-
1
-
-
1142301944
-
Model driven trust negotiation for web services
-
November-December
-
Skogsrud, H., Benatallah, B., Casati, F., "Model Driven Trust Negotiation for Web Services", IEEE Internet Computing, November-December 2003, Pages 45-52.
-
(2003)
IEEE Internet Computing
, pp. 45-52
-
-
Skogsrud, H.1
Benatallah, B.2
Casati, F.3
-
2
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
February
-
Yu, T., Winslett, M., Seamons, K. E., "Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation", ACM Transactions in Information Systems Security, Vol. 6, No.l, February 2003, Pages 1-42.
-
(2003)
ACM Transactions in Information Systems Security
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
3
-
-
3142676730
-
Trust-X: A peer to peer framework for trust establishment
-
July
-
Bertino, E., Ferrari, E., Squicciarani, A.C., "Trust-X: A Peer to Peer Framework for Trust Establishment", IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 7, July 2004, Pages 827-842
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarani, A.C.3
-
4
-
-
20344371959
-
Engineering human trust in mobile system collaborations
-
Oct 31-Nov 6, Newport Beach, CA
-
Capra, L., "Engineering Human Trust in Mobile System Collaborations", in Proceedings of ACM SIGSOFT/FSE-12, Pages 107-116, Oct 31-Nov 6, 2004, Newport Beach, CA
-
(2004)
Proceedings of ACM SIGSOFT/FSE-12
, pp. 107-116
-
-
Capra, L.1
-
5
-
-
0035747559
-
Managing trust in a Peer-2-Peer information system
-
November 5-10, Atlanta, GA
-
Aberer, K., Despotovic, Z., "Managing Trust in a Peer-2-Peer Information System", in Proceedings of ACM CIKM'0l, Pages 310-317, November 5-10, 2001, Atlanta, GA
-
(2001)
Proceedings of ACM CIKM'0l
, pp. 310-317
-
-
Aberer, K.1
Despotovic, Z.2
-
6
-
-
33845203069
-
A trust model of P2P system based on confirmation theory
-
January
-
Xianliang, H. M. L., Chuan, Z.-x-Z., "A trust model of P2P system based on confirmation theory", ACM SIGOPS Operating Systems Review, Volume 39, Issue 1 (January 2005), Pages: 56-62
-
(2005)
ACM SIGOPS Operating Systems Review
, vol.39
, Issue.1
, pp. 56-62
-
-
Xianliang, H.M.L.1
Chuan, Z.-X.-Z.2
-
7
-
-
0038717615
-
A reputation system for Peer-to-Peer networks
-
June 1-3, Monterey, California, USA
-
Gupta, M., Judge, P., Ammar, M., "A Reputation System for Peer-to-Peer Networks", in Proceedings of NOSSDAV03, June 1-3, 2003, Monterey, California, USA.
-
(2003)
Proceedings of NOSSDAV03
-
-
Gupta, M.1
Judge, P.2
Ammar, M.3
-
8
-
-
0038011186
-
A reputation-based approach for choosing reliable resources in Peer-to-Peer networks
-
November 18-22, Washington, DC, USA
-
Damiani, E., di Vimercati, S. de C., Paraboschi, S., Samarati, P., Violante, F., "A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks", CCS'02, November 18-22, 2002, Washington, DC, USA.
