-
1
-
-
84982899264
-
The role of trust management in distributed systems security
-
Secure Internet Programming: Security Issues for Mobile and Distributed Objects. Vitek J., and Jensen C.D. (Eds), Springer
-
Blaze M., Feigenbaum J., Ioannidis J., and Keromytis A.D. The role of trust management in distributed systems security. In: Vitek J., and Jensen C.D. (Eds). Secure Internet Programming: Security Issues for Mobile and Distributed Objects. Lecture Notes in Computer Science volume 1603 (1999), Springer 185-210
-
(1999)
Lecture Notes in Computer Science
, vol.1603
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
2
-
-
33847625402
-
-
S. Buchegger and J.-Y. Le Boudec. A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks. In P2PEcon 2004, 2004
-
-
-
-
3
-
-
2442549069
-
Using trust for secure collaboration in uncertain environments
-
Cahill V., Gray E., et al. Using trust for secure collaboration in uncertain environments. IEEE Pervasive Computing 2 3 (2003) 52-61
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.3
, pp. 52-61
-
-
Cahill, V.1
Gray, E.2
-
5
-
-
33847635170
-
-
Available from:
-
Chalmers D., Chalmers M., Crowcroft J., Kwiatkowska M., Milner R., ONeill E., Rodden T., Sassone V., and Sloman M. Ubiquitous computing: Experience, design and science. Version 4. Available from: (2006). http://www-dse.doc.ic.ac.uk/Projects/UbiNet/GC/Manifesto/manifesto.pdf
-
(2006)
Ubiquitous computing: Experience, design and science. Version 4
-
-
Chalmers, D.1
Chalmers, M.2
Crowcroft, J.3
Kwiatkowska, M.4
Milner, R.5
ONeill, E.6
Rodden, T.7
Sassone, V.8
Sloman, M.9
-
6
-
-
33847620207
-
-
K. Chatzikokolakis, C. Palamidessi, and P. Panangaden. Anonymity protocols as noisy channels. In Proceedings of TGC'06, LNCS. Springer, 2007. To appear
-
-
-
-
7
-
-
22944492087
-
A probabilistic approach to predict peers' performance in P2P networks
-
Proceedings from the Eighth International Workshop on Cooperative Information Agents. (CIA 2004), Springer
-
Despotovic Z., and Aberer K. A probabilistic approach to predict peers' performance in P2P networks. Proceedings from the Eighth International Workshop on Cooperative Information Agents. (CIA 2004). Springer Lecture Notes in Computer Science volume 3191 (2004), Springer 62-76
-
(2004)
Springer Lecture Notes in Computer Science
, vol.3191
, pp. 62-76
-
-
Despotovic, Z.1
Aberer, K.2
-
8
-
-
29244482785
-
P2P reputation management: Probabilistic estimation vs. social networks
-
Despotovic Z., and Aberer K. P2P reputation management: Probabilistic estimation vs. social networks. Computer Networks 50 4 (Mar. 2006) 485-500
-
(2006)
Computer Networks
, vol.50
, Issue.4
, pp. 485-500
-
-
Despotovic, Z.1
Aberer, K.2
-
9
-
-
0001951820
-
Can we trust trust?
