-
1
-
-
33846655598
-
-
Anderson J P. Computer Security Technology Planning Study, ESD-TR-73-51, I, AD-758 206, ESD/AFSC, Hanscom AFB, Bedford, MA., October, 1972
-
Anderson J P. Computer Security Technology Planning Study, ESD-TR-73-51, Vol. I, AD-758 206, ESD/AFSC, Hanscom AFB, Bedford, MA., October, 1972
-
-
-
-
2
-
-
33846660918
-
-
ISO/IEC. Information Technology-Security Techniques-Evaluation Criteria for IT Security, Part 1: Introduction and General Model. 2nd ed. 2005-10-01 (available at URL: http://standards.iso.org/ittf/PubliclyAvailableStandards/ c040612_ ISO_IEC_15408-1_2005(E).zip, accessed on April 14, 2006)
-
ISO/IEC. Information Technology-Security Techniques-Evaluation Criteria for IT Security, Part 1: Introduction and General Model. 2nd ed. 2005-10-01 (available at URL: http://standards.iso.org/ittf/PubliclyAvailableStandards/ c040612_ ISO_IEC_15408-1_2005(E).zip, accessed on April 14, 2006)
-
-
-
-
3
-
-
33846696268
-
-
Trusted Computing Group, 28 April, available at URL:, accessed on April 14, 2006
-
Trusted Computing Group. TCG Architecture Overview. V1. 2, 28 April 2004 (available at URL: https://www.trustedcomputinggroup.org/specs/ IWG/TCG_1_0_Architccture_Overview.pdf, accessed on April 14, 2006)
-
(2004)
TCG Architecture Overview
, vol.V1
, pp. 2
-
-
-
4
-
-
33846693585
-
-
Gates B. Trustworthy Computing. Wired News, Jan. 17, 2002 (available at URL: http://www.wired.com/news/business/0,1367,49826,00.html, accessed on April 14, 2006)
-
Gates B. Trustworthy Computing. Wired News, Jan. 17, 2002 (available at URL: http://www.wired.com/news/business/0,1367,49826,00.html, accessed on April 14, 2006)
-
-
-
-
5
-
-
20444411497
-
Research on trustworthy networks
-
Lin C, Peng X H. Research on trustworthy networks. Chin J Comp (in Chinese), 2005, 28(5): 751-758
-
(2005)
Chin J Comp (in Chinese)
, vol.28
, Issue.5
, pp. 751-758
-
-
Lin, C.1
Peng, X.H.2
-
6
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Algirdas A, Jean-Claude L, Brian R, et al. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11-33
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Algirdas, A.1
Jean-Claude, L.2
Brian, R.3
-
7
-
-
0002819636
-
Trust online
-
Friedman B, Kahn P H Jr, Howe D C. Trust online. Communications of the ACM, 2000, 43(12): 34-40
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 34-40
-
-
Friedman, B.1
Kahn Jr, P.H.2
Howe, D.C.3
-
8
-
-
33846681812
-
Distributed computing
-
available at URL:, accessed on April 14, 2006
-
Lazowska E D, Patterson D A. Distributed computing. Science, 2005, 308(6) (available at URL: http://www.sciencemag.org/sciext/computers/, accessed on April 14, 2006)
-
(2005)
Science
, vol.308
, Issue.6
-
-
Lazowska, E.D.1
Patterson, D.A.2
-
10
-
-
0014413249
-
The tragedy of the commons
-
Hardin. The tragedy of the commons. Science, 1968, 162: 1243-1248
-
(1968)
Science
, vol.162
, pp. 1243-1248
-
-
Hardin1
-
11
-
-
7944219798
-
Quantifying disincentives in peer-to-peer networks
-
Proceeding of Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA: Springer-Verlag
-
Feldmany M, Laiz K. Quantifying disincentives in peer-to-peer networks. In: Proceeding of Workshop on Economics of Peer-to-Peer Systems. LNCS 2735. Berkeley, CA: Springer-Verlag, 2003. 117-122
-
(2003)
LNCS
, vol.2735
, pp. 117-122
-
-
Feldmany, M.1
Laiz, K.2
-
12
-
-
33646162859
-
Towards more controllable and practical delegation
