-
1
-
-
84994155710
-
-
A. Abdul-Rahman, S. Hailes, A distributed trust model, in: Proc. 1997 Workshop on New Security Paradigms, Langdale, UK, 1997, pp. 48-60.
-
-
-
-
2
-
-
85094162508
-
-
A. Abdul-Rahman, S. Hailes, Supporting trust in virtual communities, in: Proc. 33rd Ann. Hawaii Int'l Conf. Syst. Sci. (HICSS 33), vol. 6, (2000) pp. 6007-6016.
-
-
-
-
3
-
-
34548045098
-
-
B. Alunkal, I. Veljkovic, G.V. Laszewski, K. Aminand, Reputation-based grid resource selection, in: Proc. Workshop Adaptive Grid Middleware, New Orleans, US, Sep. 2003. Available from (reputation.pdf on May 06, 2005).
-
-
-
-
4
-
-
84887937075
-
-
F. Azzedin, M. Maheswaran. Towards trust-aware resource management in grid computing systems, in: Proc. Second IEEE/ACM Int'l. Symp. Cluster Comput. Grid (CCGRID'02), Berlin, Germany, May 2002, pp. 452-457.
-
-
-
-
5
-
-
0035009259
-
-
S. Banerjee, S. Khuller. A clustering scheme for hierarchical control in multi-hop wireless networks, in: IEEE Infocom 2001, Anchorage, US, Apr. 2001, pp. 1028-1037.
-
-
-
-
6
-
-
0033366376
-
-
S. Basagni. Distributed clustering for ad hoc networks, in: Proc. 1999 Int'l. Symp. Parallel Arch., Alg. Netw. (ISPAN '99), Fremantle, Australia, June 1999, pp. 310-315.
-
-
-
-
7
-
-
34548024437
-
-
M. Blaze, J. Feigenbaum, J. Ioannidis, A.D. Keromytis, RFC 2704 - The KeyNote Trust Management System Version 2, Sep. 1999. Available from (on May 06, 2005).
-
-
-
-
8
-
-
0029700344
-
-
M. Blaze, J. Feigenbaum, J. Lacy. Decentralized Trust Management, in: Proceedings of 1996 IEEE Conference on Privacy and Security, Oakland, US, 1996, pp. 164-173.
-
-
-
-
9
-
-
34548017067
-
-
S. Buchegger, J. Boudec, A robust reputation system for P2P and mobile ad-hoc networks, in: Proc. Second Workshop the Economics of Peer-to-Peer Systems, Cambridge, US, June 2004. (Available from (on May 06, 2005).
-
-
-
-
10
-
-
34548044278
-
-
S. Buchegger, J.L. Boudec, Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks, in: Proc. Tenth Euromicro Workshop Parallel, Distr. Netw.-based Process., 2002, pp. 403-410.
-
-
-
-
11
-
-
0029515447
-
-
N. Budhiraja, K. Marzullo, Tradeoffs in implementing primary-backup protocols, in: Proc. Seventh IEEE Symp. Parallel Distr. Process., San Antonio, US, Oct. 1995, pp. 280-288.
-
-
-
-
12
-
-
34548042584
-
-
B. Christianson, W.S. Harbison, Why isn't trust transitive?, in: Proc. Security Protocols Int'l Workshop, University of Cambridge, 1996, pp. 171-176.
-
-
-
-
13
-
-
33646826825
-
-
P. Dewan, P. Dasgupta, Securing P2P networks using peer reputations: is there a silver bullet?, in: Proc. IEEE consumer communications and networking conference (CCNC 2005), Las Vegas, US, 2005. Available from (on May 06, 2005).
-
-
-
-
14
-
-
34548040731
-
-
D. Gambetta. Can We Trust Trust?, in :D. Gambetta, (Ed.), Trust: Making and Breaking Cooperative Relations, Department of Sociology, University of Oxford, Electronic Edition, 1990 (pp. 213-237) (Chapter13).
-
-
-
-
15
-
-
3142719292
-
Multicluster, mobile, multimedia radio network
-
Gerla M., and Tsai J.T. Multicluster, mobile, multimedia radio network. ACM-Baltzer J. Wirel. Netw. 1 3 (1995) 255-265
-
(1995)
ACM-Baltzer J. Wirel. Netw.
