-
3
-
-
84957800809
-
Keynote: Trust management for public-key infrastructures
-
Secure Internet Programming: Issues in Distributed and Mobile Object Systems, Springer-Verlag
-
M. Blaze, J. Feigenbaum, and A. D. Keromytis. Keynote: Trust management for public-key infrastructures. In Secure Internet Programming: Issues in Distributed and Mobile Object Systems, LNCS. Springer-Verlag, 1998.
-
(1998)
LNCS
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
5
-
-
2442549069
-
Using trust for secure collaboration in uncertain environments
-
Cahill, V., Shand, B., Gray, E., Bryce, C., Dimmock, N.: Using trust for secure collaboration in uncertain environments. IEEE Pervasive Computing 2, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
-
-
Cahill, V.1
Shand, B.2
Gray, E.3
Bryce, C.4
Dimmock, N.5
-
6
-
-
0001470602
-
REFEREE: Trust management for Web applications
-
Chu, Y.H., Feigenbaum, J., LaMacchia, B., Resnick, P., Strauss, M.: REFEREE: Trust management for Web applications. Computer Networks and ISDN Systems,1997.
-
(1997)
Computer Networks and ISDN Systems
-
-
Chu, Y.H.1
Feigenbaum, J.2
LaMacchia, B.3
Resnick, P.4
Strauss, M.5
-
7
-
-
3042686499
-
Security Level Evaluation: Policy and Fuzzy Technique
-
ISBN 0-7695-2108-8
-
Casóla V., Preziosi R., Rak M., Troiano L. Security Level Evaluation: Policy and Fuzzy Technique, in Proceedings of International Conference on Information Technology: Coding and Computing, ISBN 0-7695-2108-8, 2004.
-
(2004)
Proceedings of International Conference on Information Technology: Coding and Computing
-
-
Casóla, V.1
Preziosi, R.2
Rak, M.3
Troiano, L.4
-
8
-
-
0032682730
-
Autonomous agents with norms
-
F. Dignum. Autonomous agents with norms. Artificial Intelligence and Law, 7(1):69-79, 1999.
-
(1999)
Artificial Intelligence and Law
, vol.7
, Issue.1
, pp. 69-79
-
-
Dignum, F.1
-
9
-
-
7044221923
-
A Service-Oriented Trust Management Framework
-
R. Falcone, S. Barber, L. Korba, and M. Singh, editors, Springer
-
T. Dimitrakos. A Service-Oriented Trust Management Framework. In R. Falcone, S. Barber, L. Korba, and M. Singh, editors, Trust, Reputation, and Security: Theories and Practice, LNAI2631, pages 53-72. Springer, 2002.
-
(2002)
Trust, Reputation, and Security: Theories and Practice
, vol.LNAI2631
, pp. 53-72
-
-
Dimitrakos, T.1
-
10
-
-
4143058053
-
Using trust and risk in role-based access control policies
-
ACM
-
Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J., Moody, K.: Using trust and risk in role-based access control policies. In: Proceedings of Symposium on Access Control Models and Technologies, ACM, 2004.
-
(2004)
Proceedings of Symposium on Access Control Models and Technologies
-
-
Dimmock, N.1
Belokosztolszki, A.2
Eyers, D.3
Bacon, J.4
Moody, K.5
-
12
-
-
21344491113
-
A model of perceived risk and intended risk-handling activity
-
Dowling, G. R., & Staelin, R. A model of perceived risk and intended risk-handling activity. Journal of Consumer Research, 21, 119-134, 1994.
-
(1994)
Journal of Consumer Research
, vol.21
, pp. 119-134
-
-
Dowling, G.R.1
Staelin, R.2
-
16
-
-
0035627861
-
Automated negotiation: Prospects, methods and challenges
-
N. R. Jennings, P. Faratin, A. R. Lomuscio, S. Parsons, C. Sierra, and M. Wooldridge. Automated negotiation: Prospects, methods and challenges. International Journal of Group Decision and Negotiation, 2001.
-
(2001)
International Journal of Group Decision and Negotiation
-
-
Jennings, N.R.1
Faratin, P.2
Lomuscio, A.R.3
Parsons, S.4
Sierra, C.5
Wooldridge, M.6
-
17
-
-
35048832333
-
Analysing the Relationship Between Risk and Trust
-
Proceedings of Second International Conference on Trust Management iTrust
-
Josang, A. and Lo Presti, S. Analysing the Relationship Between Risk and Trust. In Proceedings of Second International Conference on Trust Management (iTrust 2004) LNCS 2995, pp. 135-145.
-
(2004)
LNCS
, vol.2995
, pp. 135-145
-
-
Josang, A.1
Lo Presti, S.2
-
18
-
-
24944440539
-
A Survey of Trust and Reputation Systems for Online Service Provision
-
A. Josang, R. Ismail, and C. Boyd. A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems, 2005.
-
(2005)
Decision Support Systems
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
20
-
-
0000125532
-
Prospect theory: An analysis of decision under risk
-
Kahneman, D., & Tversky, A. Prospect theory: An analysis of decision under risk. Econometrica, 47, 1979.
-
(1979)
Econometrica
, vol.47
-
-
Kahneman, D.1
Tversky, A.2
-
21
-
-
84900044615
-
The production of trust in online markets
-
Kollock, P. The production of trust in online markets. Advances in Group Processes (Vol. 16), 1992.
-
(1992)
Advances in Group Processes
, vol.16
-
-
Kollock, P.1
-
27
-
-
34748824672
-
-
A. Rahman and S. Hailes. Supporting trust in virtual communities. In Hawaii International Conference on System Sciences 33, pages 1769.1777, 2000.
-
A. Rahman and S. Hailes. Supporting trust in virtual communities. In Hawaii International Conference on System Sciences 33, pages 1769.1777, 2000.
-
-
-
-
28
-
-
84939548725
-
Automated trust negotiation
-
Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. In: DARPA Information Survivability Conference and Exposition, 2000. DISCEX'00
-
DARPA Information Survivability Conference and Exposition, 2000. DISCEX'00
-
-
Winsborough, W.H.1
Seamons, K.E.2
Jones, V.E.3
-
29
-
-
0242624675
-
A reputation-based trust model for peer-to-peer ecommerce communities
-
Li Xiong and Ling Liu. A reputation-based trust model for peer-to-peer ecommerce communities. In ACM Conference on Electronic Commerce, 2003.
-
(2003)
ACM Conference on Electronic Commerce
-
-
Xiong, L.1
Liu, L.2
-
31
-
-
34748872956
-
-
Wu, Zhengping and Weaver, A. C., Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing, 2006 Workshop on Security, Privacy, and Trust for Pervasive Applications, 2006.
-
Wu, Zhengping and Weaver, A. C., Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing, 2006 Workshop on Security, Privacy, and Trust for Pervasive Applications, 2006.
-
-
-
-
32
-
-
34748834410
-
-
Y. Zhong and B. Bhargava. Authorization based on evidence and trust, Data Warehousing and Knowledge Discovery, 2454, Lecture Notes in Computer Science, pages 94.103. Springer, 2002.
-
Y. Zhong and B. Bhargava. Authorization based on evidence and trust, Data Warehousing and Knowledge Discovery, volume 2454, Lecture Notes in Computer Science, pages 94.103. Springer, 2002.
-
-
-
|