-
1
-
-
0003544472
-
-
Cheskin Research and Studio Archetype/Sapient
-
Cheskin Research and Studio Archetype/Sapient, eCommerce Trust Study (1999).
-
(1999)
eCommerce Trust Study
-
-
-
3
-
-
0000270621
-
On the Characterisation of a Trusting Agent - Aspects of a Formal Approach
-
edited by C. Castelfranchi and Y.H. Tan Kluwer Academic Publishers
-
A.J.I. Jones and B.S. Firozabadi, On the Characterisation of a Trusting Agent - Aspects of a Formal Approach, in: Trust and Deception in Virtual Societies, edited by C. Castelfranchi and Y.H. Tan (Kluwer Academic Publishers, 2001), pp. 157-168.
-
(2001)
Trust and Deception in Virtual Societies
, pp. 157-168
-
-
Jones, A.J.I.1
Firozabadi, B.S.2
-
4
-
-
84942883016
-
Social Trust: A Cognitive Approach
-
edited by C. Castelfranchi and Y.H. Tan Kluwer Academic Publishers
-
R. Falcone and C. Castelfranchi, Social Trust: A Cognitive Approach, in: Trust and Deception in Virtual Societies, edited by C. Castelfranchi and Y.H. Tan (Kluwer Academic Publishers, 2001), pp. 55-90.
-
(2001)
Trust and Deception in Virtual Societies
, pp. 55-90
-
-
Falcone, R.1
Castelfranchi, C.2
-
5
-
-
34548228048
-
-
N. Mezzetti, A Socially Inspired Reputation Model, in: 1st European Workshop on Public Key Infrastructure (EuroPKI 2004), Samos, edited by S.K. Katsikas, S. Gritzalis and J. Lopez, LNCS 3093 (Springer-Verlag, 2004), pp. 191-204.
-
N. Mezzetti, A Socially Inspired Reputation Model, in: 1st European Workshop on Public Key Infrastructure (EuroPKI 2004), Samos, edited by S.K. Katsikas, S. Gritzalis and J. Lopez, LNCS 3093 (Springer-Verlag, 2004), pp. 191-204.
-
-
-
-
6
-
-
0029700344
-
Decentralized Trust Management
-
Oakland IEEE Computer
-
M. Blaze, J. Feigenbaum, and J. Lacy, Decentralized Trust Management, in: Proc. 17th Symposium on Security and Privacy, Oakland (IEEE Computer, 1996), pp. 164-173.
-
(1996)
Proc. 17th Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
7
-
-
84904260620
-
Specifying and Analysing Trust for Internet Applications
-
Lisbon Kluwer Academic
-
T. Grandison and M. Sloman, Specifying and Analysing Trust for Internet Applications, in: Proc. 2nd IFIP Conference on E-Commerce, E-Business & E-Government (I3E), Lisbon (Kluwer Academic, 2002), pp. 145-157.
-
(2002)
Proc. 2nd IFIP Conference on E-Commerce, E-Business & E-Government (I3E)
, pp. 145-157
-
-
Grandison, T.1
Sloman, M.2
-
8
-
-
0033903726
-
Supporting Trust in Virtual Communities
-
Maui, Hawaii IEEE Computer
-
A. Abdul-Rahman and S. Hailes, Supporting Trust in Virtual Communities, in: Proc. 33rd Hawaii International Conference, Volume 6., Maui, Hawaii (IEEE Computer, 2000).
-
(2000)
Proc. 33rd Hawaii International Conference
, vol.6
-
-
Abdul-Rahman, A.1
Hailes, S.2
-
9
-
-
0035747559
-
-
K. Aberer and Z. Despotovic, Managing Trust in a Peer-2-Peer Information System, in: Proc. 10th International Conference on Information and Knowledge Management (CIKM'Ol), New York, edited by H. Paques et al. (ACM Press, 2001), pp. 310-317.
-
K. Aberer and Z. Despotovic, Managing Trust in a Peer-2-Peer Information System, in: Proc. 10th International Conference on Information and Knowledge Management (CIKM'Ol), New York, edited by H. Paques et al. (ACM Press, 2001), pp. 310-317.
