. Secure Mobile Agent Protocol for Vehicular Communication Systems in Smart Cities , 2018 .
[35] Tao Gu,et al. A service-oriented middleware for building context-aware services , 2005, J. Netw. Comput. Appl..
[36] Chan Yeob Yeun. Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison , 1999, IMACC.
[37] Domenico Rosaci,et al. Trust measures for competitive agents , 2012, Knowl. Based Syst..
[38] Valtteri Niemi,et al. Generic Authentication Architecture , 2008 .