The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In self-regulated learning concept, Intelligent Tutoring Systems (ITS) can be designed to foster learning behaviors through pedagogical agents (PAs) that are used for interactions and exchange information with the human learner. These agents are intelligent and follow rational behaviors, but in the case of multi-agent environments they need to be systematically and specifically designed, however in...
Gathering functionally similar agent-based Web services into communities has been proposed and promoted on many occasions. In this paper, we compare the performance of these communities with self-managed, single agent-based Web services from trust perspective. To this end, we deploy a reputation model that ranks communities and Web services with respect to different reputation parameters. By relating...
Community of Web services (CWS) is a society composed by a number of functionally identical Web services. The communities always aim to increase their reputation level in order to obtain more requests. In this paper, we propose an effective mechanism dealing with reputation assessment for communities of Web services. The proposed mechanism is based on after-service feedbacks provided by the users...
In service-oriented environments, reputation-based service selection is gaining increasing prominence. We propose in this paper a social network-based approach to model and analyze trust when a given service, called customer service or customer, should select another service, called provider service or provider, in a composition scenario. Trust is modeled as a game between customer and provider services...
In this paper we propose a new architecture, which is composed of distributed cooperative agents to reduce the false alarm ratio of the intrusion detection systems (IDS) in a twofold contribution. The first contribution lies in reducing the false alarm rate of the attack detection in an agent-based architecture by using honeypot network as the closer level of investigation. The connection is retrieved...
In this paper, we propose an efficient mechanism dealing with trust assessment for agent societies, aiming to accurately assess the trustworthiness of the collaborating agents. In the proposed model, we formulate on-line assessment process, which applies a number of measurements affecting the evaluator agent's estimated value regarding to the evaluated agent's trust. We then represent the off-line...
Security is a substantial concept in multi-agent systems where agents dynamically enter and leave the system. Different models of trust have been proposed to assist agents in deciding whether to interact with requesters who are not known (or not very well known) by the service provider. To this end, in this paper we progress our work on security for agent-based systems, which is embedded in service...
Security is a crucial factor in multi-agent systems where agents dynamically leave and enter the system. In this paper, we continue our work on security for agent-based systems by proposing a new trust model allowing agents to decide about a target agent. The model combines two techniques: using reports provided by the trustworthy agents regarding to direct and indirect interaction histories, and...
When traditional firewall and intrusion detection systems (IDS) are used to detect possible attacks from the network, they often make wrong decisions and block the legitimate connections. In this paper we propose a new architecture which is composed of distributed agents and honeypot. The main focus of our approach lies in reducing the false alarm rate of the attack detection. Using the honeypot scheme,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.