메뉴 건너뛰기




Volumn , Issue , 2007, Pages 1266-1273

Trust establishment in distributed networks: Analysis and modeling

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED NETWORKS; TRUST ESTABLISHMENT PROCESSES;

EID: 38549179029     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2007.214     Document Type: Conference Paper
Times cited : (48)

References (27)
  • 1
    • 24944440539 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • A. Josang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," in Decision Support Systems, 2005.
    • (2005) Decision Support Systems
    • Josang, A.1    Ismail, R.2    Boyd, C.3
  • 2
    • 33749027083 scopus 로고    scopus 로고
    • When trust does not compute - the role of trust in ubiquitous computing
    • M. Langheinrich, "When trust does not compute - the role of trust in ubiquitous computing," in Proceedings of UBICOMP'03, 2003.
    • (2003) Proceedings of UBICOMP'03
    • Langheinrich, M.1
  • 5
    • 84947294004 scopus 로고    scopus 로고
    • Modelling a public-key infrastructure
    • Proceedings 1996 European Symposium on Research in Computer SecurityESORICS' 96, of
    • U. Maurer, "Modelling a public-key infrastructure," in Proceedings 1996 European Symposium on Research in Computer Security(ESORICS' 96), volume 1146 of Lecture Notes in Computer Science, pp. 325-350, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1146 , pp. 325-350
    • Maurer, U.1
  • 15
    • 38549129385 scopus 로고    scopus 로고
    • R. Guha, R. Kumar, P. Raghavan, and A.T. Propagation, Propagation of trust and distrust, in Proceedings of International World Wide Web Conference, 2004.
    • R. Guha, R. Kumar, P. Raghavan, and A.T. Propagation, "Propagation of trust and distrust," in Proceedings of International World Wide Web Conference, 2004.
  • 17
    • 85113133621 scopus 로고    scopus 로고
    • CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • September
    • P. Michiardi and R. Molva, "CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," Communication and Multimedia Security, September 2002.
    • (2002) Communication and Multimedia Security
    • Michiardi, P.1    Molva, R.2
  • 18
    • 14844335451 scopus 로고    scopus 로고
    • Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks,
    • S. Buchegger and J. L. Boudec, "Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks," EPFL technical report, 2003.
    • (2003) EPFL technical report
    • Buchegger, S.1    Boudec, J.L.2
  • 22
    • 14844315770 scopus 로고    scopus 로고
    • S. Ganeriwal and M. B. Srivastava, Reputation-based framework for high integrity sensor networks, in Proceedings of ACM Security for Ad-hoc and Sensor Networks (SASN), 2004.
    • S. Ganeriwal and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," in Proceedings of ACM Security for Ad-hoc and Sensor Networks (SASN), 2004.
  • 24
    • 35048898290 scopus 로고    scopus 로고
    • Security and trust in mobile interactions: A study of users' perceptions and reasoning
    • T. Kindberg, A. Sellen, and E. Geelhoed, "Security and trust in mobile interactions: A study of users' perceptions and reasoning," in Proceedings of UBICOMP'04, 2004, pp. 196-213.
    • (2004) Proceedings of UBICOMP'04 , pp. 196-213
    • Kindberg, T.1    Sellen, A.2    Geelhoed, E.3
  • 25
    • 39049164287 scopus 로고    scopus 로고
    • Trust evaluation in anarchy: A case study on autonomous networks
    • T. Jiang and J. S. Baras, "Trust evaluation in anarchy: A case study on autonomous networks," in Proceedings of Infocom '06, 2006.
    • (2006) Proceedings of Infocom '06
    • Jiang, T.1    Baras, J.S.2
  • 26
    • 39049116456 scopus 로고    scopus 로고
    • A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
    • April
    • Y. Sun, Z. Han, W. Yu, and K. J. Ray Liu, "A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks," in Proc. IEEE INFOCOM'06, April 2006.
    • (2006) Proc. IEEE INFOCOM'06
    • Sun, Y.1    Han, Z.2    Yu, W.3    Ray Liu, K.J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.