Bargaining towards collusion
نویسندگان
چکیده
منابع مشابه
Bargaining and collusion in a regulatory relationship
We investigate regulation as the outcome of a bargaining process between a regulator and a regulated firm. The regulator is required to monitor the firm’s costs and reveal its information to a political principal (Congress). In this setting, we explore the scope for collusion between the regulator and the firm, which results in the manipulation of the regulator’s report on the firm’s costs to C...
متن کاملCollusion, Exclusion, and Inclusion in Random-Order Bargaining
This paper examines the profitability of three types of integration in a cooperative game solved by a random-order value (e.g. the Shapley value). Collusion between players i and j is a contract merging their resources in the hands of one of them, say i . This contract can be represented as a combination of exclusion, which lets i exclude j’s resource but not use it himself, and inclusion, whic...
متن کاملTowards Swift and Accurate Collusion Detection
Collusion is covert co-operation between participants of a game. It poses serious technical, game design, and communal problems to multiplayer games that do not allow the players to share knowledge or resources with other players. In this paper, we review different types of collusion and introduce two measures for collusion detection. We also propose a model and a simple game, implemented in a ...
متن کاملTowards Automated Android App Collusion Detection
Android OS supports multiple communication methods between apps. This opens the possibility to carry out threats in a collaborative fashion, c.f. the Soundcomber example from 2011. In this paper we provide a concise definition of collusion and report on a number of automated detection approaches, developed in co-operation with Intel Security.
متن کاملTowards full collusion resistant ID-based establishment of pairwise keys
Usually a communication link is secured by means of a symmetric-key algorithm. For that, a method is required to securely establish a symmetric-key for that algorithm. This old problem is still relevant and of paramount importance both in existing computer networks and new large-scale ubiquitous systems comprising resource-constrained devices. Identity-based pairwise key agreement allows for th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Oxonomics
سال: 2008
ISSN: 1752-5195,1752-5209
DOI: 10.1111/j.1752-5209.2008.00020.x