-
3
-
-
0009481412
-
A Survey of Trust in Internet Applications. IEEE Communications and Survey
-
Grandison, T., Sloman, M.: A Survey of Trust in Internet Applications. IEEE Communications and Survey, Forth Quarter 3(4), 2-16 (2000)
-
(2000)
Forth Quarter
, vol.3
, Issue.4
, pp. 2-16
-
-
Grandison, T.1
Sloman, M.2
-
4
-
-
85088201822
-
Leveraging Architectural Models to Inject Trust into Software Systems. ACM SIGSOFT Software Engineering Notes
-
Banerjee, S., Mattmann, C.A., Medvidovic, N., Golubchik, L.: Leveraging Architectural Models to Inject Trust into Software Systems. ACM SIGSOFT Software Engineering Notes. In: Proceedings of the 2005 workshop on software engineering for secure systems-building trustworthy applications SESS '05, vol. 30(4) (2005)
-
(2005)
Proceedings of the 2005 workshop on software engineering for secure systems-building trustworthy applications SESS '05
, vol.30
, Issue.4
-
-
Banerjee, S.1
Mattmann, C.A.2
Medvidovic, N.3
Golubchik, L.4
-
5
-
-
28444451552
-
A P2P Global Trust Model Based on Recommendation
-
Zhang, Z., Wang, X., Wang, Y.: A P2P Global Trust Model Based on Recommendation. In: Proceedings of 2005 International Conference on Machine Learning and Cybernetics, vol. 7, pp. 3975-3980 (2005)
-
(2005)
Proceedings of 2005 International Conference on Machine Learning and Cybernetics
, vol.7
, pp. 3975-3980
-
-
Zhang, Z.1
Wang, X.2
Wang, Y.3
-
6
-
-
4644323662
-
Enhancing Grid Security with Trust Management
-
Lin, C., Varadharajan, V., Wang, Y., Pruthi, V.: Enhancing Grid Security with Trust Management. In: Proceedings of IEEE International Conference on Services Computing, pp. 303-310 (2004)
-
(2004)
Proceedings of IEEE International Conference on Services Computing
, pp. 303-310
-
-
Lin, C.1
Varadharajan, V.2
Wang, Y.3
Pruthi, V.4
-
7
-
-
33144465932
-
Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks
-
Sun, Y., Yu, W., Han, Z., Liu, K.J.R.: Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks. IEEE Journal on Selected Area in Communications 24(2), 305-317 (2006)
-
(2006)
IEEE Journal on Selected Area in Communications
, vol.24
, Issue.2
, pp. 305-317
-
-
Sun, Y.1
Yu, W.2
Han, Z.3
Liu, K.J.R.4
-
8
-
-
33845924801
-
A Multi-Property Trust Model for Reconfiguring Component Software
-
Zhou, M., Mei, H., Zhang, L.: A Multi-Property Trust Model for Reconfiguring Component Software. In: The Fifth International Conference on Quality Software QAIC 2005, pp. 142-149 (2005)
-
(2005)
The Fifth International Conference on Quality Software
, vol.QAIC 2005
, pp. 142-149
-
-
Zhou, M.1
Mei, H.2
Zhang, L.3
-
9
-
-
34250724930
-
-
Herrmann, P.: Trust-Based Protection of Software Component Users and Designers. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, 2692, Springer, Heidelberg (2003)
-
Herrmann, P.: Trust-Based Protection of Software Component Users and Designers. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, Springer, Heidelberg (2003)
-
-
-
-
10
-
-
33750076651
-
-
Yan, Z., MacLaverty, R.: Autonomic Trust Management in a Component Based Software System. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, 4158, pp. 279-292. Springer, Heidelberg (2006)
-
Yan, Z., MacLaverty, R.: Autonomic Trust Management in a Component Based Software System. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, vol. 4158, pp. 279-292. Springer, Heidelberg (2006)
-
-
-
|