Filters








12,100 Hits in 2.9 sec

Automated Trust Negotiation in Autonomic Environments [chapter]

Andreas Klenk, Frank Petri, Benoit Radier, Mikael Salaun, Georg Carle
Lecture Notes in Computer Science  
Automated Trust Negotiation supports the cooperation of devices with no prior trust relationship. They can reach an agreement by iteratively exchanging credentials during a negotiation process.  ...  We argue how this approach applies to autonomic environments and demonstrate its scalability.  ...  In this paper, we explore the use of Automated Trust Negotiation for autonomic systems. We show how to reach an agreement via an automated exchange of policies and credentials.  ... 
doi:10.1007/978-3-540-74917-2_22 fatcat:6lmepiwqknb2phlgaazyor5zjq

When Will Negotiation Agents Be Able to Represent Us? The Challenges and Opportunities for Autonomous Negotiators

Tim Baarslag, Michael Kaisers, Enrico H. Gerding, Catholijn M. Jonker, Jonathan Gratch
2017 Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence  
We relate the automated negotiation research agenda to dimensions of autonomy and distill three major themes that we believe will propel autonomous negotiation forward: accurate representation, long-term  ...  However, up until now, truly autonomous negotiators have rarely been deployed in real-world applications.  ...  The Autonomy Diagonal of Negotiation Autonomous negotiation is more than just automated negotiation; it is the freedom to negotiate independently.  ... 
doi:10.24963/ijcai.2017/653 dblp:conf/ijcai/BaarslagKGJG17 fatcat:bglge77bojg7ncplo6uflf2pfe

Towards a Framework for Autonomic Security Protocols [chapter]

Simon N. Foley
2005 Lecture Notes in Computer Science  
A compromise of a key or a change in the trust relationships between principals can result in a principal self-healing and synthesising a new protocol to survive the event.  ...  environment and requirements.  ...  Acknowledgments This work is supported by the Boole Centre for Research in Informatics, University College Cork under the HEA-PRTLI scheme.  ... 
doi:10.1007/11542322_9 fatcat:mjenlufxlvczdcarrsg66cphfy

Towards a Framework for Autonomic Security Protocols [chapter]

Simon N. Foley, Hongbin Zhou
2005 Lecture Notes in Computer Science  
A compromise of a key or a change in the trust relationships between principals can result in a principal self-healing and synthesising a new protocol to survive the event.  ...  environment and requirements.  ...  Acknowledgments This work is supported by the Boole Centre for Research in Informatics, University College Cork under the HEA-PRTLI scheme.  ... 
doi:10.1007/11542322_8 fatcat:vighcic7djh2lcfhbpd2ybvtwy

An Extensible Framework for Dynamic Market-Based Service Selection and Business Process Execution [chapter]

Ante Vilenica, Kristof Hamann, Winfried Lamersdorf, Jan Sudeikat, Wolfgang Renz
2011 Lecture Notes in Computer Science  
In addition, the implementation of the negotiation framework includes a simulation component which offers convenient means to study the outcome of different settings of the business environment a priori  ...  However, the management of related business processes in such environments requires considerable (often still manual) effort.  ...  Two Negotiation Proxies: SMA & SA In order to provide reusable components for the management of automated negotiations in service-based systems, the two agent types SMA and SA are proposed.  ... 
doi:10.1007/978-3-642-21387-8_12 fatcat:koojefwrbrfcbnao6lp7bydkvu

Computers That Negotiate on Our Behalf: Major Challenges for Self-sufficient, Self-directed, and Interdependent Negotiating Agents [chapter]

Tim Baarslag, Michael Kaisers, Enrico H. Gerding, Catholijn M. Jonker, Jonathan Gratch
2017 Lecture Notes in Computer Science  
We relate the automated negotiation research agenda to dimensions of autonomy and distill three major themes that we believe will propel autonomous negotiation forward: accurate representation, long-term  ...  However, up until now, truly autonomous negotiators have rarely been deployed in realworld applications.  ...  To properly fulfill its representational role in an ever-dynamic environment, a negotiation agent has to balance and adhere to different aspects of autonomous behavior, including self-reliance and the  ... 
doi:10.1007/978-3-319-71679-4_10 fatcat:jpyjdeyh75fkvpn7epxeybp7e4

Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems

Oluwafemi Ajayi, Richard Sinnott, Anthony Stell
2007 The Second International Conference on Availability, Reliability and Security (ARES'07)  
Automated trust negotiation (ATN) is one approach that has been proposed for trust discovery and realisation, which enables entities viz. strangers to access resources across autonomous boundaries through  ...  Various negotiation strategies have been proposed to protect credential disclosure during trust negotiations.  ...  as in trust negotiation  ... 
doi:10.1109/ares.2007.91 dblp:conf/IEEEares/AjayiSS07 fatcat:isdu7ndycfc3xaqypkxdscytdq

