56,087 Hits in 8.1 sec

Norm's Trust Model to Evaluate Norms Benefit Awareness for Norm Adoption in an Open Agent Community

Al-Mutazbellah Khamees, Mohd Sharifuddin, Alicia Y.
2018 International Journal of Advanced Computer Science and Applications  
In this paper, the trust parameter of the mechanism is analyzed and a norm's trust model is proposed and utilized in the evaluation of a norm's benefits for subsequent adoption or rejection.  ...  Keywords-Norm's benefits; norm's trust; norm detection; normative multi-agent systems; intelligent software agent I.  ...  For the purpose of evaluating the trustworthiness of agents, the trust factor as defined in the context of these models, have been used.  ... 
doi:10.14569/ijacsa.2018.090209 fatcat:odngcvqlo5fb5lnv7jxw45kx6e

Toward a testbed for evaluating computational trust models: experiments and analysis

Partheeban Chandrasekaran, Babak Esfandiari
2015 Journal of Trust Management  
We propose a generic testbed for evaluating social trust models and we show how existing models can fit our tesbed.  ...  To showcase the flexibility of our design, we implemented a prototype and evaluated three trust algorithms, namely EigenTrust, PeerTrust and Appleseed, for their vulnerabilites to attacks and compliance  ...  Thus for a researcher to evaluate and compare his or her latest model against existing ones, a comprehensive test tool is needed.  ... 
doi:10.1186/s40493-015-0019-z fatcat:bhafy2xfofentdmaz77pfriavy

Decision making matters: A better way to evaluate trust models

David Jelenc, Ramón Hermoso, Jordi Sabater-Mir, Denis Trček
2013 Knowledge-Based Systems  
They assume that if all trust models use the same decision making mechanism, the mechanism itself becomes irrelevant for the evaluation.  ...  Based on our findings, we recommend to evaluate trust models independently of the decision making mechanism -and we also provide a method (and a tool) to do so.  ...  DART provides a flexible, multi-faced and general environment for evaluating performance of agents. However, its evaluation model concentrates around trust-based decisions.  ... 
doi:10.1016/j.knosys.2013.07.016 fatcat:zhxqd5arc5bpnghsrostp3cc34

Trust in multi-agent systems

2004 Knowledge engineering review (Print)  
role of trust in multi-agent systems.  ...  Trust is a fundamental concern in large-scale open distributed systems.  ...  Open issues We end our analysis of the state of the art in trust in multi-agent systems by outlining the key issues that need to be solved in order to have a comprehensive trust model for open multi-agent  ... 
doi:10.1017/s0269888904000116 fatcat:beogdyp2obba3hwqcrbip4kzwm

Delegating to software agents

1997 International Journal of Human-Computer Studies  
In contrast, the "delegation" model associated with agents is based on entrusting tasks to an autonomous, sometimes anthropomorphized system, whose performance is monitored and evaluated.  ...  For this purpose, designers should find the management sciences and organizational psychology literatures to be as relevant as that of traditional human factors.  ...  The user interface model associated with intelligent agent systems differs from the "tool" model in several ways.  ... 
doi:10.1006/ijhc.1996.0100 fatcat:vihobfipf5hozbs2xxzwas3aae

A Survey of Multi-Agent Trust Management Systems

Han Yu, Zhiqi Shen, Cyril Leung, Chunyan Miao, Victor R. Lesser
2013 IEEE Access  
Over the past decade, a large number of trust management models have been proposed.  ...  In open and dynamic multi-agent systems (MASs), agents often need to rely on resources or services provided by other agents in order to accomplish their goals.  ...  When human motivations interact in multi-agent systems, new research opportunities arise for trust management.  ... 
doi:10.1109/access.2013.2259892 fatcat:x7aegwqwwndftgvdu5eqpwrgfm

A survey of security issue in multi-agent systems

Youna Jung, Minsoo Kim, Amirreza Masoumzadeh, James B. D. Joshi
2011 Artificial Intelligence Review  
In this paper, we survey existing work related to security in multi-agent systems, especially focused on access control and trust/reputation, and then present our analyses.  ...  Multi-agent systems have attracted the attention of researchers because of agents' automatic, pro-active, and dynamic problem solving behaviors.  ...  Multi-agent systems There are many different definitions for agents and MASs.  ... 
doi:10.1007/s10462-011-9228-8 fatcat:vnifpd7p3fgjjitw57rn4jp4ai

Trustworthy agents for B2B operations under Normative environment

Eugenio Oliveira, Henrique Cardoso, Joana Urbano, Ana Paula Rocha
2014 The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)  
Using Multi-Agent Systems (MAS) as a paradigm for an electronic institution framework enables both to simulate and facilitate the process of autonomous agents, as either enterprises or individual representatives  ...  To support agents information generation, monitoring and fusion, we here present ANTE platform, a software MAS integrating Trust models with negotiation facilities and Normative environments, for the creation  ...  ACKNOWLEDGMENTS We would like to acknowledge Pedro Brandão for his help in the programming effort.  ... 
doi:10.1109/icsai.2014.7009295 dblp:conf/icsai/OliveiraCU014 fatcat:l7yvhtdhkzdojmdyr5huuzioou

