-
1
-
-
24644498665
-
History-based access control with local policies
-
Springer-Verlag
-
M. Bartoletti, P. Degano and G.L. Ferrari, History-based access control with local policies, in: Foundations of Software Science and Computational Structures: 8th International Conference, FOSSACS 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Edinburgh, UK, April 4-8, 2005, Proceedings, Springer-Verlag, 2005, pp. 316-332.
-
(2005)
Foundations of Software Science and Computational Structures: 8th International Conference, FOSSACS 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Edinburgh, UK, April 4-8, 2005, Proceedings
, pp. 316-332
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.L.3
-
3
-
-
2442549069
-
Using trust for secure collaboration in uncertain environments
-
V. Cahill, E. Gray et al., Using trust for secure collaboration in uncertain environments, IEEE Pervasive Computing 2(3) (2003), 52-61.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.3
, pp. 52-61
-
-
Cahill, V.1
Gray, E.2
-
5
-
-
35048851489
-
A calculus for trust management
-
Springer-Verlag
-
M. Carbone, M. Nielsen and V. Sassone, A calculus for trust management, in: Proceedings from Foundations of Software Technology and Theoretical Computer Science: 24th International Conference (FSTTCS'04), Springer-Verlag, 2004, pp. 161-173.
-
(2004)
Proceedings from Foundations of Software Technology and Theoretical Computer Science: 24th International Conference (FSTTCS'04)
, pp. 161-173
-
-
Carbone, M.1
Nielsen, M.2
Sassone, V.3
-
6
-
-
0242641140
-
The digitization of word of mouth: Promise and challenges of online feedback mechanisms
-
C. Dellarocas, The digitization of word of mouth: Promise and challenges of online feedback mechanisms, Management Science 49(10) (2003), 1407-1424.
-
(2003)
Management Science
, vol.49
, Issue.10
, pp. 1407-1424
-
-
Dellarocas, C.1
-
7
-
-
85036993171
-
-
C. Dellarocas, Sanctioning reputation mechanisms in online trading environments with moral hazard, Working paper. Available online: http://ccs.mit.edu/dell, July 2004.
-
C. Dellarocas, Sanctioning reputation mechanisms in online trading environments with moral hazard, Working paper. Available online: http://ccs.mit.edu/dell, July 2004.
-
-
-
-
8
-
-
84925488778
-
-
eBay Inc
-
eBay Inc, The eBay website, http://www.ebay.com.
-
The eBay website
-
-
-
9
-
-
0032218233
-
History-based access control for mobile code
-
ACM Press
-
G. Edjlali, A. Acharya and V. Chaudhary, History-based access control for mobile code, in: Proceedings from the 5th ACM Conference on Computer and Communications Security (CCS'98), ACM Press, 1998, pp. 38-48.
-
(1998)
Proceedings from the 5th ACM Conference on Computer and Communications Security (CCS'98)
, pp. 38-48
-
-
Edjlali, G.1
Acharya, A.2
Chaudhary, V.3
-
13
-
-
84888249425
-
Synthesizing monitors for safety properties
-
Tools and Algorithms for the Construction and Analysis of Systems: 8th International Conference TACAS'02, Springer-Verlag
-
K. Havelund and G. Roşu, Synthesizing monitors for safety properties, in: Tools and Algorithms for the Construction and Analysis of Systems: 8th International Conference (TACAS'02), Lecture Notes in Computer Science, Vol. 2280, Springer-Verlag, 2002, pp. 342-356.
-
(2002)
Lecture Notes in Computer Science
, vol.2280
, pp. 342-356
-
-
Havelund, K.1
Roşu, G.2
-
15
-
-
33846834126
-
-
A. Jøsang, R. Ismail and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems 43(2) (2007), 618-644. (Preprint available online: http://sky.fit.qut. edu.au/~josang/).
-
A. Jøsang, R. Ismail and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems 43(2) (2007), 618-644. (Preprint available online: http://sky.fit.qut. edu.au/~josang/).
-
-
-
-
16
-
-
0001886678
-
Multi-valued decision diagrams: Theory and applications
-
X Kam, X Villa, R.K. Brayton and A.L. Sangiovanni-Vincentelli, Multi-valued decision diagrams: Theory and applications, International Journal on Multiple-Valued Logic 4(1-2) (1998), 9-62.