The vision of autonomic computing

J.O. Kephart, D.M. Chess
2003 Computer  
cited applications and environments that weigh in at tens of millions of lines of code and require skilled IT professionals to install, configure, tune, and maintain.  ...  The Vision of Autonomic Computing I n mid-October 2001, IBM released a manifesto observing that the main obstacle to further progress in the IT industry is a looming software complexity crisis. 1 The company  ...  However, in more sophisticated autonomic systems, individual elements will be agents that continually adapt to their environment-an environment that consists largely of other agents.  ... 
doi:10.1109/mc.2003.1160055 fatcat:drmkin7wuzeozmzqrazrd63w7m

Who's the Boss? Autonomics and New-Fangled Security Gizmos with Minds of Their Own

Glenn A. Fink
2007 USENIX Large Installation Systems Administration Conference  
Automation is lower-level, autonomics interacts with the environment Automation is handling a designed task well; autonomics is handling all the unexpected things that arise.  ...  actions to mitigate attacks and general failures Source: "Autonomic computing is not an overnight revolution in which system-wide, self-managing environments suddenly appear.  ... 
dblp:conf/lisa/Fink07 fatcat:7ucp2zqzgfc4bdpib2scwzhcyi

A Unified Framework for the Negotiation and Deployment of Network Services [chapter]

Spyros Denazis, Lidia Yamamoto
2005 Lecture Notes in Computer Science  
One of the goals of Autonomic Communication is to produce self-managing network elements able to provide the desired services in an automated way.  ...  After an agreement has been reached via agent-based automated negotiation mechanisms, network elements must be automatically configured in order to enforce the agreed conditions.  ...  of a truly autonomic network, which must detect and resolve conflicts of interest in an automated way.  ... 
doi:10.1007/11520184_7 fatcat:23cdeg4gl5bgbjyfb6s37b52aa

Pasitikėjimo užtikrinimo metodai automatiniu būdu sudarant elektronines pasaulinio saityno paslaugų gavimo sutartis

Marius Šaučiūnas, Albertas Čaplinskas
2011 Informacijos mokslai  
in Web Service Environment: Trust Management AspectsMarius Šaučiūnas, Albertas Čaplinskas SummaryThe paper addresses trust management problems in automated eContract negotiation among software agents  ...  in the web service environment.  ...  Introduction The object of this paper is a critical analysis of the automated trust negotiation process among software agents in the web service environment.  ... 
doi:10.15388/im.2011.0.3146 fatcat:t7ia72ckwva5fcnsn5xgursqv4

Trust Realisation in Multi-domain Collaborative Environments

Oluwafemi Ajayi, Richard Sinnott, Anthony Stell
2007 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007)  
trust realisation in multi-domain collaborative environments.  ...  In this paper we present a dynamic trust negotiation (DTN) model and associated prototype implementation showing the benefits and limitations DTN incurs in supporting n-tier delegation hops needed for  ...  It addresses the heterogeneous and autonomous issues of trust management like credentials and policies in multi-domain environments.  ... 
doi:10.1109/icis.2007.187 dblp:conf/ACISicis/AjayiSS07 fatcat:5at2uhnvlzaufglugijxy3wlk4

A "Driver-More" Approach To Vehicle Automation

Andrea Castellano, Serena Fruttaldo, Elisa Landini, Roberto Montanari, Andreas Luedtke
2018 Zenodo  
AutoMate paper  ...  Therefore, the cooperation happens when humans and machines execute tasks together, use resources together, interact with each other in a dynamic environment and make autonomous decisions.  ...  Both the human and the automation have limits that can negatively affect the safety as well as the efficiency, the comfort, the trust and the acceptance of the autonomous driving.  ... 
doi:10.5281/zenodo.1222200 fatcat:abhgxv737bewrm3yhgktxug7re

Trusted Autonomy and Cognitive Cyber Symbiosis: Open Challenges

Hussein A. Abbass, Eleni Petraki, Kathryn Merrick, John Harvey, Michael Barlow
2015 Cognitive Computation  
CoCyS focuses on the architecture and interface of a Trusted Autonomous System.  ...  Trusted Autonomy (TA) is a field of research that focuses on understanding and designing the interaction space between two entities each of which exhibits a level of autonomy.  ...  of 1975, as revised in 2008 (5).  ... 
doi:10.1007/s12559-015-9365-5 pmid:27257440 pmcid:PMC4867784 fatcat:zi6klz6m2je25lsrljoejhmr7m

Towards Decentralised Security Policies for e-Health Collaborations

Oluwafemi Ajayi, Richard Sinnott, Anthony Stell
2008 2008 Second International Conference on Emerging Security Information, Systems and Technologies  
Security in decentralised collaborative environments present huge challenges where many entities from different autonomous security domains want to access and share resources.  ...  In this paper we present dynamic trust negotiation, an approach that folds remote security credentials into local security credentials through trust contracts, thereby bridging the gap making decentralised  ...  It addresses the heterogeneous and autonomous issues of trust management like credentials and policies in multi-domain environments.  ... 
doi:10.1109/securware.2008.15 dblp:conf/securware/AjayiSS08 fatcat:opawmya22bdhfkwvnek27w7okm
« Previous Showing results 1 — 15 out of 12,100 results