-
1
-
-
0346111998
-
Mobile agent security based on payment
-
Sonntag, M., Hrmanseder, R.: Mobile agent security based on payment. Operating Systems Review 34(4), 48-55 (2000)
-
(2000)
Operating Systems Review
, vol.34
, Issue.4
, pp. 48-55
-
-
Sonntag, M.1
Hrmanseder, R.2
-
2
-
-
28844475700
-
Selfish grid computing: Game-theoretic modeling and nas performance results Cardiff
-
Cardiff, UK, May, pp
-
Kwok, Y.K., Song, S., Hwang, K.: Selfish grid computing: Game-theoretic modeling and nas performance results Cardiff. In: CCGrid-2005. Proceedings of the International Symposium on Cluster Computing and the Grid, Cardiff, UK, May, pp. 9-12 (2005)
-
(2005)
CCGrid-2005. Proceedings of the International Symposium on Cluster Computing and the Grid
, pp. 9-12
-
-
Kwok, Y.K.1
Song, S.2
Hwang, K.3
-
3
-
-
38549129674
-
-
IEEE (ed.): IEEE Security and Privacy. Economics of Information Security, 3. IEEE Computer Society, Los Alamitos (2005)
-
IEEE (ed.): IEEE Security and Privacy. Economics of Information Security, vol. 3. IEEE Computer Society, Los Alamitos (2005)
-
-
-
-
4
-
-
0009481412
-
A Survey of Trust in Internet Applications
-
Grandison, T., Sloman, M.: A Survey of Trust in Internet Applications. IEEE Communications Surveys 3(4), 2-16 (2000)
-
(2000)
IEEE Communications Surveys
, vol.3
, Issue.4
, pp. 2-16
-
-
Grandison, T.1
Sloman, M.2
-
5
-
-
0042495505
-
An Integrative Model of Organizational Trust
-
Mayer, R.C., Davis, J.H., Schoorman, F.D.: An Integrative Model of Organizational Trust. Academy of Management Review (20), 75-91 (1995)
-
(1995)
Academy of Management Review
, vol.20
, pp. 75-91
-
-
Mayer, R.C.1
Davis, J.H.2
Schoorman, F.D.3
-
6
-
-
0033265783
-
Communication and trust in global virtual teams
-
Jarvenpaa, S.L., Leidner, D.E.: Communication and trust in global virtual teams. Organization Science 10(6), 791-815 (1999)
-
(1999)
Organization Science
, vol.10
, Issue.6
, pp. 791-815
-
-
Jarvenpaa, S.L.1
Leidner, D.E.2
-
7
-
-
0030086382
-
Role Based Access Control Models
-
Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role Based Access Control Models. Computer 29(2) (1996)
-
(1996)
Computer
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
8
-
-
31144439653
-
Generalized role-based access control for securing future applications
-
Baltimore, Md, USA October
-
Moyer, M.J., Covington, M.J., Ahamad, M.: Generalized role-based access control for securing future applications. In: NISSC 2000. 23rd National Information Systems Security Conference, Baltimore, Md, USA (October 2000)
-
(2000)
NISSC 2000. 23rd National Information Systems Security Conference
-
-
Moyer, M.J.1
Covington, M.J.2
Ahamad, M.3
-
9
-
-
33645158709
-
Context-Aware Dynamic Access Control for Pervasive Applications
-
San Diego, CA, USA January
-
Zhang, G., Parashar, M.: Context-Aware Dynamic Access Control for Pervasive Applications. In: Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2004), Western MultiConference (WMC), San Diego, CA, USA (January 2004)
-
(2004)
Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2004), Western MultiConference (WMC)
-
-
Zhang, G.1
Parashar, M.2
-
10
-
-
4143058053
-
Using Trust and Risk in Role-Based Access Control Policies
-
Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J., Moody, K.: Using Trust and Risk in Role-Based Access Control Policies. In: Proceedings of Symposium on Access Control Models and Technologies (2004)
-
(2004)
Proceedings of Symposium on Access Control Models and Technologies
-
-
Dimmock, N.1
Belokosztolszki, A.2
Eyers, D.3
Bacon, J.4
Moody, K.5
-
11
-
-
0009481412
-
A Survey of Trust in Internet Applications
-
Grandison, T., Sloman. M.: A Survey of Trust in Internet Applications. IEEE Communications Surveys 3(4), 2-16 (2000)
-
(2000)
IEEE Communications Surveys
, vol.3
, Issue.4
, pp. 2-16
-
-
Grandison, T.1
Sloman, M.2
-
13
-
-
0036085965
-
Design of a role-based trust management framework
-
IEEE, Los Alamitos
-
Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust management framework. In: 2002 IEEE Symposium on Security and Privacy, pp. 114-131. IEEE, Los Alamitos (2002)
-
(2002)
2002 IEEE Symposium on Security and Privacy
, pp. 114-131
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
14
-
-
38549105488
-
-
Teh-Ming, W., Fidelis, Y.: A policy-driven trust management framework. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, 2692, Springer, Heidelberg (2003)
-
Teh-Ming, W., Fidelis, Y.: A policy-driven trust management framework. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, Springer, Heidelberg (2003)
-
-
-
-
15
-
-
4143058053
-
Using Trust and Risk in Role based Access Control Policies
-
New York, USA, June 2-4, 2004
-
Dimmock, N., Belokosztolszki, A., Eyers, D., et al.: Using Trust and Risk in Role based Access Control Policies. In: SACMAT 2004, New York, USA, June 2-4, 2004 (2004)
-
(2004)
SACMAT
-
-
Dimmock, N.1
Belokosztolszki, A.2
Eyers, D.3
|