, vol.1
, Issue.3
, pp. 255-265
-
-
Gerla, M.1
Tsai, J.T.2
-
16
-
-
34548008195
-
-
V.S. Grishchenko, A fuzzy model for context-dependent reputation, in: Proceedings of Trust, Security and Reputation Workshop at ISWC 2004, Hiroshima, Japan, 2004. Available from (s.pdf on May 06, 2005).
-
-
-
-
17
-
-
0038717615
-
-
M. Gupta, P. Judge, M. Ammar, A Reputation System for Peer-to-peer networks, in: Proc. 13th Int'l Workshop Netw. Oper. Syst. Support for Digital Audio and Video, Monterey, US, June 2003, pp. 144-152.
-
-
-
-
19
-
-
4544283175
-
-
Q. He, O.D. Wu, P. Khosla, SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks, in: Proceedings of IEEE Wireless Communications and Networking Conference 2004. Available from (on May 06, 2005).
-
-
-
-
20
-
-
0033724294
-
-
A. Herzberg, Y. Mass, J. Michaeli, D. Naor, Y. Ravid, Access control meets public key infrastructure, or: assigning roles to strangers, in: Proc. 2000 IEEE Symp. Security and Privacy, Berkeley, US, May 2000, pp. 2-14.
-
-
-
-
21
-
-
34548031653
-
-
R. Housley, W. Polk, W. Ford, D. Solo, RFC 3280, Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, Apr. 2002. (Available at (on May 06, 2005).
-
-
-
-
22
-
-
84944035346
-
-
R. Jurca, B. Faltings. An incentive compatible reputation mechanism, in: Proc. IEEE Int'l Conf. E-Commerce, June 2003.
-
-
-
-
23
-
-
84880467894
-
-
S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina. The Eigentrust algorithm for reputation management in P2P networks, in: Proc. 12th Int'l World Wide Web Conf., Budapest, Hungary, 2003, pp. 640-651.
-
-
-
-
24
-
-
62349090353
-
-
N. Li, J. Mitchell, RT, A Role-based Trust-management Framework, in: Proc. Third DARPA Inform. Surviv. Conf. Exposition (DISCEX'03), Apr. 2003, pp. 201-212.
-
-
-
-
25
-
-
0031234161
-
Adaptive clustering for mobile networks
-
Lin C.R., and Gerla M. Adaptive clustering for mobile networks. IEEE J. Select. Areas Commun. 15 7 (1997) 1265-1275
-
(1997)
IEEE J. Select. Areas Commun.
, vol.15
, Issue.7
, pp. 1265-1275
-
-
Lin, C.R.1
Gerla, M.2
-
26
-
-
33847008265
-
-
J. Liu, V. Issarny, Enhanced reputation mechanism for mobile ad hoc networks, in: Proceedings of the Second International Conference on Trust Management, vol. 2995, Mar. 2004, pp. 48-62.
-
-
-
-
27
-
-
5044222209
-
-
Z. Liu, A.W. Joy, R.A. Thompson, A dynamic trust model for mobile ad hoc networks, in: Proc. Tenth IEEE Int'l Workshop Future Trends Distr. Comput. Syst. (FTDCS'04), Suzhou, China, May 2004, pp. 80-85.
-
-
-
-
28
-
-
34548032394
-
-
D.H. McKnight, N.L. Chervany, The Meanings of Trust Technical Report 94-04, Carlson School of Management, University of Minnesota, 1996.
-
-
-
-
29
-
-
34548009637
-
-
P. Michiardi, R. Molva, Core: A collaborative reputation mechanism to enforce node cooperation in mobile AD HOC networks, in: Proc. Sixth IFIP Commun. Multimedia Secur. Conf., Portorosz, Slovenia, 2002, pp. 107-121.
-
-
-
-
31
-
-
84948698587
-
-
L. Mui, M. Mohtashemi, A. Halberstadt, A computational model of trust and reputation, in: Proc. 35th Hawaii Int'l Conf. Syst. Sci., 2002, pp. 188-196.
