메뉴 건너뛰기




Volumn 238, Issue , 2007, Pages 317-332

Design of trusted systems with reusable collaboration models

Author keywords

[No Author keywords available]

Indexed keywords

MODEL CHECKING; SEMANTICS; SOFTWARE ENGINEERING; SPECIFICATIONS;

EID: 36649000483     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-73655-6_21     Document Type: Conference Paper
Times cited : (10)

References (42)
  • 1
    • 0003544472 scopus 로고    scopus 로고
    • Cheskin Research and Studio Archetype/Sapient
    • Cheskin Research and Studio Archetype/Sapient, eCommerce Trust Study (1999).
    • (1999) eCommerce Trust Study
  • 3
    • 0000270621 scopus 로고    scopus 로고
    • On the Characterisation of a Trusting Agent - Aspects of a Formal Approach
    • edited by C. Castelfranchi and Y.H. Tan Kluwer Academic Publishers
    • A.J.I. Jones and B.S. Firozabadi, On the Characterisation of a Trusting Agent - Aspects of a Formal Approach, in: Trust and Deception in Virtual Societies, edited by C. Castelfranchi and Y.H. Tan (Kluwer Academic Publishers, 2001), pp. 157-168.
    • (2001) Trust and Deception in Virtual Societies , pp. 157-168
    • Jones, A.J.I.1    Firozabadi, B.S.2
  • 4
    • 84942883016 scopus 로고    scopus 로고
    • Social Trust: A Cognitive Approach
    • edited by C. Castelfranchi and Y.H. Tan Kluwer Academic Publishers
    • R. Falcone and C. Castelfranchi, Social Trust: A Cognitive Approach, in: Trust and Deception in Virtual Societies, edited by C. Castelfranchi and Y.H. Tan (Kluwer Academic Publishers, 2001), pp. 55-90.
    • (2001) Trust and Deception in Virtual Societies , pp. 55-90
    • Falcone, R.1    Castelfranchi, C.2
  • 5
    • 34548228048 scopus 로고    scopus 로고
    • N. Mezzetti, A Socially Inspired Reputation Model, in: 1st European Workshop on Public Key Infrastructure (EuroPKI 2004), Samos, edited by S.K. Katsikas, S. Gritzalis and J. Lopez, LNCS 3093 (Springer-Verlag, 2004), pp. 191-204.
    • N. Mezzetti, A Socially Inspired Reputation Model, in: 1st European Workshop on Public Key Infrastructure (EuroPKI 2004), Samos, edited by S.K. Katsikas, S. Gritzalis and J. Lopez, LNCS 3093 (Springer-Verlag, 2004), pp. 191-204.
  • 9
    • 0035747559 scopus 로고    scopus 로고
    • K. Aberer and Z. Despotovic, Managing Trust in a Peer-2-Peer Information System, in: Proc. 10th International Conference on Information and Knowledge Management (CIKM'Ol), New York, edited by H. Paques et al. (ACM Press, 2001), pp. 310-317.
    • K. Aberer and Z. Despotovic, Managing Trust in a Peer-2-Peer Information System, in: Proc. 10th International Conference on Information and Knowledge Management (CIKM'Ol), New York, edited by H. Paques et al. (ACM Press, 2001), pp. 310-317.
  • 13
    • 24944562088 scopus 로고    scopus 로고
    • D. Ingram, An Evidence Based Architecture for Efficient, Attack-Resistant Computational Trust Dissemination in Peer-to-Peer Networks, in: Proc. 3rd International Conference on Trust Management, Paris, edited by P. Herrmann et al., LNCS 3477 (Springer-Verlag, 2005), pp. 273-288.
    • D. Ingram, An Evidence Based Architecture for Efficient, Attack-Resistant Computational Trust Dissemination in Peer-to-Peer Networks, in: Proc. 3rd International Conference on Trust Management, Paris, edited by P. Herrmann et al., LNCS 3477 (Springer-Verlag, 2005), pp. 273-288.
  • 14
    • 0036311802 scopus 로고    scopus 로고
    • A Unified Framework for Regulating Access and Information Release on the Web
    • P. Bonatti and P. Samarati, A Unified Framework for Regulating Access and Information Release on the Web, Journal of Computer Security 10 241-272 (2002).
    • (2002) Journal of Computer Security , vol.10 , pp. 241-272
    • Bonatti, P.1    Samarati, P.2
  • 15
    • 1642327001 scopus 로고    scopus 로고
    • Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation
    • T. Yu, M. Winslett, and K.E. Seamons, Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation, ACM Transactions on Information and System Security 6 1-42 (2003).
    • (2003) ACM Transactions on Information and System Security , vol.6 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3
  • 17
    • 33745910556 scopus 로고    scopus 로고
    • A.J. Lee, M. Winslett, J. Basney, and V. Welch, Traust: A Trust Negotiation Based Authorization Service, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 458-462.
    • A.J. Lee, M. Winslett, J. Basney, and V. Welch, Traust: A Trust Negotiation Based Authorization Service, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 458-462.
  • 18
    • 33745877152 scopus 로고    scopus 로고
    • S. Pearson and M.C. Mont, Provision of Trusted Identity Management Using Trust Credentials, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 267-282.
    • S. Pearson and M.C. Mont, Provision of Trusted Identity Management Using Trust Credentials, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 267-282.
  • 19
    • 24944506569 scopus 로고    scopus 로고
