메뉴 건너뛰기




Volumn 179, Issue , 2007, Pages 143-155

Managing Trustworthiness in Component-based Embedded Systems

Author keywords

component based systems; dependability and security; trustworthiness evaluation; trustworthiness management architecture

Indexed keywords

COMPUTER SYSTEM FIREWALLS; CONSUMER ELECTRONICS; INFORMATION RETRIEVAL; SECURITY OF DATA;

EID: 34250729084     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2006.08.038     Document Type: Article
Times cited : (22)

References (16)
  • 1
    • 85084161234 scopus 로고    scopus 로고
    • Acharya, A. and M. Raje, Mapbox: Using parameterized behavior classes to confine untrusted applications, in: Proc. of the 9th USENIX Security Symposium Denver, Colorado, USA August 14-17, 2000 (2000), pp. 1-18
  • 4
    • 34250724930 scopus 로고    scopus 로고
    • Trust-based protection of software component users and designers
    • Proc. of Trust Management, First International Conference on Trust Management. Nixon P., and Terzis S. (Eds). (iTrust 2003), Heraklion, Crete, Greece, May 28-30, 2002
    • Herrmann P. Trust-based protection of software component users and designers. In: Nixon P., and Terzis S. (Eds). Proc. of Trust Management, First International Conference on Trust Management. (iTrust 2003), Heraklion, Crete, Greece, May 28-30, 2002. LNCS 2692 (2003) 75-90
    • (2003) LNCS , vol.2692 , pp. 75-90
    • Herrmann, P.1
  • 5
    • 0034872904 scopus 로고    scopus 로고
    • Herrmann, P. and H. Krumm, Trust-adapted enforcement of security policies in distributed component-structured applications, in: Proc. of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 3-5 July 2001, Hammamet, Tunisia (2001), pp. 2-8
  • 6
    • 84958759310 scopus 로고    scopus 로고
    • A subjective metric of authentication
    • Proc. of the 5th European European Symposium on Research in Computer Security. Quisquater J., Deswarte Y., Meadows C., and Gollmann D. (Eds). (ESORICS 98), Louvain-la-Neuve, Belgium, September 16-18, 1998
    • Jøsang A. A subjective metric of authentication. In: Quisquater J., Deswarte Y., Meadows C., and Gollmann D. (Eds). Proc. of the 5th European European Symposium on Research in Computer Security. (ESORICS 98), Louvain-la-Neuve, Belgium, September 16-18, 1998. LNCS 1485 (1998) 329-344
    • (1998) LNCS , vol.1485 , pp. 329-344
    • Jøsang, A.1
  • 8
    • 33744773886 scopus 로고    scopus 로고
    • Jøsang, A., L. Gray and M. Kinateder, Simplification and analysis of transitive trust networks, Web Intelligence and Agent Systems Journal (2006), (to appear)
  • 9
    • 34250719253 scopus 로고    scopus 로고
    • Jøsang, A., R. Ismail and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems (2005), (available on line on ScienceDirect) in press
  • 10
    • 34250697060 scopus 로고    scopus 로고
    • Reputation = f(user ranking, compliance, verity)
    • (appeared also in Proc. of the IEEE International Conference on Web Services (ICWS'04))
    • Kalepu S., Krishnaswamy S., and Loke S.W. Reputation = f(user ranking, compliance, verity). IEEE Tansactions on software engineering 30 (2004) 311-327 (appeared also in Proc. of the IEEE International Conference on Web Services (ICWS'04))
    • (2004) IEEE Tansactions on software engineering , vol.30 , pp. 311-327
    • Kalepu, S.1    Krishnaswamy, S.2    Loke, S.W.3
  • 11
    • 34250699531 scopus 로고    scopus 로고
    • Kamp, P.H. and R.N.M. Watson, Jails: Confining the omnipotent root, in: Proc. of the 2nd International Conference System Administration and Networking (SANE 2000), May 22-25, 2000, Maastricht, The Netherlands, 2000, pp. 1-15
  • 12
    • 34250709594 scopus 로고    scopus 로고
    • McKnight, D.H. and N.L. Chervany, The meaning of trust, Technical Report MISRC 96-04, University of Minnesota, Management Information Systems Research Center (1996)
  • 13
    • 11844291972 scopus 로고    scopus 로고
    • Muskens, J. and M. Chaudron, Integrity management in component based systems, in: Proc. of the 30th EUROMICRO Conference, 1-3 Sept 2004, Rennes, France, 2004
  • 15
    • 33751049091 scopus 로고    scopus 로고
    • Sherchan, W., S.W. Loke and S. Krishnaswamy, A fuzzy model for reasoning about reputation in web services, in: H. Haddad, editor, Proc. of the 21st ACM Symposium on Applied Computing (ACM SAC 2006) - Trust, Recommendations, Evidence, and other Collaborative Know-how (TRECK), 23-27 April 2006, Lyon, France (2006), pp. 1886-1892
  • 16
    • 34250740423 scopus 로고    scopus 로고
    • Toivonen, S., G. Lenzini and I. Uusitalo, Context-aware trust evaluation functions for dynamic reconfigurable systems, in: Proc. of the Models of Trust for the Web workshop (MTW'06), held with the 15th International World Wide Web Conference (WWW2006) May 22, 2006, Edinburgh, Scotland (2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.