-
-
-
-
32
-
-
4544265421
-
-
T.G. Papaioannou, G.D. Stamoulis, Effective use of reputation of peer-to-peer environments, in: Proceedings of IEEE/ACM CCGRID 2004, GP2PC workshop, Chicago, U.S., Apr. 2004. (Available from (on May 06, 2005).
-
-
-
-
33
-
-
34548029200
-
-
A.A. Pirzada, C. McDonald, Establishing trust in pure ad-hoc networks, in: Proc. 27th Conf. Australasian Computer Sci., ACM Int'l Conf. Proc. Series, Dunedin, New Zealand, 2004, pp. 47-54.
-
-
-
-
34
-
-
0034546215
-
-
S. Pleisch, A. Schiper, Modeling fault-tolerant mobile agent execution as a sequence of agreement problems, in: Proc. 19th IEEE Symp. Reliable Distr. Syst., Nuremberg, Germany, Oct. 2000, pp. 11-20.
-
-
-
-
35
-
-
3142569233
-
-
K. Ren, T. Li, Z. Wan, F. Bao, R.H. Deng, K. Kim, Highly reliable trust establishment scheme in ad hoc networks, Eslevier J. Comput. Netw., Apr. 2004, pp. 687-699.
-
-
-
-
36
-
-
0032305994
-
-
K. Rothermel, M. straber, A fault-tolerant protocol for providing the exactly-once property of mobile agents, in: Proc. 17th IEEE Symp. Reliable Distr. Syst., 1998, pp. 100-108.
-
-
-
-
37
-
-
34548037007
-
-
T. Sander, C. Tschudin, Protecting mobile agents against malicious hosts, in: Mobile Agents and Security, Lecture Notes in Computer Science, vol. 1419, Heidelberg, Germany, 1998. pp. 44-60.
-
-
-
-
38
-
-
33846619550
-
-
F.B. Schneider, Towards fault-tolerant and secure agentry, in: Proc. 11th Int'l Workshop on Distributed Algorithms, Saarbrucken, Germany, Sep. 1997, pp. 1-14.
-
-
-
-
39
-
-
33646022178
-
-
D. Scott, A. Beresford, A. Mycroft, Spatial security policies for mobile agents in a sentient computing environment, in: Proceedings of FASE 2003, Lecture Notes in Computer Science, vol. 2621, Warsaw, Poland, Apr. 2003, pp. 102-117.
-
-
-
-
40
-
-
0034833404
-
-
Y. Tahara, A. Ohsuga, S. Honiden, Mobile agent security with the IPEditor development tool and the mobile UNITY language, in: Proc. Fifth Int'l Conf. Autonomous Agents, Montreal, Canada, 2001, pp. 656-662.
-
-
-
-
41
-
-
0029733838
-
-
J. Tardo, L. Valente, Mobile agent security and telescript. n Proceedings of the 41st Int'l Conf. IEEE Comput. Soci. (CompCon '96), pages 58-63, Feb. 1996.
-
-
-
-
42
-
-
11244333253
-
-
G. Theodorakopoulos, J.S. Baras. Trust evaluation in ad-hoc networks, in: Proc. 2004 ACM Workshop on Wirel. Security, Philadelphia, U.S., 2004, pp. 1-10.
-
-
-
-
43
-
-
84943784070
-
-
Y. Wang, J. Vassileva, Trust and reputation model in peer-to-peer networks, in: Proc. Third Int'l Conf. Peer-to-Peer Comput. (P2P'03), Linkoping, Sweden, Sep. 2003, pp. 150-157.
-
-
-
-
44
-
-
0037505405
-
Landmark routing in ad hoc networks with mobile backbones
-
Xu K., Hong X., and Gerla M. Landmark routing in ad hoc networks with mobile backbones. J. Parallel Distri. Comput. 63 2 (2003) 110-122
-
(2003)
J. Parallel Distri. Comput.
, vol.63
, Issue.2
, pp. 110-122
-
-
Xu, K.1
Hong, X.2
Gerla, M.3
|