-
-
-
-
12
-
-
84880467894
-
The EigenTrust Algorithm for Reputation Management in P2P Networks
-
Budapest ACM Press
-
S.D. Kamvar, M.T., Schlosser, and H. Garcia-Molina, The EigenTrust Algorithm for Reputation Management in P2P Networks, in: Proc. 12th International World Wide Web Conference, Budapest (ACM Press, 2003).
-
(2003)
Proc. 12th International World Wide Web Conference
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
13
-
-
24944562088
-
-
D. Ingram, An Evidence Based Architecture for Efficient, Attack-Resistant Computational Trust Dissemination in Peer-to-Peer Networks, in: Proc. 3rd International Conference on Trust Management, Paris, edited by P. Herrmann et al., LNCS 3477 (Springer-Verlag, 2005), pp. 273-288.
-
D. Ingram, An Evidence Based Architecture for Efficient, Attack-Resistant Computational Trust Dissemination in Peer-to-Peer Networks, in: Proc. 3rd International Conference on Trust Management, Paris, edited by P. Herrmann et al., LNCS 3477 (Springer-Verlag, 2005), pp. 273-288.
-
-
-
-
14
-
-
0036311802
-
A Unified Framework for Regulating Access and Information Release on the Web
-
P. Bonatti and P. Samarati, A Unified Framework for Regulating Access and Information Release on the Web, Journal of Computer Security 10 241-272 (2002).
-
(2002)
Journal of Computer Security
, vol.10
, pp. 241-272
-
-
Bonatti, P.1
Samarati, P.2
-
15
-
-
1642327001
-
Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation
-
T. Yu, M. Winslett, and K.E. Seamons, Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation, ACM Transactions on Information and System Security 6 1-42 (2003).
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
17
-
-
33745910556
-
-
A.J. Lee, M. Winslett, J. Basney, and V. Welch, Traust: A Trust Negotiation Based Authorization Service, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 458-462.
-
A.J. Lee, M. Winslett, J. Basney, and V. Welch, Traust: A Trust Negotiation Based Authorization Service, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 458-462.
-
-
-
-
18
-
-
33745877152
-
-
S. Pearson and M.C. Mont, Provision of Trusted Identity Management Using Trust Credentials, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 267-282.
-
S. Pearson and M.C. Mont, Provision of Trusted Identity Management Using Trust Credentials, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 267-282.
-
-
-
-
19
-
-
24944506569
-
-
S. Pearson, Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy, in: Proc. 3rd International Conference on Trust Management, Paris, edited by P. Herrmann et al., LNCS 3477 (Springer-Verlag, 2005), pp. 305-320.
-
S. Pearson, Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy, in: Proc. 3rd International Conference on Trust Management, Paris, edited by P. Herrmann et al., LNCS 3477 (Springer-Verlag, 2005), pp. 305-320.
-
-
-
-
20
-
-
33745877154
-
-
CD. Jensen and P. O Connell, Trust-Based Route Selection in Dynamic Source Routing, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 150-163.
-
CD. Jensen and P. O Connell, Trust-Based Route Selection in Dynamic Source Routing, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 150-163.
-
-
-
-
21
-
-
33745893805
-
-
F. Kerschbaum, J. Haller, Y. Karabulut, and P. Robinson, PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 193-205.
-
F. Kerschbaum, J. Haller, Y. Karabulut, and P. Robinson, PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 193-205.
-
-
-
-
22
-
-
34250724930
-
-
P. Herrmann, Trust-Based Protection of Software Component Users and Designers, in: Proc. 1st International Conference on Trust Management, Heraklion, edited by P. Nixon and S. Terzis, S., LNCS 2692 (Springer-Verlag, 2003), pp. 75-90.
-
P. Herrmann, Trust-Based Protection of Software Component Users and Designers, in: Proc. 1st International Conference on Trust Management, Heraklion, edited by P. Nixon and S. Terzis, S., LNCS 2692 (Springer-Verlag, 2003), pp. 75-90.
-
-
-
-
24
-
-
33745913622
-
-
D. Quercia, S. Hailes, and L. Capra, B. Trust: Bayesian Trust Framework for Pervasive Computing, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 298-312.
