메뉴 건너뛰기




Volumn 4709 LNCS, Issue , 2007, Pages 175-184

Towards a formal framework for computational trust

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTATIONAL METHODS; COMPUTER SIMULATION; MATHEMATICAL MODELS;

EID: 38549115527     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74792-5_8     Document Type: Conference Paper
Times cited : (21)

References (17)
  • 1
    • 84982899264 scopus 로고    scopus 로고
    • The role of trust management in distributed systems security
    • Vitek, J, ed, Secure Internet Programming, Springer, Heidelberg
    • Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The role of trust management in distributed systems security. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol. 1603, pp. 185-210. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1603 , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.D.4
  • 3
    • 35048851489 scopus 로고    scopus 로고
    • A calculus for trust management
    • Lodaya, K, Mahajan, M, eds, FSTTCS 2004, Springer, Heidelberg
    • Carbone, M., Nielsen, M., Sassone, V.: A calculus for trust management. In: Lodaya, K., Mahajan, M. (eds.) FSTTCS 2004. LNCS, vol. 3328, pp. 161-173. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3328 , pp. 161-173
    • Carbone, M.1    Nielsen, M.2    Sassone, V.3
  • 4
    • 38149078755 scopus 로고    scopus 로고
    • Anonymity protocols as noisy channels
    • Proceedings of TGC'06, Springer, Heidelberg to appear
    • Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Anonymity protocols as noisy channels. In: Proceedings of TGC'06. LNCS, Springer, Heidelberg (to appear, 2007)
    • (2007) LNCS
    • Chatzikokolakis, K.1    Palamidessi, C.2    Panangaden, P.3
  • 5
    • 22944492087 scopus 로고    scopus 로고
    • Despotovic, Z., Aberer, K.: A probabilistic approach to predict peers' performance in P2P networks. In: Klusch, M., Ossowski, S., Kashyap, V., Unland, R. (eds.) CIA 2004. LNCS (LNAI), 3191, pp. 62-76. Springer, Heidelberg (2004)
    • Despotovic, Z., Aberer, K.: A probabilistic approach to predict peers' performance in P2P networks. In: Klusch, M., Ossowski, S., Kashyap, V., Unland, R. (eds.) CIA 2004. LNCS (LNAI), vol. 3191, pp. 62-76. Springer, Heidelberg (2004)
  • 6
    • 29244482785 scopus 로고    scopus 로고
    • P2P reputation management: Probabilistic estimation vs. social networks
    • Despotovic, Z., Aberer, K.: P2P reputation management: Probabilistic estimation vs. social networks. Computer Networks 50(4), 485-500 (2006)
    • (2006) Computer Networks , vol.50 , Issue.4 , pp. 485-500
    • Despotovic, Z.1    Aberer, K.2
  • 7
    • 0001951820 scopus 로고    scopus 로고
    • Can we trust trust
    • Gambetta, D, ed, University of Oxford, Department of Sociology, Ch. 13. Electronic edition
    • Gambetta, D.: Can we trust trust. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213-237. University of Oxford, Department of Sociology, Ch. 13. Electronic edition (2000), http://www. sociology.ox.ac.uk/papers/gambetta213-237.pdf
    • (2000) Trust: Making and Breaking Cooperative Relations , pp. 213-237
    • Gambetta, D.1
  • 11
    • 38549170765 scopus 로고    scopus 로고
    • A logical framework for reputation systems
    • to appear, Available online
    • Krukow, K., Nielsen, M., Sassone, V.: A logical framework for reputation systems. Journal of Computer Security (to appear, 2007), Available online http://eprints.ees.soton.ac.uk/13656/
    • (2007) Journal of Computer Security
    • Krukow, K.1    Nielsen, M.2    Sassone, V.3
  • 14
    • 33847638942 scopus 로고    scopus 로고
    • Nielsen, M., Krukow, K., Sassone, V.: A bayesian model for event-based trust. In: Festschrift for Gordon D. Plotkin. ENTCS, Elsevier, Amsterdam (to appear, 2007)
    • Nielsen, M., Krukow, K., Sassone, V.: A bayesian model for event-based trust. In: Festschrift for Gordon D. Plotkin. ENTCS, Elsevier, Amsterdam (to appear, 2007)
  • 15
    • 0024610919 scopus 로고
    • A tutorial on hidden markov models and selected applications in speech recognition
    • Rabiner, L.R.: A tutorial on hidden markov models and selected applications in speech recognition. Proceedings of the IEEE 77(2), 257-286 (1989)
    • (1989) Proceedings of the IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 16
    • 85006210403 scopus 로고    scopus 로고
    • Review on computational trust and reputation models
    • Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artificial Intelligence Review 24(1), 33-60 (2005)
    • (2005) Artificial Intelligence Review , vol.24 , Issue.1 , pp. 33-60
    • Sabater, J.1    Sierra, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.