Seven good reasons for mobile agents
Communications of the ACM
Multiagent systems: a modern approach to distributed artificial intelligence
Multiagent systems: a modern approach to distributed artificial intelligence
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Notions of reputation in multi-agents systems: a review
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
Robustness of reputation-based trust: boolean case
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
An evidential model of distributed reputation management
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
Formal Analysis of Models for the Dynamics of Trust Based on Experiences
MAAMAW '99 Proceedings of the 9th European Workshop on Modelling Autonomous Agents in a Multi-Agent World: MultiAgent System Engineering
Is it an Agent, or Just a Program?: A Taxonomy for Autonomous Agents
ECAI '96 Proceedings of the Workshop on Intelligent Agents III, Agent Theories, Architectures, and Languages
Trust in information sources as a source for trust: a fuzzy approach
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
A buddy model of security for mobile agent communities operating in pervasive scenarios
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Task delegation using experience-based multi-dimensional trust
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Agent-based trust model involving multiple qualities
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
A survey of trust and reputation systems for online service provision
Decision Support Systems
Highly predictive blacklisting
SS'08 Proceedings of the 17th conference on Security symposium
Challenges for trust, fraud and deception research in multi-agent systems
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
Towards incentive-compatible reputation management
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
A prototype real-time intrusion-detection expert system
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
A temporal policy for trusting information
Trusting Agents for Trusting Electronic Societies
Intrusion detection with mobile agents
Computer Communications
Using response probability to build system redundancy in multiagent systems
Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems
Hi-index | 0.00 |
The concept of trust as presented here focuses on the trustworthiness, or reliability, of information and information sources. Decision makers, or agents, can create judgments based on previous experience with other agents and by reputation information received from allied agents. These judgments, or trust assessments, are used to predict the behavior of other agents and analyze the trustworthiness, truthfulness, or quality of information. Research concepts have been developed within the trust community, and they are most commonly applied to multi-agent systems research. This work attempts to show that trust research can be directly applied to security problems. Modern trust concepts enforce soft security which can be applied in addition to conventional security methods to build a more robust secure system. This article examines two trust based techniques and demonstrates their basic effectiveness using empirical experimentation. These techniques are then applied in a case study drawn from a more robust domain concerning confidential message transmission. The benefits of applying trust-based techniques to secure a system are measurable, and the costs associated with such techniques are scalable to even the most resource constrained systems.