메뉴 건너뛰기




Volumn , Issue , 2005, Pages 260-269

A framework for concrete reputation-systems with applications to history-based access control

Author keywords

History based access control; Model checking; Reputation; Temporal logic; Trust management

Indexed keywords

COMPUTER SYSTEMS PROGRAMMING; DECISION MAKING; INFORMATION MANAGEMENT; PARAMETER ESTIMATION; PROBLEM SOLVING; SECURITY SYSTEMS;

EID: 33745725093     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1102120.1102155     Document Type: Conference Paper
Times cited : (27)

References (30)
  • 2
    • 84982899264 scopus 로고    scopus 로고
    • The role of trust management in distributed systems security
    • J. Vitek and C. D. Jensen, editors, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Springer
    • M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis, The role of trust management in distributed systems security. In J. Vitek and C. D. Jensen, editors, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, volume 1603 of Lecture Notes in Computer Science, pages 185-210. Springer, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1603 , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.D.4
  • 4
    • 2442549069 scopus 로고    scopus 로고
    • Using trust for secure collaboration in uncertain environments
    • V. Cahill and E. Gray et al. Using trust for secure collaboration in uncertain environments. IEEE Pervasive Computing, 2(3):52-61, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.3 , pp. 52-61
    • Cahill, V.1    Gray, E.2
  • 5
    • 33745772018 scopus 로고    scopus 로고
    • V. Cahill and J.-M. Seigneur. The SECURE website. http://secure.dsg.cs.tcd.ie, 2004.
    • (2004)
    • Cahill, V.1    Seigneur, J.-M.2
  • 8
    • 33745778086 scopus 로고    scopus 로고
    • eBay Inc. The eBay website. http://www.ebay.com.
  • 13
    • 84888249425 scopus 로고    scopus 로고
    • Synthesizing monitors for safety properties
    • Tools and Algorithms for the Construction and Analysis of Systems : 8th International Conference (TACAS'02), Springer-Verlag
    • K. Havelund and G. Roşu. Synthesizing monitors for safety properties. In Tools and Algorithms for the Construction and Analysis of Systems : 8th International Conference (TACAS'02), volume 2280 of Lecture Notes in Computer Science, pages 342-356. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2280 , pp. 342-356
    • Havelund, K.1    Roşu, G.2
  • 15
    • 24944440539 scopus 로고    scopus 로고
    • A survey of trust and reputation for online service provision
    • to appear, preprint
    • A. Jøsang, R. Ismail, and C. Boyd. A survey of trust and reputation for online service provision. Decision Support Systems, (to appear, preprint available online: http://security.dstc.edu.au/staff/ajosang), 2004.
    • (2004) Decision Support Systems
    • Jøsang, A.1    Ismail, R.2    Boyd, C.3
  • 17
    • 33745770700 scopus 로고    scopus 로고
    • A framework for concrete reputation-systems
    • BRIGS, University of Aarhus, July
    • K. Krukow, M. Nielsen, and V. Sassone. A framework for concrete reputation-systems. Technical Report RS-05-23, BRIGS, University of Aarhus, July 2005.
    • (2005) Technical Report RS-05-23
    • Krukow, K.1    Nielsen, M.2    Sassone, V.3
  • 21
    • 27944466459 scopus 로고    scopus 로고
    • On the formal modelling of trust in reputation-based systems
    • J. Karhumäki, H. Maurer, G. Paun, and G. Rozenberg, editors, Theory Is Forever: Essays Dedicated to Arto Salomaa, Springer Verlag
    • M. Nielsen and K. Krukow. On the formal modelling of trust in reputation-based systems. In J. Karhumäki, H. Maurer, G. Paun, and G. Rozenberg, editors, Theory Is Forever: Essays Dedicated to Arto Salomaa, volume 3113 of Lecture Notes in Computer Science, pages 192-204. Springer Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3113 , pp. 192-204
    • Nielsen, M.1    Krukow, K.2
  • 26
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • F. B. Schneider. Enforceable security policies. Journal of the ACM, 3(1):30-50, 2000.
    • (2000) Journal of the ACM , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.B.1
  • 28
    • 0022092438 scopus 로고
    • The complexity of propositional linear temporal logics
    • A. P. Sistla and E. M. Clarke. The complexity of propositional linear temporal logics. Journal of the ACM, 32(3):733-749, 1985.
    • (1985) Journal of the ACM , vol.32 , Issue.3 , pp. 733-749
    • Sistla, A.P.1    Clarke, E.M.2
  • 30
    • 0002659052 scopus 로고
    • Models for concurrency
    • S. Abramsky, D. M. Gabbay, and T. S. E. Maibaum, editors, Oxford University Press
    • G. Winskel and M. Nielsen. Models for concurrency. In S. Abramsky, D. M. Gabbay, and T. S. E. Maibaum, editors, Handbook of Logic in Computer Science, volume 4, pages 1-148. Oxford University Press, 1995.
    • (1995) Handbook of Logic in Computer Science , vol.4 , pp. 1-148
    • Winskel, G.1    Nielsen, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.