Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 10 of 10.

Add to Quick Collection   All 10 Results

  • First
  • Previous
  • 1
  • Next
  • Last
Sort:
 Add All Items to Quick Collection
Date: 2010
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/110253
Description: In this paper, we develop an option valuation model in the context of a discrete-time multivariate Markov chain model using the Esscher transform. The multivariate Markov chain provides a flexible way ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2007
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/26066
Description: We propose a hybrid trust model for enhancing security in distributed applications by combining the "hard" and "soft" trust relationships. The motivation is to compensate for the drawbacks associated ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2007
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/26036
Description: In general, in most trust evaluation systems, the evaluation of a target party under investigation relies on the trust ratings from responding peers/parties who have direct interactions with the targe ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2007
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/25913
Description: In both e-commerce (EC) and service-oriented computing (SOC) environments, sellers or service providers interact with customers or service clients for services or transactions. From the point view of ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2007
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/24030
Description: Recently several trust and reputation models have been proposed to enhance the security of mobile ad hoc networks. In these models, recommendations are circulated by forwarding explicit messages or in ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2007
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/25721
Description: The concept of trusted computing technology is becoming significant in that such technologies are being increasingly available in PCs and mobile devices. With the advent of this technology, one can mo ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/17730
Description: In stream authentication protocols used for large-scale data dissemination in autonomous systems, authentication is based on the timing of the publication of keys, and depends on trust of the receiver ... More
Full Text: Full Text
Reviewed: Reviewed
Authors: Wang, Yan | Lin, Fu-ren
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/17570
Description: As peer-to-peer (P2P) e-commerce environments lack central management, prior to new transactions with an unknown peer, the trust evaluation becomes a very important concern, which relies on the transa ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/18297
Description: The mobile agent computing model violates some of the fundamental assumptions of conventional security techniques. Consequently, this has rendered many of the existing conventional security countermea ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2005
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/18787
Description: In peer-to-peer (P2P) environments, a peer needs to interact with unknown peers for the services provided. This requires the trust evaluation prior to and posterior to interactions. This paper present ... More
Full Text: Full Text
Reviewed: Reviewed
  • First
  • Previous
  • 1
  • Next
  • Last