메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 142-152

Reasoning about trust groups to coordinate mobile ad-hoc systems

Author keywords

[No Author keywords available]

Indexed keywords

DATA STRUCTURES; MATHEMATICAL MODELS; MIDDLEWARE; MOBILE COMPUTING; RADIO COMMUNICATION;

EID: 33847028388     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECCMW.2005.1588307     Document Type: Conference Paper
Times cited : (5)

References (50)
  • 3
    • 33847020781 scopus 로고    scopus 로고
    • Web Services Description Language (WSDL) Version 2.0 Part 1: Core Language, 2004
    • Web Services Description Language (WSDL) Version 2.0 Part 1: Core Language. http://www.w3.org/TR/wsdl20/, 2004.
  • 8
    • 0242678584 scopus 로고    scopus 로고
    • Self-Organized Public-Key Management for Mobile Ad Hoc Networks
    • S. Capkun, L. Buttyán, and J. Hubaux. Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Trans. on Mobile Computing, 2(1):52-64, 2003.
    • (2003) IEEE Trans. on Mobile Computing , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyán, L.2    Hubaux, J.3
  • 12
    • 0035440934 scopus 로고    scopus 로고
    • The JEDI event-based infrastructure and its application to the development of the OPSS WFMS
    • G. Cugola, E. D. Nitto, and A. Fuggetta. The JEDI event-based infrastructure and its application to the development of the OPSS WFMS. IEEE Transactions on Software Engineering, 27(9):827-850, 2001.
    • (2001) IEEE Transactions on Software Engineering , vol.27 , Issue.9 , pp. 827-850
    • Cugola, G.1    Nitto, E.D.2    Fuggetta, A.3
  • 14
    • 2442549069 scopus 로고    scopus 로고
    • V. C. et. al. Using Trust for Secure Collaboration in Uncertain Environments. IEEE Pervasive Computing Mobile And Ubiquitous Computing, 2(3):52-61, Aug. 2003.
    • V. C. et. al. Using Trust for Secure Collaboration in Uncertain Environments. IEEE Pervasive Computing Mobile And Ubiquitous Computing, 2(3):52-61, Aug. 2003.
  • 17
    • 33847124145 scopus 로고    scopus 로고
    • Architecture and Algorithms for a Distributed Reputation System
    • st International Conference on Trust Management, number in, Heraklion, Crete, Greece, May, Springer-Verlag
    • st International Conference on Trust Management, number 2692 in LNCS, pages 1-16, Heraklion, Crete, Greece, May 2003. Springer-Verlag.
    • (2003) LNCS , vol.2692 , pp. 1-16
    • Kinateder, M.1    Rothermel, K.2
  • 18
    • 0035704362 scopus 로고    scopus 로고
    • Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks
    • Riverside, California, Nov
    • J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In International Conference on Network Protocols (ICNP), pages 251-260, Riverside, California, Nov. 2001.
    • (2001) International Conference on Network Protocols (ICNP) , pp. 251-260
    • Kong, J.1    Zerfos, P.2    Luo, H.3    Lu, S.4    Zhang, L.5
  • 19
    • 33847008265 scopus 로고    scopus 로고
    • Enhanced Reputation Mechanism for Mobile Ad Hoc Networks
    • nd International Conference on Trust Management iTrust, Oxford, UK. Mar
    • nd International Conference on Trust Management (iTrust), volume 2995, pages 48-62. Oxford, UK. Mar. 2004. LNCS.
    • (2004) LNCS , vol.2995 , pp. 48-62
    • Liu, J.1    Issarny, V.2
  • 20
    • 0001528324 scopus 로고
    • Markets and Computation: Agoric Open Systems
    • B. A. Huberman, editor, Elsevier Science Publishers
    • M. S. Miller and K. E. Drexler. Markets and Computation: Agoric Open Systems. In B. A. Huberman, editor, The Ecology of Computation, pages 133-176. Elsevier Science Publishers, 1988.