    • S. Pearson, Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy, in: Proc. 3rd International Conference on Trust Management, Paris, edited by P. Herrmann et al., LNCS 3477 (Springer-Verlag, 2005), pp. 305-320.
    • S. Pearson, Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy, in: Proc. 3rd International Conference on Trust Management, Paris, edited by P. Herrmann et al., LNCS 3477 (Springer-Verlag, 2005), pp. 305-320.
  • 20
    • 33745877154 scopus 로고    scopus 로고
    • CD. Jensen and P. O Connell, Trust-Based Route Selection in Dynamic Source Routing, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 150-163.
    • CD. Jensen and P. O Connell, Trust-Based Route Selection in Dynamic Source Routing, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 150-163.
  • 21
    • 33745893805 scopus 로고    scopus 로고
    • F. Kerschbaum, J. Haller, Y. Karabulut, and P. Robinson, PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 193-205.
    • F. Kerschbaum, J. Haller, Y. Karabulut, and P. Robinson, PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 193-205.
  • 22
    • 34250724930 scopus 로고    scopus 로고
    • P. Herrmann, Trust-Based Protection of Software Component Users and Designers, in: Proc. 1st International Conference on Trust Management, Heraklion, edited by P. Nixon and S. Terzis, S., LNCS 2692 (Springer-Verlag, 2003), pp. 75-90.
    • P. Herrmann, Trust-Based Protection of Software Component Users and Designers, in: Proc. 1st International Conference on Trust Management, Heraklion, edited by P. Nixon and S. Terzis, S., LNCS 2692 (Springer-Verlag, 2003), pp. 75-90.
  • 24
    • 33745913622 scopus 로고    scopus 로고
    • D. Quercia, S. Hailes, and L. Capra, B. Trust: Bayesian Trust Framework for Pervasive Computing, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 298-312.
    • D. Quercia, S. Hailes, and L. Capra, B. Trust: Bayesian Trust Framework for Pervasive Computing, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 298-312.
  • 25
    • 36649035837 scopus 로고    scopus 로고
    • Service Specification by Composition of Collaborations - An Example
    • Sercomp, Hong Kong IEEE Computer
    • F.A. Kraemer and P. Herrmann, Service Specification by Composition of Collaborations - An Example, in: 2nd International Workshop on Service Composition (Sercomp), Hong Kong (IEEE Computer, 2006).
    • (2006) 2nd International Workshop on Service Composition
    • Kraemer, F.A.1    Herrmann, P.2
  • 31
    • 85042869235 scopus 로고    scopus 로고
    • Transforming Collaborative Service Specifications into Efficiently Executable State Machines
    • to appear in
    • F.A. Kraemer and P. Herrmann, Transforming Collaborative Service Specifications into Efficiently Executable State Machines, to appear in: Electronic Communications of the EASST (2007).
    • (2007) Electronic Communications of the EASST
    • Kraemer, F.A.1    Herrmann, P.2
  • 32
    • 33845431237 scopus 로고    scopus 로고
    • F.A. Kraemer, P. Herrmann, and R. Braek, Aligning UML 2.0 State Machines and Temporal Logic for the Efficient Execution of Services, in: Proc. 8th International Symposium on Distributed Objects and Applications (DOA), Montpellier, edited by R. Meersmann and Z. Tari, LNCS 4276 (Springer-Verlag, 2006), pp. 1613-1632.
    • F.A. Kraemer, P. Herrmann, and R. Braek, Aligning UML 2.0 State Machines and Temporal Logic for the Efficient Execution of Services, in: Proc. 8th International Symposium on Distributed Objects and Applications (DOA), Montpellier, edited by R. Meersmann and Z. Tari, LNCS 4276 (Springer-Verlag, 2006), pp. 1613-1632.
  • 34
    • 84958641324 scopus 로고    scopus 로고
    • + Specifications
    • Correct Hardware Design and Verification Methods CHARME '99, edited by L. Pierre and T. Kropf, Springer-Verlag
    • + Specifications, in: Correct Hardware Design and Verification Methods (CHARME '99), edited by L. Pierre and T. Kropf, LNCS 1703, (Springer-Verlag, 1999), pp. 54-66.
    • (1999) LNCS , vol.1703 , pp. 54-66
    • Yu, Y.1    Manolios, P.2    Lamport, L.3
  • 38
    • 0033691822 scopus 로고    scopus 로고
    • A Framework for Modeling Transfer Protocols
    • P. Herrmann and H. Krumm, A Framework for Modeling Transfer Protocols, Computer Networks 34, 317-337 (2000).
    • (2000) Computer Networks , vol.34 , pp. 317-337
    • Herrmann, P.1    Krumm, H.2
  • 39
    • 0018754237 scopus 로고
    • Unified System Modelling and Implementation
    • Paris
    • R. Braek, Unified System Modelling and Implementation, in: International Switching Symposium, Paris (1979), pp. 1180-1187.
    • (1979) International Switching Symposium , pp. 1180-1187
    • Braek, R.1
  • 42
    • 33745893804 scopus 로고    scopus 로고
    • P. Herrmann, Temporal Logic-Based Specification and Verification of Trust Models, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 105-119.
    • P. Herrmann, Temporal Logic-Based Specification and Verification of Trust Models, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 105-119.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.