메뉴 건너뛰기




Volumn 3477, Issue , 2005, Pages 372-383

Combining trust and risk to reduce the cost of attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER CRIME; COMPUTER SIMULATION; DECISION MAKING; INFORMATION MANAGEMENT; RISK ASSESSMENT;

EID: 24944581002     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11429760_26     Document Type: Conference Paper
Times cited : (10)

References (22)
  • 3
    • 84957006898 scopus 로고    scopus 로고
    • Access control and trust in the use of widely distributed services
    • Middleware 2001
    • Bacon, J., Moody, K., Yao, W.: Access control and trust in the use of widely distributed services. Middleware 2001, Lecture Notes in Computer Science (2001) 295-310
    • (2001) Lecture Notes in Computer Science , pp. 295-310
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 7
    • 84982899264 scopus 로고    scopus 로고
    • The role of trust management in distributed systems security
    • Springer-Verlag
    • Blaze, M., Feigenbaum, J., Keromytis, A.D.: The role of trust management in distributed systems security. In: Secure Internet Programming, Springer-Verlag (1999) 185-210
    • (1999) Secure Internet Programming , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Keromytis, A.D.3
  • 10
    • 2442549069 scopus 로고    scopus 로고
    • Using trust for secure collaboration in uncertain environments
    • Cahill, V., et al.: Using trust for secure collaboration in uncertain environments. IEEE Pervasive Computing Magazine 2 (2003) 52-61
    • (2003) IEEE Pervasive Computing Magazine , vol.2 , pp. 52-61
    • Cahill, V.1
  • 11
    • 84955566566 scopus 로고    scopus 로고
    • A privacy-enhanced peer-to-peer reputation system
    • Proceedings of the 4th International Conference on Electronic Commerce and Web Technologies, EC-Web 2003. Prague, Czech Republic, Springer-Verlag September
    • Kinateder, M., Pearson, S.: A privacy-enhanced peer-to-peer reputation system. In: Proceedings of the 4th International Conference on Electronic Commerce and Web Technologies, EC-Web 2003. LNCS 2738, Prague, Czech Republic, Springer-Verlag (September 2003) 206-215
    • (2003) LNCS , vol.2738 , pp. 206-215
    • Kinateder, M.1    Pearson, S.2
  • 17
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Lee, W., Stolfo, S.: A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security 3 (2000) 227-261
    • (2000) ACM Transactions on Information and System Security , vol.3 , pp. 227-261
    • Lee, W.1    Stolfo, S.2
  • 18
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • 1st International Workshop on Peer-to-Peer Systems (IPTPS'02). Springer-Verlag
    • Douceur, J.: The sybil attack. In: 1st International Workshop on Peer-to-Peer Systems (IPTPS'02). LNCS 2429, Springer-Verlag (2002) 251-260
    • (2002) LNCS , vol.2429 , pp. 251-260
    • Douceur, J.1
  • 20
    • 17844403684 scopus 로고    scopus 로고
    • Dynamics of reputation
    • Publications in Telecommunications Software and Multimedia, Helsinki, Finland, Helsinki University of Technology
    • Cvrček, D.: Dynamics of reputation. In: Proc. of the Ninth Nordic Workshop on Secure IT Systems. Publications in Telecommunications Software and Multimedia, Helsinki, Finland, Helsinki University of Technology (2004) 1-7
    • (2004) Proc. of the Ninth Nordic Workshop on Secure IT Systems , pp. 1-7
    • Cvrček, D.1
  • 21
    • 0036783876 scopus 로고    scopus 로고
    • The consensus operator for combining beliefs
    • Jøsang, A.: The consensus operator for combining beliefs. Artificial Intelligence Journal 141 (2002) 157-170
    • (2002) Artificial Intelligence Journal , vol.141 , pp. 157-170
    • Jøsang, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.