-
(2002)
CCS'02
-
-
Damiani, E.1
Di Vimercati, S.D.C.2
Paraboschi, S.3
Samarati, P.4
Violante, F.5
-
9
-
-
13244299177
-
Collaborative automated trust negotiation in Peer-to-Peer systems
-
25-27 Aug. 2004
-
Ye, S., Makedon, F., Ford, J., "Collaborative Automated Trust Negotiation in Peer-to-Peer Systems", in Proceedings of the Fourth International Conference on Peer-to-Peer Computing, 2004. 25-27 Aug. 2004 Page(s):108-115
-
(2004)
Proceedings of the Fourth International Conference on Peer-to-Peer Computing
, pp. 108-115
-
-
Ye, S.1
Makedon, F.2
Ford, J.3
-
10
-
-
10944261046
-
Negotiating context information in context-aware systems
-
Nov-Dec
-
Khedr, M., Karmouch, A., "Negotiating context Information in Context-Aware Systems", IEEE Intelligent Systems, Volume 19, Issue 6, Nov-Dec 2004 Page(s):21-29
-
(2004)
IEEE Intelligent Systems
, vol.19
, Issue.6
, pp. 21-29
-
-
Khedr, M.1
Karmouch, A.2
-
11
-
-
30644473909
-
Adaptive trust negotiation and access control
-
June 1-3, Stockholm, Sweden
-
Ryutov, T., Zhou, L., Neuman, C., Leithead, T., Seamons, K. E., "Adaptive Trust Negotiation and Access Control", in Proceedings of SACMAT 2005, June 1-3, 2005, Stockholm, Sweden, Page(s): 139-146
-
(2005)
Proceedings of SACMAT 2005
, pp. 139-146
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Leithead, T.4
Seamons, K.E.5
-
13
-
-
35048858013
-
Fuzzy trust integration for security enforcement in grid computing
-
Wuhan, China. Oct. 18-20
-
Song, S., Hwang, K., Macwan, M., "Fuzzy Trust Integration for Security Enforcement in Grid Computing," in Proceedings of IFIP International Symposium on Network and Parallel Computing (NPC-2004), Wuhan, China. Oct. 18-20, 2004. pp. 9-21.
-
(2004)
Proceedings of IFIP International Symposium on Network and Parallel Computing (NPC-2004)
, pp. 9-21
-
-
Song, S.1
Hwang, K.2
Macwan, M.3
-
14
-
-
84887937075
-
Towards trust-aware resource management in grid computing systems
-
18-21 Aug.
-
Azzedin, F., Maheswaran, M., "Towards Trust-Aware Resource Management in Grid Computing Systems", in Proceedings of the 2 nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02), 18-21 Aug. 2002, Page(s):47-54
-
(2002)
Proceedings of the 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02)
, pp. 47-54
-
-
Azzedin, F.1
Maheswaran, M.2
-
15
-
-
2942616805
-
Untraceable secret credentials: Trust establishment with privacy
-
14-17 March
-
Bussard, L., Roudier, Y., Molva, R., "Untraceable Secret Credentials: Trust Establishment with Privacy", in Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW '04), 14-17 March 2004 Page(s): 122-126
-
(2004)
Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW '04)
, pp. 122-126
-
-
Bussard, L.1
Roudier, Y.2
Molva, R.3
-
16
-
-
84938208411
-
Automated cross-organisational trust establishment on extranets
-
29-30 Jan.
-
Au, R., Looi, M., Ashley, P., "Automated Cross-organisational Trust Establishment on Extranets", in Proceedings of Workshop on Information Technology for Virtual Enterprises, 2001. ITVE 2001, 29-30 Jan. 2001 Page(s):3-11
-
(2001)
Proceedings of Workshop on Information Technology for Virtual Enterprises, 2001. ITVE 2001
, pp. 3-11
-
-
Au, R.1
Looi, M.2
Ashley, P.3
-
17
-
-
32844472422
-
Trust in recommender systems
-
January 9-12, San Diego, California
-
O'Donovan, J., Smyth, B., "Trust in Recommender Systems", in Proceedings of IUI'05, January 9-12, 2005, San Diego, California, Page(s): 167-174
-
(2005)
Proceedings of IUI'05
, pp. 167-174
-
-
O'Donovan, J.1
Smyth, B.2
-
18
-
-
5544326539
-
Trust for ubiquitous, transparent collaboration
-
Kluwer Academic Publishers
-
Shand, B., Dimmock, N., Bacon, J., "Trust for Ubiquitous, Transparent Collaboration", Wireless Networks 10, 711-721, 2004, Kluwer Academic Publishers.
