-
3
-
-
33847020781
-
-
Web Services Description Language (WSDL) Version 2.0 Part 1: Core Language, 2004
-
Web Services Description Language (WSDL) Version 2.0 Part 1: Core Language. http://www.w3.org/TR/wsdl20/, 2004.
-
-
-
-
5
-
-
0002863367
-
Valuation of Trust in Open Networks
-
Brighton, UK, Nov
-
rd European Symposium on Research in Computer Security (ESORICS '94), pages 3-18, Brighton, UK, Nov. 1994.
-
(1994)
rd European Symposium on Research in Computer Security (ESORICS '94)
, pp. 3-18
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
6
-
-
0036355157
-
Congregating and Market Formation
-
Bologna, Italy, July, ACM Press
-
C. Brooks and E. Durfee. Congregating and Market Formation. In Proc. of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), pages 96-103, Bologna, Italy, July 2002. ACM Press.
-
(2002)
Proc. of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS)
, pp. 96-103
-
-
Brooks, C.1
Durfee, E.2
-
8
-
-
0242678584
-
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
-
S. Capkun, L. Buttyán, and J. Hubaux. Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Trans. on Mobile Computing, 2(1):52-64, 2003.
-
(2003)
IEEE Trans. on Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyán, L.2
Hubaux, J.3
-
9
-
-
20344371959
-
Engineering Human Trust in Miobile System Collaborations
-
Newport Beach, CA, USA, Nov, ACM Press
-
th International Symposium on the Foundations of Software Engineering (SIGSOFT 2004/FSE-12), pages 107-116, Newport Beach, CA, USA, Nov. 2004. ACM Press.
-
(2004)
th International Symposium on the Foundations of Software Engineering (SIGSOFT 2004/FSE-12)
, pp. 107-116
-
-
Capra, L.1
-
10
-
-
84944319168
-
A Formal Model for Trust in Dynamic Networks
-
Brisbane, Australia, Sept
-
M. Carbone, M. Nielsen, and V. Sassone. A Formal Model for Trust in Dynamic Networks. In Proc. of First International Conference on Software Engineering and Formal Methods (SEFM'03), pages 54-63, Brisbane, Australia, Sept. 2003.
-
(2003)
Proc. of First International Conference on Software Engineering and Formal Methods (SEFM'03)
, pp. 54-63
-
-
Carbone, M.1
Nielsen, M.2
Sassone, V.3
-
12
-
-
0035440934
-
The JEDI event-based infrastructure and its application to the development of the OPSS WFMS
-
G. Cugola, E. D. Nitto, and A. Fuggetta. The JEDI event-based infrastructure and its application to the development of the OPSS WFMS. IEEE Transactions on Software Engineering, 27(9):827-850, 2001.
-
(2001)
IEEE Transactions on Software Engineering
, vol.27
, Issue.9
, pp. 827-850
-
-
Cugola, G.1
Nitto, E.D.2
Fuggetta, A.3
-
13
-
-
11844284794
-
Adopting ontology to facilitate knowledge sharing
-
T. Edgington, B. Choi, K. Henson, T. Raghu, and A. Vinze, Adopting ontology to facilitate knowledge sharing. Communications of the ACM, 47(11):85-90, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.11
, pp. 85-90
-
-
Edgington, T.1
Choi, B.2
Henson, K.3
Raghu, T.4
Vinze, A.5
-
14
-
-
2442549069
-
-
V. C. et. al. Using Trust for Secure Collaboration in Uncertain Environments. IEEE Pervasive Computing Mobile And Ubiquitous Computing, 2(3):52-61, Aug. 2003.
-
V. C. et. al. Using Trust for Secure Collaboration in Uncertain Environments. IEEE Pervasive Computing Mobile And Ubiquitous Computing, 2(3):52-61, Aug. 2003.
-
-
-
-
15
-
-
1142305186
-
Coalition Formation through Motivation and Trust
-
Melbourne, Australia, July, ACM Press
-
N. Griffiths and M. Luck. Coalition Formation through Motivation and Trust. In Proc. of the Second International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), pages 17-24, Melbourne, Australia, July 2003. ACM Press.
-
(2003)
Proc. of the Second International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS)
, pp. 17-24
-
-
Griffiths, N.1
Luck, M.2
-
17
-
-
33847124145
-
Architecture and Algorithms for a Distributed Reputation System
-
st International Conference on Trust Management, number in, Heraklion, Crete, Greece, May, Springer-Verlag
-
st International Conference on Trust Management, number 2692 in LNCS, pages 1-16, Heraklion, Crete, Greece, May 2003. Springer-Verlag.
-
(2003)
LNCS
, vol.2692
, pp. 1-16
-
-
Kinateder, M.1
Rothermel, K.2
-
18
-
-
0035704362
-
Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks
-
Riverside, California, Nov
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In International Conference on Network Protocols (ICNP), pages 251-260, Riverside, California, Nov. 2001.
-
(2001)
International Conference on Network Protocols (ICNP)
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
19
-
-
33847008265
-
Enhanced Reputation Mechanism for Mobile Ad Hoc Networks
-
nd International Conference on Trust Management iTrust, Oxford, UK. Mar
-
nd International Conference on Trust Management (iTrust), volume 2995, pages 48-62. Oxford, UK. Mar. 2004. LNCS.