-
D. Quercia, S. Hailes, and L. Capra, B. Trust: Bayesian Trust Framework for Pervasive Computing, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 298-312.
-
-
-
-
25
-
-
36649035837
-
Service Specification by Composition of Collaborations - An Example
-
Sercomp, Hong Kong IEEE Computer
-
F.A. Kraemer and P. Herrmann, Service Specification by Composition of Collaborations - An Example, in: 2nd International Workshop on Service Composition (Sercomp), Hong Kong (IEEE Computer, 2006).
-
(2006)
2nd International Workshop on Service Composition
-
-
Kraemer, F.A.1
Herrmann, P.2
-
31
-
-
85042869235
-
Transforming Collaborative Service Specifications into Efficiently Executable State Machines
-
to appear in
-
F.A. Kraemer and P. Herrmann, Transforming Collaborative Service Specifications into Efficiently Executable State Machines, to appear in: Electronic Communications of the EASST (2007).
-
(2007)
Electronic Communications of the EASST
-
-
Kraemer, F.A.1
Herrmann, P.2
-
32
-
-
33845431237
-
-
F.A. Kraemer, P. Herrmann, and R. Braek, Aligning UML 2.0 State Machines and Temporal Logic for the Efficient Execution of Services, in: Proc. 8th International Symposium on Distributed Objects and Applications (DOA), Montpellier, edited by R. Meersmann and Z. Tari, LNCS 4276 (Springer-Verlag, 2006), pp. 1613-1632.
-
F.A. Kraemer, P. Herrmann, and R. Braek, Aligning UML 2.0 State Machines and Temporal Logic for the Efficient Execution of Services, in: Proc. 8th International Symposium on Distributed Objects and Applications (DOA), Montpellier, edited by R. Meersmann and Z. Tari, LNCS 4276 (Springer-Verlag, 2006), pp. 1613-1632.
-
-
-
-
34
-
-
84958641324
-
+ Specifications
-
Correct Hardware Design and Verification Methods CHARME '99, edited by L. Pierre and T. Kropf, Springer-Verlag
-
+ Specifications, in: Correct Hardware Design and Verification Methods (CHARME '99), edited by L. Pierre and T. Kropf, LNCS 1703, (Springer-Verlag, 1999), pp. 54-66.
-
(1999)
LNCS
, vol.1703
, pp. 54-66
-
-
Yu, Y.1
Manolios, P.2
Lamport, L.3
-
38
-
-
0033691822
-
A Framework for Modeling Transfer Protocols
-
P. Herrmann and H. Krumm, A Framework for Modeling Transfer Protocols, Computer Networks 34, 317-337 (2000).
-
(2000)
Computer Networks
, vol.34
, pp. 317-337
-
-
Herrmann, P.1
Krumm, H.2
-
39
-
-
0018754237
-
Unified System Modelling and Implementation
-
Paris
-
R. Braek, Unified System Modelling and Implementation, in: International Switching Symposium, Paris (1979), pp. 1180-1187.
-
(1979)
International Switching Symposium
, pp. 1180-1187
-
-
Braek, R.1
-
40
-
-
33845461378
-
Quality by Construction Exemplified by TIMe - The Integrated Methodology
-
R. Braek, J. Gorman, Ø. Haugen, G. Melby, B. Møller-Pedersen, and R.T. Sanders, Quality by Construction Exemplified by TIMe - The Integrated Methodology, Telektronikk 95, 73-82 (1997).
-
(1997)
Telektronikk
, vol.95
, pp. 73-82
-
-
Braek, R.1
Gorman, J.2
Haugen, O.3
Melby, G.4
Møller-Pedersen, B.5
Sanders, R.T.6
-
42
-
-
33745893804
-
-
P. Herrmann, Temporal Logic-Based Specification and Verification of Trust Models, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 105-119.
-
P. Herrmann, Temporal Logic-Based Specification and Verification of Trust Models, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. Stølen et al., LNCS 3986 (Springer-Verlag, 2006), pp. 105-119.
-
-
-
|