-
(2004)
Wireless Networks
, vol.10
, pp. 711-721
-
-
Shand, B.1
Dimmock, N.2
Bacon, J.3
-
19
-
-
0033893895
-
E-commerce trust metrics and models
-
IEEE March-April
-
Manchala, D. W., "E-Commerce Trust Metrics and Models", Internet Computing, IEEE Volume 4, Issue 2, March-April 2000 Page(s):36-44
-
(2000)
Internet Computing
, vol.4
, Issue.2
, pp. 36-44
-
-
Manchala, D.W.1
-
20
-
-
0242721789
-
Trust metrics for survivable security systems
-
5-8 Oct. 2003
-
Daskapan, S., Vree, W. G., Eldin, A. A., "Trust Metrics for survivable security systems", in Proceedings of IEEE International Conference on Systems, Man and Cybernetics, 2003. Volume 4, 5-8 Oct. 2003 Page(s):3128-3135
-
(2003)
Proceedings of IEEE International Conference on Systems, Man and Cybernetics
, vol.4
, pp. 3128-3135
-
-
Daskapan, S.1
Vree, W.G.2
Eldin, A.A.3
-
21
-
-
33745901764
-
Impact of SoA on enterprie information archietctures
-
June 14-16, Baltimore, Maryland, USA
-
Patrick, P., "Impact of SoA on Enterprie Information Archietctures", Proceedings of SIGMOD 2005, June 14-16, 2005, Baltimore, Maryland, USA.
-
(2005)
Proceedings of SIGMOD 2005
-
-
Patrick, P.1
-
22
-
-
10644222474
-
Overview of some patterns for architecting and managing services
-
August
-
Benatallah, B., Dumas, M., Fauvet, M.-C., Rabhi, F. A., Sheng, Q.-Z., "Overview of some Patterns for Architecting and Managing services", ACM SIGecom Exchanges, Vol. 3, No. 3, August 2002, Pages 9-16.
-
(2002)
ACM SIGecom Exchanges
, vol.3
, Issue.3
, pp. 9-16
-
-
Benatallah, B.1
Dumas, M.2
Fauvet, M.-C.3
Rabhi, F.A.4
Sheng, Q.-Z.5
-
23
-
-
1542347194
-
Modeling and validation of service-oriented architectures: Application vs. style
-
September 1-5, Helsinki, Finland
-
Baresi, L., Heckel, R., Thone, S., Varro, D., "Modeling and Validation of Service-Oriented Architectures: Application vs. Style", Proceedings of ESEC/FSE'03, September 1-5, 2003, Helsinki, Finland.
-
(2003)
Proceedings of ESEC/FSE'03
-
-
Baresi, L.1
Heckel, R.2
Thone, S.3
Varro, D.4
-
24
-
-
11044223672
-
Access-control language for Multidomain environments
-
Nov.-Dec.
-
Joshi, J.B.D., Bhatti, R., Bertino, E., Ghafoor, A., "Access-control language for Multidomain environments", IEEE Internet Computing, Volume 8, Issue 6, Nov.-Dec. 2004 Page(s):40-50
-
(2004)
IEEE Internet Computing
, vol.8
, Issue.6
, pp. 40-50
-
-
Joshi, J.B.D.1
Bhatti, R.2
Bertino, E.3
Ghafoor, A.4
-
25
-
-
17444406680
-
A generalized temporal role-based access control model
-
Jan
-
Joshi, J.B.D.; Bertino, E.; Latif, U.; Ghafoor, A., "A generalized temporal role-based access control model", IEEE Transactions on Knowledge and Data Engineering, Volume 17, Issue I, Jan 2005 Page(s):4-23
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.B.D.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
27
-
-
0038150613
-
An internet attribute certificate profile for authorization
-
April
-
Farrell, S., Housley, R., "An Internet Attribute Certificate Profile for Authorization", RFC 3281, April 2002.
-
(2002)
RFC
, vol.3281
-
-
Farrell, S.1
Housley, R.2
-
28
-
-
84858920351
-
LoT-RBAC : A location and time-based RBAC model
-
November 20-22, New York City, NY
-
Mohan Chandran, S., Joshi, J. B. D., "LoT-RBAC : A Location and Time-based RBAC Model", Proceedings of 6th International Conference on Web Information Systems Engineering, November 20-22, 2005, New York City, NY.
-
(2005)
Proceedings of 6th International Conference on Web Information Systems Engineering
-
-
Mohan Chandran, S.1
Joshi, J.B.D.2
|