메뉴 건너뛰기




Volumn 49, Issue 6, 2006, Pages 759-773

Trustworthiness of internet-based software

Author keywords

Internet; IVCE; Software; Trustworthiness

Indexed keywords


EID: 33846653112     PISSN: 10092757     EISSN: 18622836     Source Type: Journal    
DOI: 10.1007/s11432-006-2024-4     Document Type: Article
Times cited : (43)

References (36)
  • 1
    • 33846655598 scopus 로고    scopus 로고
    • Anderson J P. Computer Security Technology Planning Study, ESD-TR-73-51, I, AD-758 206, ESD/AFSC, Hanscom AFB, Bedford, MA., October, 1972
    • Anderson J P. Computer Security Technology Planning Study, ESD-TR-73-51, Vol. I, AD-758 206, ESD/AFSC, Hanscom AFB, Bedford, MA., October, 1972
  • 2
    • 33846660918 scopus 로고    scopus 로고
    • ISO/IEC. Information Technology-Security Techniques-Evaluation Criteria for IT Security, Part 1: Introduction and General Model. 2nd ed. 2005-10-01 (available at URL: http://standards.iso.org/ittf/PubliclyAvailableStandards/ c040612_ ISO_IEC_15408-1_2005(E).zip, accessed on April 14, 2006)
    • ISO/IEC. Information Technology-Security Techniques-Evaluation Criteria for IT Security, Part 1: Introduction and General Model. 2nd ed. 2005-10-01 (available at URL: http://standards.iso.org/ittf/PubliclyAvailableStandards/ c040612_ ISO_IEC_15408-1_2005(E).zip, accessed on April 14, 2006)
  • 3
    • 33846696268 scopus 로고    scopus 로고
    • Trusted Computing Group, 28 April, available at URL:, accessed on April 14, 2006
    • Trusted Computing Group. TCG Architecture Overview. V1. 2, 28 April 2004 (available at URL: https://www.trustedcomputinggroup.org/specs/ IWG/TCG_1_0_Architccture_Overview.pdf, accessed on April 14, 2006)
    • (2004) TCG Architecture Overview , vol.V1 , pp. 2
  • 4
    • 33846693585 scopus 로고    scopus 로고
    • Gates B. Trustworthy Computing. Wired News, Jan. 17, 2002 (available at URL: http://www.wired.com/news/business/0,1367,49826,00.html, accessed on April 14, 2006)
    • Gates B. Trustworthy Computing. Wired News, Jan. 17, 2002 (available at URL: http://www.wired.com/news/business/0,1367,49826,00.html, accessed on April 14, 2006)
  • 5
    • 20444411497 scopus 로고    scopus 로고
    • Research on trustworthy networks
    • Lin C, Peng X H. Research on trustworthy networks. Chin J Comp (in Chinese), 2005, 28(5): 751-758
    • (2005) Chin J Comp (in Chinese) , vol.28 , Issue.5 , pp. 751-758
    • Lin, C.1    Peng, X.H.2
  • 8
    • 33846681812 scopus 로고    scopus 로고
    • Distributed computing
    • available at URL:, accessed on April 14, 2006
    • Lazowska E D, Patterson D A. Distributed computing. Science, 2005, 308(6) (available at URL: http://www.sciencemag.org/sciext/computers/, accessed on April 14, 2006)
    • (2005) Science , vol.308 , Issue.6
    • Lazowska, E.D.1    Patterson, D.A.2
  • 10
    • 0014413249 scopus 로고
    • The tragedy of the commons
    • Hardin. The tragedy of the commons. Science, 1968, 162: 1243-1248
    • (1968) Science , vol.162 , pp. 1243-1248
    • Hardin1
  • 11
    • 7944219798 scopus 로고    scopus 로고
    • Quantifying disincentives in peer-to-peer networks
    • Proceeding of Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA: Springer-Verlag
    • Feldmany M, Laiz K. Quantifying disincentives in peer-to-peer networks. In: Proceeding of Workshop on Economics of Peer-to-Peer Systems. LNCS 2735. Berkeley, CA: Springer-Verlag, 2003. 117-122
    • (2003) LNCS , vol.2735 , pp. 117-122
    • Feldmany, M.1    Laiz, K.2
  • 12
    • 33646162859 scopus 로고    scopus 로고
    • Towards more controllable and practical delegation
    • Mathematical Methods, Models and Architectures for Computer Networks Security Workshop MMM-ACNS'05, St. Petersburg, Russia
