-
1
-
-
85084161234
-
-
Acharya, A. and M. Raje, Mapbox: Using parameterized behavior classes to confine untrusted applications, in: Proc. of the 9th USENIX Security Symposium Denver, Colorado, USA August 14-17, 2000 (2000), pp. 1-18
-
-
-
-
2
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Avižienis A., Laprie J.-C., Randell B., and Landwehr C. Basic concepts and taxonomy of dependable and secure computing. IEEE, Transactions on Dependable And Secure Computing 1 (2004) 11-34
-
(2004)
IEEE, Transactions on Dependable And Secure Computing
, vol.1
, pp. 11-34
-
-
Avižienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
4
-
-
34250724930
-
Trust-based protection of software component users and designers
-
Proc. of Trust Management, First International Conference on Trust Management. Nixon P., and Terzis S. (Eds). (iTrust 2003), Heraklion, Crete, Greece, May 28-30, 2002
-
Herrmann P. Trust-based protection of software component users and designers. In: Nixon P., and Terzis S. (Eds). Proc. of Trust Management, First International Conference on Trust Management. (iTrust 2003), Heraklion, Crete, Greece, May 28-30, 2002. LNCS 2692 (2003) 75-90
-
(2003)
LNCS
, vol.2692
, pp. 75-90
-
-
Herrmann, P.1
-
5
-
-
0034872904
-
-
Herrmann, P. and H. Krumm, Trust-adapted enforcement of security policies in distributed component-structured applications, in: Proc. of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 3-5 July 2001, Hammamet, Tunisia (2001), pp. 2-8
-
-
-
-
6
-
-
84958759310
-
A subjective metric of authentication
-
Proc. of the 5th European European Symposium on Research in Computer Security. Quisquater J., Deswarte Y., Meadows C., and Gollmann D. (Eds). (ESORICS 98), Louvain-la-Neuve, Belgium, September 16-18, 1998
-
Jøsang A. A subjective metric of authentication. In: Quisquater J., Deswarte Y., Meadows C., and Gollmann D. (Eds). Proc. of the 5th European European Symposium on Research in Computer Security. (ESORICS 98), Louvain-la-Neuve, Belgium, September 16-18, 1998. LNCS 1485 (1998) 329-344
-
(1998)
LNCS
, vol.1485
, pp. 329-344
-
-
Jøsang, A.1
-
8
-
-
33744773886
-
-
Jøsang, A., L. Gray and M. Kinateder, Simplification and analysis of transitive trust networks, Web Intelligence and Agent Systems Journal (2006), (to appear)
-
-
-
-
9
-
-
34250719253
-
-
Jøsang, A., R. Ismail and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems (2005), (available on line on ScienceDirect) in press
-
-
-
-
10
-
-
34250697060
-
Reputation = f(user ranking, compliance, verity)
-
(appeared also in Proc. of the IEEE International Conference on Web Services (ICWS'04))
-
Kalepu S., Krishnaswamy S., and Loke S.W. Reputation = f(user ranking, compliance, verity). IEEE Tansactions on software engineering 30 (2004) 311-327 (appeared also in Proc. of the IEEE International Conference on Web Services (ICWS'04))
-
(2004)
IEEE Tansactions on software engineering
, vol.30
, pp. 311-327
-
-
Kalepu, S.1
Krishnaswamy, S.2
Loke, S.W.3
-
11
-
-
34250699531
-
-
Kamp, P.H. and R.N.M. Watson, Jails: Confining the omnipotent root, in: Proc. of the 2nd International Conference System Administration and Networking (SANE 2000), May 22-25, 2000, Maastricht, The Netherlands, 2000, pp. 1-15
-
-
-
-
12
-
-
34250709594
-
-
McKnight, D.H. and N.L. Chervany, The meaning of trust, Technical Report MISRC 96-04, University of Minnesota, Management Information Systems Research Center (1996)
-
-
-
-
13
-
-
11844291972
-
-
Muskens, J. and M. Chaudron, Integrity management in component based systems, in: Proc. of the 30th EUROMICRO Conference, 1-3 Sept 2004, Rennes, France, 2004
-
-
-
-
15
-
-
33751049091
-
-
Sherchan, W., S.W. Loke and S. Krishnaswamy, A fuzzy model for reasoning about reputation in web services, in: H. Haddad, editor, Proc. of the 21st ACM Symposium on Applied Computing (ACM SAC 2006) - Trust, Recommendations, Evidence, and other Collaborative Know-how (TRECK), 23-27 April 2006, Lyon, France (2006), pp. 1886-1892
-
-
-
-
16
-
-
34250740423
-
-
Toivonen, S., G. Lenzini and I. Uusitalo, Context-aware trust evaluation functions for dynamic reconfigurable systems, in: Proc. of the Models of Trust for the Web workshop (MTW'06), held with the 15th International World Wide Web Conference (WWW2006) May 22, 2006, Edinburgh, Scotland (2006)
-
-
-
|