-
Mathematical Methods, Models and Architectures for Computer Networks Security Workshop MMM-ACNS'05, St. Petersburg, Russia
-
Yin G, Wang H M, Shi D X, et al. Towards more controllable and practical delegation. In: Mathematical Methods, Models and Architectures for Computer Networks Security Workshop (MMM-ACNS'05), St. Petersburg, Russia, LNCS 3685, 2005, 245-258
-
(2005)
LNCS
, vol.3685
, pp. 245-258
-
-
Yin, G.1
Wang, H.M.2
Shi, D.X.3
-
14
-
-
33846661870
-
-
Obreiter P, Nimis J. A Taxonomy of incentive patterns - the design space of incentives for cooperation. In: Proc. of the Second International Workshop on Agents and P2P Computing. LNCS 2872. Melbourne: Springer-Verlag, 2003. 678-685
-
Obreiter P, Nimis J. A Taxonomy of incentive patterns - the design space of incentives for cooperation. In: Proc. of the Second International Workshop on Agents and P2P Computing. LNCS 2872. Melbourne: Springer-Verlag, 2003. 678-685
-
-
-
-
15
-
-
84949478858
-
Incentives for sharing in peer-to-peer networks
-
Proc. of the Third ACM Conference on Electronic Commerce, Tampa, Florida: Springer-Verlag
-
Golle P, Leyton-Brown K, Incentives for sharing in peer-to-peer networks. In: Proc. of the Third ACM Conference on Electronic Commerce. LNCS 2232. Tampa, Florida: Springer-Verlag, 2001. 75-82.
-
(2001)
LNCS
, vol.2232
, pp. 75-82
-
-
Golle, P.1
Leyton-Brown, K.2
-
17
-
-
0029700344
-
Decentralized trust management
-
Oakland, CA
-
Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: IEEE Symposium on Security and Privacy, Oakland, CA 1996, 164-173
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
18
-
-
34249870744
-
RFC 2704: The KeyNote trust management system version 2, Network Working Group
-
September
-
Blaze M, Feigenbaum J, Ioannidis J, et al. RFC 2704: The KeyNote trust management system version 2, Network Working Group, IETF, September, 1999
-
(1999)
IETF
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
-
22
-
-
33846659225
-
Cassandra: Flexible trust management, applied to electronic health records
-
Asilomar, Pacific Grove, CA, USA, June
-
Moritz Y B, Peter S. Cassandra: Flexible trust management, applied to electronic health records. In: Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW'04), Asilomar, Pacific Grove, CA, USA, June 2004, 10-13
-
(2004)
Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW'04)
, pp. 10-13
-
-
Moritz, Y.B.1
Peter, S.2
-
23
-
-
33846657628
-
-
Xu F. Trust management in open coordination software environment (in Chinese). PhD Thesis, Nanjing: Nanjing University, 2003
-
Xu F. Trust management in open coordination software environment (in Chinese). PhD Thesis, Nanjing: Nanjing University, 2003
-
-
-
-
24
-
-
33744497855
-
Delegation depth control in trust-management system
-
Taipei, Taiwan, March
-
Hong F, Zhu X, Wang S B. Delegation depth control in trust-management system. In: Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA'05), Taipei, Taiwan, March 2005, 411-414
-
(2005)
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA'05)
, pp. 411-414
-
-
Hong, F.1
Zhu, X.2
Wang, S.B.3
-
26
-
-
33846695319
-
Twenty-five years of fault-tolerant computing
-
Min Y H. Twenty-five years of fault-tolerant computing. Chin J Comp (in Chinese), 1995, 18(12): 930-943
-
(1995)
Chin J Comp (in Chinese)
, vol.18
, Issue.12
, pp. 930-943
-
-
Min, Y.H.1
-
27
-
-
33846671307
-
-