Improving Agent Quality in Dynamic Smart Cities by Implementing an Agent Quality Management Framework

Najwa Abu Bakar, Ali Selamat, Ondrej Krejcar
2019 Applied Sciences  
In this research, a framework called Agent Quality Management was proposed and implemented to manage agent quality in agent systems.  ...  This paper demonstrates the effectiveness of the approach by applying it toward a smart city application called a crowdsourced navigation system to verify and assess agent data confidentiality.  ...  For managing trust and reputation, the FIRE+ model [13] incorporated information from multiple sources to manage trust and reputation and to comprehensively assess agent performance in open systems.  ... 
doi:10.3390/app9235111 fatcat:haqwrh5h2rd3jadassbtnhp3sq

Introduction to Agent Mining Interaction and Integration [chapter]

Longbing Cao
2009 Data Mining and Multi-agent Integration  
The major topics of interest consist of research on individual agents, multi-agent systems (MAS), methodology and techniques, tools and applications.  ...  many aspects, from theoretical, methodological, and experimental to practical issues in developing agent-based computing and agent-oriented intelligent systems, which are a powerful technology for autonomous  ...  The engagement of data mining performance evaluation into agents satisfies the need of agents for knowledge quality and model evaluation, model testing and model comprehension. • Usually DM tools are introduced  ... 
doi:10.1007/978-1-4419-0522-2_1 fatcat:4d4cx7wmvzgejnegoujwhrhs4u

An Autonomic Agent Trust Model for IoT systems

X. Xu, N. Bessis, J. Cao
2013 Procedia Computer Science  
In order to build the credibility protection model for IoT systems, agents and agent platforms have to be built on all nodes.  ...  Introducing the agent technology to build systems could manage resources and regulate actions of node in order to maximize the benefit of the whole IoT system.  ...  Towards a Trusted Hardware Execution environment for Agent In the Agent-based IoT system, we have to embed Agents into sensor nodes.  ... 
doi:10.1016/j.procs.2013.09.016 fatcat:tllssnn5efd2lciw5ywfftca74

An integrated trust and reputation model for open multi-agent systems

Trung Dong Huynh, Nicholas R. Jennings, Nigel R. Shadbolt
2006 Autonomous Agents and Multi-Agent Systems  
Trust and reputation are central to effective interactions in open multi-agent systems (MAS) in which agents, that are owned by a variety of stakeholders, continuously enter and leave the system.  ...  To this end, this paper presents FIRE, a trust and reputation model that integrates a number of information sources to produce a comprehensive assessment of an agent's likely performance in open systems  ...  This paper is a significantly extended version of [14] and [15] .  ... 
doi:10.1007/s10458-005-6825-4 fatcat:azvhdjm45rfvjceavbjhgjcnvu

Application Security Models for Mobile Agent Systems

J. Todd McDonald, Alec Yasinsac
2006 Electronical Notes in Theoretical Computer Science  
We develop application security models that capture initial trust relationships and consider their use for mobile agent security.  ...  We introduce a trust framework to reason about application security requirements, trust expression, and agent protection mechanisms.  ...  states, time-limited execution, digital signatures, phoning home, anonymous routing, trusted third parties (TTP), secure multi-party computation (SMC), multi-agent systems (MAS), intermediate data result  ... 
doi:10.1016/j.entcs.2005.09.041 fatcat:m7dmct33z5e3heqrs2jrck7hce

Multi-Agent Systems and Blockchain: Results from a Systematic Literature Review [chapter]

Davide Calvaresi, Alevtina Dubovitskaya, Jean Paul Calbimonte, Kuldar Taveter, Michael Schumacher
2018 Lecture Notes in Computer Science  
Multi-Agent Systems (MAS) technology is widely used for the development of intelligent distributed systems that manage sensitive data (e.g., ambient assisted living, healthcare, energy trading).  ...  To foster accountability and trusted interactions, recent trends advocate the use of blockchain technologies (BCT) for MAS.  ...  smart contract + multi-agent system + trust.  ... 
doi:10.1007/978-3-319-94580-4_9 fatcat:w6bs63qn2ffgpf7v3loborb4i4


S Koriem, R Hassaan
2016 International Journal of Intelligent Computing and Information Sciences  
Policy-based security management has become a growing research area for mobile agent security. To ensure authorization in used to grant privileges to agents according to their roles.  ...  Mobile agent systems (MASs) that travel autonomously through a computer network in order to perform some computation or gather information on behalf of a human user or an application. business applications  ...  MAS model for implementing a secure trading system Public key infrastructure is used in our proposed model by all parties to achieve two based security management has become a growing research area for  ... 
doi:10.21608/ijicis.2016.10011 fatcat:zskg4ojoxrhdrojvekqg3vfacy
« Previous Showing results 1 — 15 out of 56,087 results