    • (1988) The Ecology of Computation , pp. 133-176
    • Miller, M.S.1    Drexler, K.E.2
  • 21
    • 35048814480 scopus 로고    scopus 로고
    • Using Coordination Middleware for Location-Aware Computing: A Lime Case Study
    • th International Conference on Coordination Models and Languages Coordination 2004, of, Pisa, Italy, February, Springer-Verlag
    • th International Conference on Coordination Models and Languages (Coordination 2004), volume 2949 of Lecture Notes in Computer Science, pages 263-278. Pisa, Italy, February 2004. Springer-Verlag.
    • (2004) Lecture Notes in Computer Science , vol.2949 , pp. 263-278
    • Murphy, A.1    Picco, G.-P.2
  • 22
    • 35048838557 scopus 로고    scopus 로고
    • nd International Conference on Trust Management (iTrust), 2995, pages 33-47, Oxford, UK, Mar. 2004. LNCS.
    • nd International Conference on Trust Management (iTrust), volume 2995, pages 33-47, Oxford, UK, Mar. 2004. LNCS.
  • 23
    • 85029609685 scopus 로고    scopus 로고
    • Simulated Social Control for Secure Internet Commerce
    • Lake Arrowhead, CA, Sept, ACM Press
    • L. Rasmusson and S. Janson. Simulated Social Control for Secure Internet Commerce. In New Security Paradigms Workshop, pages 18-26, Lake Arrowhead, CA, Sept. 1996. ACM Press.
    • (1996) New Security Paradigms Workshop , pp. 18-26
    • Rasmusson, L.1    Janson, S.2
  • 25
    • 0032074719 scopus 로고    scopus 로고
    • Methods for task allocation via agent coalition formation
    • O. Shehory and S. Kraus. Methods for task allocation via agent coalition formation. Artificial Intelligence, 101:165-200, 1998.
    • (1998) Artificial Intelligence , vol.101 , pp. 165-200
    • Shehory, O.1    Kraus, S.2
  • 26
    • 0034835799 scopus 로고    scopus 로고
    • S. Weeks. Understanding Trust Management Systems. In Proc. IEEE Symposium on Security and Privacy, pages 94-105, Oakland, CA, May 2001. systems software. In Proceedings of IASTED Software Engineering and Applications (SEA'04), Cambridge, MA, Nov 2004.
    • S. Weeks. Understanding Trust Management Systems. In Proc. IEEE Symposium on Security and Privacy, pages 94-105, Oakland", CA, May 2001. systems software. In Proceedings of IASTED Software Engineering and Applications (SEA'04), Cambridge, MA, Nov 2004.
  • 27
    • 0001582379 scopus 로고
    • Missing the boat and sinking the boat: A conceptual model of entrepreneurial risk
    • 50(July, 5S70
    • P. Dickson and J. Giglierano. Missing the boat and sinking the boat: a conceptual model of entrepreneurial risk. J. Mark, 50((July)):5S70, 1986.
    • (1986) J. Mark
    • Dickson, P.1    Giglierano, J.2
  • 29
    • 33847045164 scopus 로고    scopus 로고
    • N. Dimmock, J. Bacon, D. Ingram, and K. Moody. Risk models for trust-based access control. In In Proceedings of the Third Annual Conference on Trust Management (iTrust), 3477 of WCS. Springer-Verlag, May 2005.
    • N. Dimmock, J. Bacon, D. Ingram, and K. Moody. Risk models for trust-based access control. In In Proceedings of the Third Annual Conference on Trust Management (iTrust), Volume 3477 of WCS. Springer-Verlag, May 2005.
  • 32
    • 0011458197 scopus 로고
    • Cincinnati, Ohio: College Division, Soulh-Western Publishing Co
    • M. R. Greene and J. S. Trieschmann. Risk and Insurance. (Cincinnati, Ohio: College Division, Soulh-Western Publishing Co), 1962.
    • (1962) Risk and Insurance
    • Greene, M.R.1    Trieschmann, J.S.2
  • 35
    • 0003954474 scopus 로고    scopus 로고
    • Mobile agent security. NIST special publication 800-19
