102 research outputs found
Secure Interactive Electronic Negotiations in Business to Business Marketplaces
In this paper, we discuss security aspects of interactive bilateral multi-attribute negotiations. We introduce this type of electronic negotiations and maintain that it will be an important functional aspect of business-to-business electronic marketplaces. We discuss the general application architecture and the process flow for this type of negotiations. We introduce the relevant security issues and show how these issues can be dealt with, especially within a business relationship where a lower degree of trust prevails. To this purpose, we introduce and discuss a protocol for secure interactive electronic negotiations
A Negotiation Support System based on a Multi-agent System speci city and preference relations on arguments
http://www.di.unipi.it/~morge/publis/morge04sac.pdfInternational audienceIn this paper, we propose a Negotiation Support System based on a Multi-agent System. Each agent assists a user in multi-criteria decision making and negotiates according to this decision-modelling with other agents, each of them representing a user. Moreover agents assist users in the debate to negotiate a joint representation of the problem and automatically justify proposals with this joint representation
Proceedings of the 4th Workshop on Interacting with Smart Objects 2015
These are the Proceedings of the 4th IUI Workshop on Interacting with
Smart Objects. Objects that we use in our everyday life are expanding
their restricted interaction capabilities and provide functionalities
that go far beyond their original functionality. They feature computing
capabilities and are thus able to capture information, process and store
it and interact with their environments, turning them into smart objects
Distributed multimedia systems
A distributed multimedia system (DMS) is an integrated communication, computing, and information system that enables the processing, management, delivery, and presentation of synchronized multimedia information with quality-of-service guarantees. Multimedia information may include discrete media data, such as text, data, and images, and continuous media data, such as video and audio. Such a system enhances human communications by exploiting both visual and aural senses and provides the ultimate flexibility in work and entertainment, allowing one to collaborate with remote participants, view movies on demand, access on-line digital libraries from the desktop, and so forth. In this paper, we present a technical survey of a DMS. We give an overview of distributed multimedia systems, examine the fundamental concept of digital media, identify the applications, and survey the important enabling technologies.published_or_final_versio
Beyond the Hype: On Using Blockchains in Trust Management for Authentication
Trust Management (TM) systems for authentication are vital to the security of
online interactions, which are ubiquitous in our everyday lives. Various
systems, like the Web PKI (X.509) and PGP's Web of Trust are used to manage
trust in this setting. In recent years, blockchain technology has been
introduced as a panacea to our security problems, including that of
authentication, without sufficient reasoning, as to its merits.In this work, we
investigate the merits of using open distributed ledgers (ODLs), such as the
one implemented by blockchain technology, for securing TM systems for
authentication. We formally model such systems, and explore how blockchain can
help mitigate attacks against them. After formal argumentation, we conclude
that in the context of Trust Management for authentication, blockchain
technology, and ODLs in general, can offer considerable advantages compared to
previous approaches. Our analysis is, to the best of our knowledge, the first
to formally model and argue about the security of TM systems for
authentication, based on blockchain technology. To achieve this result, we
first provide an abstract model for TM systems for authentication. Then, we
show how this model can be conceptually encoded in a blockchain, by expressing
it as a series of state transitions. As a next step, we examine five prevalent
attacks on TM systems, and provide evidence that blockchain-based solutions can
be beneficial to the security of such systems, by mitigating, or completely
negating such attacks.Comment: A version of this paper was published in IEEE Trustcom.
http://ieeexplore.ieee.org/document/8029486
An Agent Based Security Framework for Emering Networks
Summary Mobile ad-hoc network has gained enormous amount of attention during last few years due to its wider application area from conventional military purposes to emergency response service. MANETs throws up new requirements and problems due to flexibility and dynamic nature of these networks. The challenges faced in the Ad-hoc environment are mostly due to the resource poorness of these networks. These types of networks operate in the absence of any fixed infrastructure; therefore solutions for conventional networks are usually not sufficient to provide efficient operations in ad-hoc environment. The wireless nature of communication and lack of any security infrastructure raise several security problems. In this paper we propose an agent based framework for MANET security. The proposed approach is scalable and has a minor dependence on central node. Mobility feature of software agents address the issues of dynamic topology and unpredictable traffic patterns
- …