    • Yin G, Wang H M, Shi D X, et al. Towards more controllable and practical delegation. In: Mathematical Methods, Models and Architectures for Computer Networks Security Workshop (MMM-ACNS'05), St. Petersburg, Russia, LNCS 3685, 2005, 245-258
    • (2005) LNCS , vol.3685 , pp. 245-258
    • Yin, G.1    Wang, H.M.2    Shi, D.X.3
  • 14
    • 33846661870 scopus 로고    scopus 로고
    • Obreiter P, Nimis J. A Taxonomy of incentive patterns - the design space of incentives for cooperation. In: Proc. of the Second International Workshop on Agents and P2P Computing. LNCS 2872. Melbourne: Springer-Verlag, 2003. 678-685
    • Obreiter P, Nimis J. A Taxonomy of incentive patterns - the design space of incentives for cooperation. In: Proc. of the Second International Workshop on Agents and P2P Computing. LNCS 2872. Melbourne: Springer-Verlag, 2003. 678-685
  • 15
    • 84949478858 scopus 로고    scopus 로고
    • Incentives for sharing in peer-to-peer networks
    • Proc. of the Third ACM Conference on Electronic Commerce, Tampa, Florida: Springer-Verlag
    • Golle P, Leyton-Brown K, Incentives for sharing in peer-to-peer networks. In: Proc. of the Third ACM Conference on Electronic Commerce. LNCS 2232. Tampa, Florida: Springer-Verlag, 2001. 75-82.
    • (2001) LNCS , vol.2232 , pp. 75-82
    • Golle, P.1    Leyton-Brown, K.2
  • 16
  • 18
    • 34249870744 scopus 로고    scopus 로고
    • RFC 2704: The KeyNote trust management system version 2, Network Working Group
    • September
    • Blaze M, Feigenbaum J, Ioannidis J, et al. RFC 2704: The KeyNote trust management system version 2, Network Working Group, IETF, September, 1999
    • (1999) IETF
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3
  • 23
    • 33846657628 scopus 로고    scopus 로고
    • Xu F. Trust management in open coordination software environment (in Chinese). PhD Thesis, Nanjing: Nanjing University, 2003
    • Xu F. Trust management in open coordination software environment (in Chinese). PhD Thesis, Nanjing: Nanjing University, 2003
  • 26
    • 33846695319 scopus 로고
    • Twenty-five years of fault-tolerant computing
    • Min Y H. Twenty-five years of fault-tolerant computing. Chin J Comp (in Chinese), 1995, 18(12): 930-943
    • (1995) Chin J Comp (in Chinese) , vol.18 , Issue.12 , pp. 930-943
    • Min, Y.H.1
  • 27
    • 33846671307 scopus 로고    scopus 로고
    • OMG. Common Object Request Broker Architecture (CORBA), v2.6. 2001. 12
    • OMG. Common Object Request Broker Architecture (CORBA), v2.6. 2001. 12
  • 32
    • 0013077453 scopus 로고    scopus 로고
    • Biased replacement policies for web caches: Differential quality-of-service and aggregate user value
    • San Diego, California, March
    • Kelly T, Chan Y M, Jamin S, et al. Biased replacement policies for web caches: Differential quality-of-service and aggregate user value. In: Proceedings of the 4th International Web Caching Workshop, San Diego, California, March 1999, 1-10
    • (1999) Proceedings of the 4th International Web Caching Workshop , pp. 1-10
    • Kelly, T.1    Chan, Y.M.2    Jamin, S.3
  • 36
    • 30044435166 scopus 로고    scopus 로고
    • Self-selection, slipping, salvaging, slacking, and stoning: The impacts of negative feedback at eBay
    • Hong Kong, ACM
    • Khopkar T, Li X, Resnick P. Self-selection, slipping, salvaging, slacking, and stoning: the impacts of negative feedback at eBay. In: Proceedings of ACM Conference on Electronic Commerce (EC'05), Hong Kong, ACM, 2005. 223-231
    • (2005) Proceedings of ACM Conference on Electronic Commerce (EC'05) , pp. 223-231
    • Khopkar, T.1    Li, X.2    Resnick, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.