The process group approach to reliable distributed computing
Communications of the ACM
Secure agreement protocols: reliable and atomic group multicast in rampart
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
The official PGP user's guide
Horus: a flexible group communication system
Communications of the ACM
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Enclaves: enabling secure collaboration over the internet
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Multi-authority secret-ballot elections with linear work
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
A secure and optimally efficient multi-authority election scheme
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
IEEE Network: The Magazine of Global Internetworking
Evaluation of trust in an eCommerce multi-agent system using fuzzy reasoning
FUZZ-IEEE'09 Proceedings of the 18th international conference on Fuzzy Systems
Hi-index | 0.00 |
In this paper we present and simulate a new approach for creating trusted infrastructures within multi agent systems. This bootstrapping protocol initializes a disordered space by turning it into an organized, redundant hierarchical structure, headed by elected security distribution centers with a pool of successors in case of a failure. A simulation was creates of the establishment of this hierarchy to judge both the resulting structure and the process of creation in a varying environment. Networks are tested of different scale, type and topology, with different numbers of malicious agents, intent on disrupting the bootstrapping process.