An integrated trust and reputation model for open multi-agent systems

TD Huynh, NR Jennings, NR Shadbolt - Autonomous agents and multi …, 2006 - Springer
Trust and reputation are central to effective interactions in open multi-agent systems (MAS)
in which agents, that are owned by a variety of stakeholders, continuously enter and leave …

Trust management survey

S Ruohomaa, L Kutvonen - International Conference on Trust …, 2005 - Springer
Trust is an important tool in human life, as it enables people to cope with the uncertainty
caused by the free will of others. Uncertainty and uncontrollability are also issues in …

KAoS policy management for semantic web services

A Uszok, JM Bradshaw, M Johnson… - IEEE Intelligent …, 2004 - ieeexplore.ieee.org
Web Services power through explicit representations of Web resources underlying
semantics and the development of an intelligent Web infrastructure that can fully exploit …

Towards an ontology-based security management

B Tsoumas, D Gritzalis - … and Applications-Volume 1 (AINA'06), 2006 - ieeexplore.ieee.org
The paramount complexity of enterprise in formation leads to hard-to-deal security
management issues and system configurations. We present a security management …

Dimensions of adjustable autonomy and mixed-initiative interaction

JM Bradshaw, PJ Feltovich, H Jung, S Kulkarni… - … : Potential, Risks, and …, 2004 - Springer
Several research groups have grappled with the problem of characterizing and developing
practical approaches for implementing adjustable autonomy and mixed-initiative interaction …

Access control and the resource description framework: A survey

S Kirrane, A Mileo, S Decker - Semantic Web, 2017 - content.iospress.com
In recent years we have seen significant advances in the technology used to both publish
and consume structured data using the existing web infrastructure, commonly referred to as …

Context sensitive access control in smart home environments

S Dutta, SSL Chukkapalli, M Sulgekar… - 2020 IEEE 6th Intl …, 2020 - ieeexplore.ieee.org
The rise in popularity of Internet of Things (IoT) devices has opened doors for privacy and
security breaches in Cyber-Physical systems like smart homes, smart vehicles, and smart …

Tidal height and frequency dependence of acoustic velocity and attenuation in shallow gassy marine sediments

AI Best, MDJ Tuffin, JK Dix… - Journal of geophysical …, 2004 - Wiley Online Library
Remote prediction of gassy marine sediment properties is important for geohazard
assessment. Gas bubble resonance theory suggests that gassy sediments exhibit acoustic …

Making agents acceptable to people

N Zhong, J Liu, JM Bradshaw, P Beautement… - … for Information Analysis, 2004 - Springer
Because ever more powerful intelligent agents will interact with people in increasingly
sophisticated and important ways, greater attention must be given to the technical and social …

A survey on privacy policy languages: Expressiveness concerning data protection regulations

J Leicht, M Heisel - … 12th CMI Conference on Cybersecurity and …, 2019 - ieeexplore.ieee.org
Privacy policies are a widely used way of expressing the data handling by service providers.
However, the legalese used in these documents hinders many users in understanding the …