OMG. Common Object Request Broker Architecture (CORBA), v2.6. 2001. 12
-
OMG. Common Object Request Broker Architecture (CORBA), v2.6. 2001. 12
-
-
-
-
28
-
-
45449110880
-
Middleware for embedded adaptive dependability
-
Austin, TX, December
-
Narasimhan P, Reverte C F, Ratanotayanon S, et al. Middleware for embedded adaptive dependability. In: Proc. of IEEE Workshop on Large Scale Real-Time and Embedded Systems, Austin, TX, December 2002
-
(2002)
Proc. of IEEE Workshop on Large Scale Real-Time and Embedded Systems
-
-
Narasimhan, P.1
Reverte, C.F.2
Ratanotayanon, S.3
-
30
-
-
0036982153
-
Distributed Algorithmic Mechanism Design: Recent Results and Future Directions
-
New York: ACM Press
-
Feigenbaum J, Papadimitriou C, Shenker S, Distributed Algorithmic Mechanism Design: Recent Results and Future Directions, Proceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, New York: ACM Press, 2002. 1-13
-
(2002)
Proceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications
, pp. 1-13
-
-
Feigenbaum, J.1
Papadimitriou, C.2
Shenker, S.3
-
32
-
-
0013077453
-
Biased replacement policies for web caches: Differential quality-of-service and aggregate user value
-
San Diego, California, March
-
Kelly T, Chan Y M, Jamin S, et al. Biased replacement policies for web caches: Differential quality-of-service and aggregate user value. In: Proceedings of the 4th International Web Caching Workshop, San Diego, California, March 1999, 1-10
-
(1999)
Proceedings of the 4th International Web Caching Workshop
, pp. 1-10
-
-
Kelly, T.1
Chan, Y.M.2
Jamin, S.3
-
33
-
-
0033903726
-
Supporting trust in virtual communities
-
Maui, Hawaii, IEEE Computer Society, January
-
Abdul-Rahman A, Hailes S. Supporting trust in virtual communities. In: Proc. of 33rd Hawaii International Conference on System Sciences, Maui, Hawaii, IEEE Computer Society, January 2000
-
(2000)
Proc. of 33rd Hawaii International Conference on System Sciences
-
-
Abdul-Rahman, A.1
Hailes, S.2
-
34
-
-
84880467894
-
The EigenTrust Algorithm for Reputation Management in P2P Networks
-
Budapest, HUNGARY, ACM, May
-
Kamvar S D, Schlosser M T, Garcia-Molina H. The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proc. of the 20th International World Wide Web Conference (WWW2003), Budapest, HUNGARY, ACM, May 2003
-
(2003)
Proc. of the 20th International World Wide Web Conference (WWW2003)
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
35
-
-
30044436588
-
Content availability, pollution and poisoning in file sharing peer-to-peer networks
-
Hong Kong, ACM
-
Christin N, Weigend A, Chuang J. Content availability, pollution and poisoning in file sharing peer-to-peer networks. In: Proceedings of ACM Conference on Electronic Commerce (EC'05), Hong Kong, ACM, 2005. 68-77
-
(2005)
Proceedings of ACM Conference on Electronic Commerce (EC'05)
, pp. 68-77
-
-
Christin, N.1
Weigend, A.2
Chuang, J.3
-
36
-
-
30044435166
-
Self-selection, slipping, salvaging, slacking, and stoning: The impacts of negative feedback at eBay
-
Hong Kong, ACM
-
Khopkar T, Li X, Resnick P. Self-selection, slipping, salvaging, slacking, and stoning: the impacts of negative feedback at eBay. In: Proceedings of ACM Conference on Electronic Commerce (EC'05), Hong Kong, ACM, 2005. 223-231
-
(2005)
Proceedings of ACM Conference on Electronic Commerce (EC'05)
, pp. 223-231
-
-
Khopkar, T.1
Li, X.2
Resnick, P.3
|