-
(1998)
International Journal on Multiple-Valued Logic
, vol.4
, Issue.1-2
, pp. 9-62
-
-
Kam, X.1
Villa, X.2
Brayton, R.K.3
Sangiovanni-Vincentelli, A.L.4
-
17
-
-
84880467894
-
The Eigentrust algorithm for reputation management in p2p networks
-
ACM Press, New York, NY, USA
-
S.D. Kamvar, M.X Schlosser and H. Garcia-Molina, The Eigentrust algorithm for reputation management in p2p networks, in: WWW'03: Proceedings of the 12th international conference on World Wide Web, ACM Press, New York, NY, USA, 2003, pp. 640-651.
-
(2003)
WWW'03: Proceedings of the 12th international conference on World Wide Web
, pp. 640-651
-
-
Kamvar, S.D.1
Schlosser, M.X.2
Garcia-Molina, H.3
-
18
-
-
0036685743
-
The DSD schema language
-
N. Klarlund, A. Møller and M.I. Schwartzbach, The DSD schema language, Automated Software Engineering 9(3) (2002), 285-319.
-
(2002)
Automated Software Engineering
, vol.9
, Issue.3
, pp. 285-319
-
-
Klarlund, N.1
Møller, A.2
Schwartzbach, M.I.3
-
19
-
-
37249026266
-
-
in online markets
-
P. Kollock, The production of trust in online markets, http://www.ssc.net.ucla.edu/soc/faculty/kollock/papers/online_trust.htm.
-
The production of trust
-
-
Kollock, P.1
-
20
-
-
44149093434
-
Reputation and imperfect information
-
D. Kreps, R. Milgrom, J. Roberts and R. Wilson, Reputation and imperfect information, Journal of Economic Theory 27(2) (1982), 253-279.
-
(1982)
Journal of Economic Theory
, vol.27
, Issue.2
, pp. 253-279
-
-
Kreps, D.1
Milgrom, R.2
Roberts, J.3
Wilson, R.4
-
21
-
-
33947632776
-
-
PhD thesis, University of Aarhus, Denmark, Aug, Available online
-
K. Krukow, Towards a theory of trust for the global ubiquitous computer, PhD thesis, University of Aarhus, Denmark, Aug. 2006. Available online: http://www.brics.dk/~krukow.
-
(2006)
Towards a theory of trust for the global ubiquitous computer
-
-
Krukow, K.1
-
22
-
-
0036044742
-
Temporal logic with forgettable past
-
IEEE Computer Society Press
-
F. Laroussinie, N. Markey and P. Schnoebelen, Temporal logic with forgettable past, in: Proceedings from the 17th IEEE Symposium on Logic in Computer Science (LICS'02), IEEE Computer Society Press, 2002, pp. 383-392.
-
(2002)
Proceedings from the 17th IEEE Symposium on Logic in Computer Science (LICS'02)
, pp. 383-392
-
-
Laroussinie, F.1
Markey, N.2
Schnoebelen, P.3
-
24
-
-
85036980399
-
-
A. Møller, The DSD2.0 project website, http://www.brics.dk/DSD/, 2005.
-
A. Møller, The DSD2.0 project website, http://www.brics.dk/DSD/, 2005.
-
-
-
-
25
-
-
0036367840
-
Notions of reputation in multi-agents systems: A review
-
ACM Press
-
L. Mui, M. Mohtashemi and A. Halberstadt, Notions of reputation in multi-agents systems: A review, in: Proceedings from The First International Joint Conference on Autonomous Agents & Multiagent Systems (AAMAS'02), ACM Press, 2002, pp. 280-287.
-
(2002)
Proceedings from The First International Joint Conference on Autonomous Agents & Multiagent Systems (AAMAS'02)
, pp. 280-287
-
-
Mui, L.1
Mohtashemi, M.2
Halberstadt, A.3
-
26
-
-
27944466459
-
On the formal modelling of trust in reputation-based systems
-
Theory Is Forever: Essays Dedicated to Arto Salomaa on the Occasion of His 70th Birthday, J. Karhumaki, H. Maurer, G. Paun and G. Rozenberg, eds, Springer-Verlag
-
M. Nielsen and K. Krukow, On the formal modelling of trust in reputation-based systems, in: Theory Is Forever: Essays Dedicated to Arto Salomaa on the Occasion of His 70th Birthday, J. Karhumaki, H. Maurer, G. Paun and G. Rozenberg, eds, Lecture Notes in Computer Science, Vol. 3113, Springer-Verlag, 2004, pp. 192-204.
