102 research outputs found

    Secure Interactive Electronic Negotiations in Business to Business Marketplaces

    Get PDF
    In this paper, we discuss security aspects of interactive bilateral multi-attribute negotiations. We introduce this type of electronic negotiations and maintain that it will be an important functional aspect of business-to-business electronic marketplaces. We discuss the general application architecture and the process flow for this type of negotiations. We introduce the relevant security issues and show how these issues can be dealt with, especially within a business relationship where a lower degree of trust prevails. To this purpose, we introduce and discuss a protocol for secure interactive electronic negotiations

    A Negotiation Support System based on a Multi-agent System speci city and preference relations on arguments

    Get PDF
    http://www.di.unipi.it/~morge/publis/morge04sac.pdfInternational audienceIn this paper, we propose a Negotiation Support System based on a Multi-agent System. Each agent assists a user in multi-criteria decision making and negotiates according to this decision-modelling with other agents, each of them representing a user. Moreover agents assist users in the debate to negotiate a joint representation of the problem and automatically justify proposals with this joint representation

    Proceedings of the 4th Workshop on Interacting with Smart Objects 2015

    Get PDF
    These are the Proceedings of the 4th IUI Workshop on Interacting with Smart Objects. Objects that we use in our everyday life are expanding their restricted interaction capabilities and provide functionalities that go far beyond their original functionality. They feature computing capabilities and are thus able to capture information, process and store it and interact with their environments, turning them into smart objects

    Distributed multimedia systems

    Get PDF
    A distributed multimedia system (DMS) is an integrated communication, computing, and information system that enables the processing, management, delivery, and presentation of synchronized multimedia information with quality-of-service guarantees. Multimedia information may include discrete media data, such as text, data, and images, and continuous media data, such as video and audio. Such a system enhances human communications by exploiting both visual and aural senses and provides the ultimate flexibility in work and entertainment, allowing one to collaborate with remote participants, view movies on demand, access on-line digital libraries from the desktop, and so forth. In this paper, we present a technical survey of a DMS. We give an overview of distributed multimedia systems, examine the fundamental concept of digital media, identify the applications, and survey the important enabling technologies.published_or_final_versio

    Norms for Modeling Agents' Interaction in Ubiquitous Environments

    Get PDF

    Beyond the Hype: On Using Blockchains in Trust Management for Authentication

    Full text link
    Trust Management (TM) systems for authentication are vital to the security of online interactions, which are ubiquitous in our everyday lives. Various systems, like the Web PKI (X.509) and PGP's Web of Trust are used to manage trust in this setting. In recent years, blockchain technology has been introduced as a panacea to our security problems, including that of authentication, without sufficient reasoning, as to its merits.In this work, we investigate the merits of using open distributed ledgers (ODLs), such as the one implemented by blockchain technology, for securing TM systems for authentication. We formally model such systems, and explore how blockchain can help mitigate attacks against them. After formal argumentation, we conclude that in the context of Trust Management for authentication, blockchain technology, and ODLs in general, can offer considerable advantages compared to previous approaches. Our analysis is, to the best of our knowledge, the first to formally model and argue about the security of TM systems for authentication, based on blockchain technology. To achieve this result, we first provide an abstract model for TM systems for authentication. Then, we show how this model can be conceptually encoded in a blockchain, by expressing it as a series of state transitions. As a next step, we examine five prevalent attacks on TM systems, and provide evidence that blockchain-based solutions can be beneficial to the security of such systems, by mitigating, or completely negating such attacks.Comment: A version of this paper was published in IEEE Trustcom. http://ieeexplore.ieee.org/document/8029486

    An Agent Based Security Framework for Emering Networks

    Get PDF
    Summary Mobile ad-hoc network has gained enormous amount of attention during last few years due to its wider application area from conventional military purposes to emergency response service. MANETs throws up new requirements and problems due to flexibility and dynamic nature of these networks. The challenges faced in the Ad-hoc environment are mostly due to the resource poorness of these networks. These types of networks operate in the absence of any fixed infrastructure; therefore solutions for conventional networks are usually not sufficient to provide efficient operations in ad-hoc environment. The wireless nature of communication and lack of any security infrastructure raise several security problems. In this paper we propose an agent based framework for MANET security. The proposed approach is scalable and has a minor dependence on central node. Mobility feature of software agents address the issues of dynamic topology and unpredictable traffic patterns
    • …
    corecore