The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In 2009, Shamir proposed the setbase approach to protect the privacy of biometric data during ID documents issuance. One year later, Bringer and Chabanne introduced negative databases for biometric data. In this paper, we show that negative database techniques can also be applied to the setbase approach to enforce some of its security characteristics.
Nietzsche describes what is at the core of the concept of trust as it is used in agent societies and self-organising systems. Trust describes the expectation of one entity that the other behaves according to a set of rules. If that trust is broken, it is very hard to repair. If it exists, however, it is the basis of cooperation and enables a collective effort that gives a society purpose and allows...
Traditional security technologies are based on numerous assumptions about the environment in which systems are used. This includes assumptions about the enforcement of legislative and contractual frameworks, limitations of particular technologies and the constraints on human behaviour imposed by social and religious norms. Most of these assumptions, however, are implicit and they will fail when the...
Open computing systems, from sensor networks to Smart-Grids, face the same challenge: a set of autonomous, heterogenous agents, needing to collectivise and distribute resources without a centralised decision-making authority. One possible solution is to collectively agree a set of rules for resource provision and appropriation, but there remains the possibility for some agents not to comply with the...
Self-organising systems have become important relatively recently. It is frequently claimed that their complex nature necessitates new formalisms to express and reason about them. In this paper the opposite view is taken. Following Back's use of action systems to express a distributed system as an initialised possibly nonterminating loop, here two simple but representative case studies of self-organising...
One aspect of self-organizing systems is their desired ability to be self-learning, i.e., to be able to adapt dynamically to conditions in their environment. This quality is awkward especially if it comes to applications in security or safety-sensitive areas. Here a step towards more trustful systems could be taken by providing transparency of the processes of a system. An important means of giving...
In this paper we present an open multi-agent based Desktop Grid System that improves the performance of cooperative clients while decreasing the performance of non-cooperative clients as an incentive for good conduct. This is achieved by trust-based job client and worker algorithms that take into account the local and global history of the credibility and reliability experiences between agents, as...
Security issues in collaboration with emphasis on access management continue to be researched extensively as technology innovation allows us to collaborate in many different ways. However, this research delves into a different perspective of collaboration security where dynamic virtual teams are put together when a company A acquires company B. In this context company A brings together people, processes,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.