-
(2004)
LNCS
, vol.2995
, pp. 48-62
-
-
Liu, J.1
Issarny, V.2
-
20
-
-
0001528324
-
Markets and Computation: Agoric Open Systems
-
B. A. Huberman, editor, Elsevier Science Publishers
-
M. S. Miller and K. E. Drexler. Markets and Computation: Agoric Open Systems. In B. A. Huberman, editor, The Ecology of Computation, pages 133-176. Elsevier Science Publishers, 1988.
-
(1988)
The Ecology of Computation
, pp. 133-176
-
-
Miller, M.S.1
Drexler, K.E.2
-
21
-
-
35048814480
-
Using Coordination Middleware for Location-Aware Computing: A Lime Case Study
-
th International Conference on Coordination Models and Languages Coordination 2004, of, Pisa, Italy, February, Springer-Verlag
-
th International Conference on Coordination Models and Languages (Coordination 2004), volume 2949 of Lecture Notes in Computer Science, pages 263-278. Pisa, Italy, February 2004. Springer-Verlag.
-
(2004)
Lecture Notes in Computer Science
, vol.2949
, pp. 263-278
-
-
Murphy, A.1
Picco, G.-P.2
-
22
-
-
35048838557
-
-
nd International Conference on Trust Management (iTrust), 2995, pages 33-47, Oxford, UK, Mar. 2004. LNCS.
-
nd International Conference on Trust Management (iTrust), volume 2995, pages 33-47, Oxford, UK, Mar. 2004. LNCS.
-
-
-
-
23
-
-
85029609685
-
Simulated Social Control for Secure Internet Commerce
-
Lake Arrowhead, CA, Sept, ACM Press
-
L. Rasmusson and S. Janson. Simulated Social Control for Secure Internet Commerce. In New Security Paradigms Workshop, pages 18-26, Lake Arrowhead, CA, Sept. 1996. ACM Press.
-
(1996)
New Security Paradigms Workshop
, pp. 18-26
-
-
Rasmusson, L.1
Janson, S.2
-
24
-
-
78649710925
-
Trust for Ubiquitous, Transparent Collaboration
-
Dallas-Fort Worth, Texas, Mar
-
B. Shand, N. Dimmock, and J. Bacon. Trust for Ubiquitous, Transparent Collaboration. In First International Conference on Pervasive Computing, pages 153-160, Dallas-Fort Worth, Texas, Mar. 2003.
-
(2003)
First International Conference on Pervasive Computing
, pp. 153-160
-
-
Shand, B.1
Dimmock, N.2
Bacon, J.3
-
25
-
-
0032074719
-
Methods for task allocation via agent coalition formation
-
O. Shehory and S. Kraus. Methods for task allocation via agent coalition formation. Artificial Intelligence, 101:165-200, 1998.
-
(1998)
Artificial Intelligence
, vol.101
, pp. 165-200
-
-
Shehory, O.1
Kraus, S.2
-
26
-
-
0034835799
-
-
S. Weeks. Understanding Trust Management Systems. In Proc. IEEE Symposium on Security and Privacy, pages 94-105, Oakland, CA, May 2001. systems software. In Proceedings of IASTED Software Engineering and Applications (SEA'04), Cambridge, MA, Nov 2004.
-
S. Weeks. Understanding Trust Management Systems. In Proc. IEEE Symposium on Security and Privacy, pages 94-105, Oakland", CA, May 2001. systems software. In Proceedings of IASTED Software Engineering and Applications (SEA'04), Cambridge, MA, Nov 2004.
-
-
-
-
27
-
-
0001582379
-
Missing the boat and sinking the boat: A conceptual model of entrepreneurial risk
-
50(July, 5S70
-
P. Dickson and J. Giglierano. Missing the boat and sinking the boat: a conceptual model of entrepreneurial risk. J. Mark, 50((July)):5S70, 1986.
-
(1986)
J. Mark
-
-
Dickson, P.1
Giglierano, J.2
-
29
-
-
33847045164
-
-
N. Dimmock, J. Bacon, D. Ingram, and K. Moody. Risk models for trust-based access control. In In Proceedings of the Third Annual Conference on Trust Management (iTrust), 3477 of WCS. Springer-Verlag, May 2005.
-
N. Dimmock, J. Bacon, D. Ingram, and K. Moody. Risk models for trust-based access control. In In Proceedings of the Third Annual Conference on Trust Management (iTrust), Volume 3477 of WCS. Springer-Verlag, May 2005.
-
-
-
-
30
-
-
33846271611
-
Engineering trust based collaborations in a global computing environment
-
Oxford, UK, March
-
C. English, S. Terzis, and W. Wagealla. Engineering trust based collaborations in a global computing environment. In To appear in Proceedings of the Second International Conference on Trust. Management, Oxford, UK, March 2004.