-
Gambetta D. (Ed), University of Oxford, Department of Sociology Chapter 13. Electronic edition
-
Gambetta D. Can we trust trust?. In: Gambetta D. (Ed). Trust: Making and Breaking Cooperative Relations (2000), University of Oxford, Department of Sociology 213-237. http://www.sociology.ox.ac.uk/papers/gambetta213-237.pdf Chapter 13. Electronic edition
-
(2000)
Trust: Making and Breaking Cooperative Relations
, pp. 213-237
-
-
Gambetta, D.1
-
10
-
-
0003998828
-
-
Cambridge University Press, The Edinburgh Building, Cambridge, CB2 2RU, United Kingdom
-
Jaynes E.T. Probability Theory: The Logic of Science (2003), Cambridge University Press, The Edinburgh Building, Cambridge, CB2 2RU, United Kingdom
-
(2003)
Probability Theory: The Logic of Science
-
-
Jaynes, E.T.1
-
11
-
-
34548189525
-
-
A. Jøsang and J. Haller. Dirichlet reputation systems. In Proceedings of the 2nd Intl Conference on Availability, Reliability and Security, ARES 2007. 2007. To appear
-
-
-
-
12
-
-
33847689344
-
-
A. Jøsang and R. Ismail. The beta reputation system. In Proceedings from the 15th Bled Conference on Electronic Commerce, Bled, 2002
-
-
-
-
13
-
-
33847632032
-
-
K. Krukow. Towards a Theory of Trust for the Global Ubiquitous Computer. PhD thesis, University of Aarhus, Denmark, August 2006.; available online (submitted): http://www.brics.dk/~krukow
-
-
-
-
14
-
-
33847671780
-
-
K. Krukow, M. Nielsen, and V. Sassone. A logical framework for reputation systems. Journal of Computer Security, 2007. To appear. Available online www.brics.dk/~krukow
-
-
-
-
17
-
-
27944466459
-
On the formal modelling of trust in reputation-based systems
-
Theory Is Forever: Essays Dedicated to Arto Salomaa on the Occasion of His 70th Birthday. Karhumäki J., Maurer H., Paun G., and Rozenberg G. (Eds), Springer Verlag
-
Nielsen M., and Krukow K. On the formal modelling of trust in reputation-based systems. In: Karhumäki J., Maurer H., Paun G., and Rozenberg G. (Eds). Theory Is Forever: Essays Dedicated to Arto Salomaa on the Occasion of His 70th Birthday. Lecture Notes in Computer Science volume 3113 (2004), Springer Verlag 192-204
-
(2004)
Lecture Notes in Computer Science
, vol.3113
, pp. 192-204
-
-
Nielsen, M.1
Krukow, K.2
-
19
-
-
0024610919
-
A tutorial on hidden markov models and selected applications in speech recognition
-
Rabiner L.R. A tutorial on hidden markov models and selected applications in speech recognition. Proceedings of the IEEE 77 2 (February 1989) 257-286
-
(1989)
Proceedings of the IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
20
-
-
60349125047
-
-
S. Reece, A. Rogers, S. Roberts, and N. Jennings. Rumours and reputation: Evaluating multi-dimensional trust within a decentralised reputation system. In Proceedings of the 6th Intl Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS-07. 2007. Available at http://eprints.ecs.soton.ac.uk/13260
-
-
-
-
21
-
-
85006210403
-
Review on computational trust and reputation models
-
Sabater J., and Sierra C. Review on computational trust and reputation models. Artificial Intelligence Review 24 1 (2005) 33-60
-
(2005)
Artificial Intelligence Review
, vol.24
, Issue.1
, pp. 33-60
-
-
Sabater, J.1
Sierra, C.2
-
22
-
-
33645035106
-
Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model
-
ACM Press, New York, NY, USA
-
Teacy W.T.L., Patel J., Jennings N.R., and Luck M. Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model. AAMAS '05: Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems (2005), ACM Press, New York, NY, USA 997-1004
-
(2005)
AAMAS '05: Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
, pp. 997-1004
-
-
Teacy, W.T.L.1
Patel, J.2
Jennings, N.R.3
Luck, M.4
-
23
-
-
35048824804
-
Probabilistic event structures and domains
-
Proceedings from 15th International Conference on Concurrency Theory. Gardner P., and Yoshida N. (Eds). (CONCUR'04), Springer
-
Varacca D., Völzer H., and Winskel G. Probabilistic event structures and domains. In: Gardner P., and Yoshida N. (Eds). Proceedings from 15th International Conference on Concurrency Theory. (CONCUR'04). Lecture Notes in Computer Science volume 3170 (2004), Springer 481-496
-
(2004)
Lecture Notes in Computer Science
, vol.3170
, pp. 481-496
-
-
Varacca, D.1
Völzer, H.2
Winskel, G.3
|