    • Technical report, National Institute of Standards and Technology
    • W. Jansen and T. Karygiannis. Mobile agent security. NIST special publication 800-19. Technical report, National Institute of Standards and Technology, 1999.
    • (1999)
    • Jansen, W.1    Karygiannis, T.2
  • 36
    • 35048832333 scopus 로고    scopus 로고
    • Analysing the relationship between risk and trust
    • C. D. Jensen, S. Poslad, and T. Dimitrakos, editors, iTrust, of, Springer
    • A. Jøsang and S. L. Presti. Analysing the relationship between risk and trust. In C. D. Jensen, S. Poslad, and T. Dimitrakos, editors, iTrust, volume 2995 of Lecture Notes in Computer Science, pages 135-145. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2995 , pp. 135-145
    • Jøsang, A.1    Presti, S.L.2
  • 39
    • 84982408067 scopus 로고
    • Approximating expected utility by a function of mean and variance
    • available at
    • H. Levy and H. M. Markowtiz. Approximating expected utility by a function of mean and variance. American Economic Review, 69(3):308-17, 1979. available at http://ideas.repec.org/a/aea/aecrev/v69y1979i3p308-17.html.
    • (1979) American Economic Review , vol.69 , Issue.3 , pp. 308-317
    • Levy, H.1    Markowtiz, H.M.2
  • 40
    • 0003839495 scopus 로고
    • Ph.D. Thesis. Department of Mathematics and Computer Science, University of Stirling
    • S. Marsh. Formalising trust as a computational concept. Ph.D. Thesis. Department of Mathematics and Computer Science, University of Stirling, 1994.
    • (1994) Formalising trust as a computational concept
    • Marsh, S.1
  • 41
    • 33847012567 scopus 로고    scopus 로고
    • R. I. Mehr and E. Cammack. Principles of insurance. (Home-wood, IL: Richard D. Irwin), 1961.
    • R. I. Mehr and E. Cammack. Principles of insurance. (Home-wood, IL: Richard D. Irwin), 1961.
  • 45
    • 0036870378 scopus 로고    scopus 로고
    • Building trustworthy software agents
    • A. Patrick. Building trustworthy software agents. IEEE Internet Computing, 6(6):46-53, 2002.
    • (2002) IEEE Internet Computing , vol.6 , Issue.6 , pp. 46-53
    • Patrick, A.1
  • 47
    • 35048864339 scopus 로고    scopus 로고
    • Trading privacy for trust
    • C. D. Jensen, S. Poslad, and T. Dimitrakos, editors, iTrust, of, Springer
    • J.-M. Seigneur and C. D. Jensen. Trading privacy for trust. In C. D. Jensen, S. Poslad, and T. Dimitrakos, editors, iTrust, volume 2995 of Lecture Notes in Computer Science, pages 93-107. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2995 , pp. 93-107
    • Seigneur, J.-M.1    Jensen, C.D.2
  • 49
    • 21844511690 scopus 로고
    • Trust and commitment in the united states and japan
    • T. Yamagishi and M. Yamagishi. Trust and commitment in the united states and japan. Motivation and Emotion, 18(2):129-166, 1994.
    • (1994) Motivation and Emotion , vol.18 , Issue.2 , pp. 129-166
    • Yamagishi, T.1    Yamagishi, M.2
  • 50
    • 26444539660 scopus 로고    scopus 로고
    • Satin: A component model for mobile self organisation
    • R. Meersman and Z. Tari, editors, CoopIS/DOA/ODBASE2, of, Springer
    • S. Zachariadis, C. Mascolo, and W. Emmerich. Satin: A component model for mobile self organisation. In R. Meersman and Z. Tari, editors, CoopIS/DOA/ODBASE(2), volume 3291 of Lecture Notes in Computer Science, pages 1303-1321. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3291 , pp. 1303-1321
    • Zachariadis, S.1    Mascolo, C.2    Emmerich, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.