-
(2004)
To appear in Proceedings of the Second International Conference on Trust. Management
-
-
English, C.1
Terzis, S.2
Wagealla, W.3
-
32
-
-
0011458197
-
-
Cincinnati, Ohio: College Division, Soulh-Western Publishing Co
-
M. R. Greene and J. S. Trieschmann. Risk and Insurance. (Cincinnati, Ohio: College Division, Soulh-Western Publishing Co), 1962.
-
(1962)
Risk and Insurance
-
-
Greene, M.R.1
Trieschmann, J.S.2
-
33
-
-
77952969536
-
Adaptive resource discovery for ubiquitous computing
-
New York, NY, USA, ACM Press
-
R. Harbird, S. Hailes, and C. Mascolo. Adaptive resource discovery for ubiquitous computing. In Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing, pages 155-160, New York, NY, USA, 2004. ACM Press.
-
(2004)
Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing
, pp. 155-160
-
-
Harbird, R.1
Hailes, S.2
Mascolo, C.3
-
35
-
-
0003954474
-
Mobile agent security. NIST special publication 800-19
-
Technical report, National Institute of Standards and Technology
-
W. Jansen and T. Karygiannis. Mobile agent security. NIST special publication 800-19. Technical report, National Institute of Standards and Technology, 1999.
-
(1999)
-
-
Jansen, W.1
Karygiannis, T.2
-
36
-
-
35048832333
-
Analysing the relationship between risk and trust
-
C. D. Jensen, S. Poslad, and T. Dimitrakos, editors, iTrust, of, Springer
-
A. Jøsang and S. L. Presti. Analysing the relationship between risk and trust. In C. D. Jensen, S. Poslad, and T. Dimitrakos, editors, iTrust, volume 2995 of Lecture Notes in Computer Science, pages 135-145. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2995
, pp. 135-145
-
-
Jøsang, A.1
Presti, S.L.2
-
39
-
-
84982408067
-
Approximating expected utility by a function of mean and variance
-
available at
-
H. Levy and H. M. Markowtiz. Approximating expected utility by a function of mean and variance. American Economic Review, 69(3):308-17, 1979. available at http://ideas.repec.org/a/aea/aecrev/v69y1979i3p308-17.html.
-
(1979)
American Economic Review
, vol.69
, Issue.3
, pp. 308-317
-
-
Levy, H.1
Markowtiz, H.M.2
-
40
-
-
0003839495
-
-
Ph.D. Thesis. Department of Mathematics and Computer Science, University of Stirling
-
S. Marsh. Formalising trust as a computational concept. Ph.D. Thesis. Department of Mathematics and Computer Science, University of Stirling, 1994.
-
(1994)
Formalising trust as a computational concept
-
-
Marsh, S.1
-
41
-
-
33847012567
-
-
R. I. Mehr and E. Cammack. Principles of insurance. (Home-wood, IL: Richard D. Irwin), 1961.
-
R. I. Mehr and E. Cammack. Principles of insurance. (Home-wood, IL: Richard D. Irwin), 1961.
-
-
-
-
45
-
-
0036870378
-
Building trustworthy software agents
-
A. Patrick. Building trustworthy software agents. IEEE Internet Computing, 6(6):46-53, 2002.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 46-53
-
-
Patrick, A.1
-
47
-
-
35048864339
-
Trading privacy for trust
-
C. D. Jensen, S. Poslad, and T. Dimitrakos, editors, iTrust, of, Springer
-
J.-M. Seigneur and C. D. Jensen. Trading privacy for trust. In C. D. Jensen, S. Poslad, and T. Dimitrakos, editors, iTrust, volume 2995 of Lecture Notes in Computer Science, pages 93-107. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2995
, pp. 93-107
-
-
Seigneur, J.-M.1
Jensen, C.D.2
-
48
-
-
24944461741
-
A formal model of trust lifecycle management
-
W. Wagealla, M. Carbone, C. English, S.Terzis, and P. Nixon. A formal model of trust lifecycle management. In Proceedings of the Workshop on Formal Aspects of Security and Trust, 2003.
-
(2003)
Proceedings of the Workshop on Formal Aspects of Security and Trust
-
-
Wagealla, W.1
Carbone, M.2
English, C.3
Terzis, S.4
Nixon, P.5
-
49
-
-
21844511690
-
Trust and commitment in the united states and japan
-
T. Yamagishi and M. Yamagishi. Trust and commitment in the united states and japan. Motivation and Emotion, 18(2):129-166, 1994.
-
(1994)
Motivation and Emotion
, vol.18
, Issue.2
, pp. 129-166
-
-
Yamagishi, T.1
Yamagishi, M.2
-
50
-
-
26444539660
-
Satin: A component model for mobile self organisation
-
R. Meersman and Z. Tari, editors, CoopIS/DOA/ODBASE2, of, Springer
-
S. Zachariadis, C. Mascolo, and W. Emmerich. Satin: A component model for mobile self organisation. In R. Meersman and Z. Tari, editors, CoopIS/DOA/ODBASE(2), volume 3291 of Lecture Notes in Computer Science, pages 1303-1321. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3291
, pp. 1303-1321
-
-
Zachariadis, S.1
Mascolo, C.2
Emmerich, W.3
|