-
(2004)
Lecture Notes in Computer Science
, vol.3113
, pp. 192-204
-
-
Nielsen, M.1
Krukow, K.2
-
30
-
-
0002101577
-
Reputation systems
-
P. Resnick, R. Zeckhauser, E. Friedman and K. Kuwabara, Reputation systems, Communications of the ACM 43(12) (2000), 45-48.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Zeckhauser, R.2
Friedman, E.3
Kuwabara, K.4
-
32
-
-
84881225236
-
Enforceable security policies
-
F.B. Schneider, Enforceable security policies, Journal of the ACM 3(1) (2000), 30-50.
-
(2000)
Journal of the ACM
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
34
-
-
0022092438
-
The complexity of prepositional linear temporal logics
-
A.P. Sistla and E.M. Clarke, The complexity of prepositional linear temporal logics, Journal of the ACM 32(3) (1985), 733-749.
-
(1985)
Journal of the ACM
, vol.32
, Issue.3
, pp. 733-749
-
-
Sistla, A.P.1
Clarke, E.M.2
-
35
-
-
35048838770
-
History effects and verification
-
Springer-Verlag
-
C. Skalka and S. Smith, History effects and verification, in: Programming Languages and Systems: Second Asian Symposium, APLAS 2004, Taipei, Taiwan, November 4-6, 2004, Proceedings, Springer-Verlag, 2005, pp. 107-128.
-
(2005)
Programming Languages and Systems: Second Asian Symposium, APLAS 2004, Taipei, Taiwan, November 4-6, 2004, Proceedings
, pp. 107-128
-
-
Skalka, C.1
Smith, S.2
-
36
-
-
0015773009
-
Word problems requiring exponential time(preliminary report)
-
ACM Press, New York, NY, USA
-
L.J. Stockmeyer and A.R. Meyer, Word problems requiring exponential time(preliminary report), in: Proceedings of the fifth annual ACM symposium on Theory of computing (STOC'73), ACM Press, New York, NY, USA, 1973, pp. 1-9.
-
(1973)
Proceedings of the fifth annual ACM symposium on Theory of computing (STOC'73)
, pp. 1-9
-
-
Stockmeyer, L.J.1
Meyer, A.R.2
-
38
-
-
0002846846
-
Reputations in games and markets
-
A. Roth, ed, Cambridge University Press
-
R. Wilson, Reputations in games and markets, in: Game-Theoretic Models of Bargaining, A. Roth, ed., Cambridge University Press, 1985, pp. 27-62.
-
(1985)
Game-Theoretic Models of Bargaining
, pp. 27-62
-
-
Wilson, R.1
-
39
-
-
85034211340
-
Event structure semantics for CCS and related languages
-
Springer-Verlag
-
G. Winskel, Event structure semantics for CCS and related languages, in: Proceedings from ICALP 1982, Lecture Notes in Computer Science, Vol. 140, Springer-Verlag, 1982, pp. 561-576.
-
(1982)
Proceedings from ICALP 1982, Lecture Notes in Computer Science
, vol.140
, pp. 561-576
-
-
Winskel, G.1
-
40
-
-
0002659052
-
Models for concurrency
-
S. Abramsky, D.M. Gabbay and T.S.E. Maibaum, eds, Oxford University Press
-
G. Winskel and M. Nielsen, Models for concurrency, in: Handbook of Logic in Computer Science, Vol. 4, S. Abramsky, D.M. Gabbay and T.S.E. Maibaum, eds, Oxford University Press, 1995, pp. 1-148.
-
(1995)
Handbook of Logic in Computer Science
, vol.4
, pp. 1-148
-
-
Winskel, G.1
Nielsen, M.2
-
41
-
-
4143074723
-
A logical specification for usage control
-
ACM Press
-
X. Zhang, J. Park, F. Parusu-Presicce and R. Sandhu, A logical specification for usage control, in: Proceedings from the ninth ACM Symposium on Access Control models and Technologies (SACMAT'04), ACM Press, 2004, pp. 1-10.
-
(2004)
Proceedings from the ninth ACM Symposium on Access Control models and Technologies (SACMAT'04)
, pp. 1-10
-
-
Zhang, X.1
Park, J.2
Parusu-Presicce, F.3
Sandhu, R.4
|