메뉴 건너뛰기




Volumn 263, Issue , 2008, Pages 17-32

A trust evaluation method based on logic and probability theory

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK SECURITY; PROBABILITY;

EID: 44049085117     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-09428-1_2     Document Type: Conference Paper
Times cited : (9)

References (26)
  • 2
    • 0002863367 scopus 로고
    • Valuation of trust in open networks
    • ES-ORICS'94, 3rd European Symposium on Research in Computer Security, Springer
    • T. Beth, M. Borcherding, and B. Klein. Valuation of trust in open networks. In ES-ORICS'94, 3rd European Symposium on Research in Computer Security, LNCS 875, pages 3-18. Springer, 1994.
    • (1994) LNCS , vol.875 , pp. 3-18
    • Beth, T.1    Borcherding, M.2    Klein, B.3
  • 5
    • 0025023289 scopus 로고
    • Reasoning About Belief in Cryptographic Protocols
    • Deborah Cooper and Teresa Lunt, editors, IEEE Computer Society
    • L. Gong, R. Needham, and R. Yahalom. Reasoning About Belief in Cryptographic Protocols. In Deborah Cooper and Teresa Lunt, editors, Proceedings 1990 IEEE Symposium on Research in Security and Privacy, pages 234-248. IEEE Computer Society, 1990.
    • (1990) Proceedings 1990 IEEE Symposium on Research in Security and Privacy , pp. 234-248
    • Gong, L.1    Needham, R.2    Yahalom, R.3
  • 6
    • 10844288659 scopus 로고    scopus 로고
    • Using probabilistic argumentation for key validation in public-key cryptography
    • R. Haenni. Using probabilistic argumentation for key validation in public-key cryptography. International Journal of Approximate Reasoning, 38(3):355-376, 2005.
    • (2005) International Journal of Approximate Reasoning , vol.38 , Issue.3 , pp. 355-376
    • Haenni, R.1
  • 9
    • 44049107566 scopus 로고    scopus 로고
    • R. Haenni, J. Kohlas, and N. Lehmann. Probabilistic argumentation systems. In D. M. Gabbay and P. Smets, editors, Handbook of Defeasible Reasoning and Uncertainty Management Systems, 5: Algorithms for Uncertainty and Defeasible Reasoning, pages 221-288. Kluwer Academic Publishers, Dordrecht, Netherlands, 2000.
    • R. Haenni, J. Kohlas, and N. Lehmann. Probabilistic argumentation systems. In D. M. Gabbay and P. Smets, editors, Handbook of Defeasible Reasoning and Uncertainty Management Systems, volume 5: Algorithms for Uncertainty and Defeasible Reasoning, pages 221-288. Kluwer Academic Publishers, Dordrecht, Netherlands, 2000.
  • 12
    • 84883293902 scopus 로고    scopus 로고
    • Credential networks: A general model for distributed trust and authenticity management
    • A. Ghorbani and S. Marsh, editors, St. Andrews, Canada
    • J. Jonczy and R. Haenni. Credential networks: A general model for distributed trust and authenticity management. In A. Ghorbani and S. Marsh, editors, PST'05: 3rd Annual Conference on Privacy, Security and Trust, pages 101-112, St. Andrews, Canada, 2005.
    • (2005) PST'05: 3rd Annual Conference on Privacy, Security and Trust , pp. 101-112
    • Jonczy, J.1    Haenni, R.2
  • 16
    • 0003356491 scopus 로고
    • A Mathematical Theory of Hints. An Approach to the Dempster-Shafer Theory of Evidence
    • of, Springer
    • J. Kohlas and P. A. Monney. A Mathematical Theory of Hints. An Approach to the Dempster-Shafer Theory of Evidence, volume 425 of Lecture Notes in Economics and Mathematical Systems. Springer, 1995.
    • (1995) Lecture Notes in Economics and Mathematical Systems , vol.425
    • Kohlas, J.1    Monney, P.A.2
  • 17
    • 84879862445 scopus 로고    scopus 로고
    • A new model for public-key authentication
    • T. Braun, G. Carle, and B. Stiller, editors, Berne, Switzerland
    • R. Kohlas, R. Haenni, and J. Jonczy. A new model for public-key authentication. In T. Braun, G. Carle, and B. Stiller, editors, KiVS'07, Kommunikation in Verteilten Systemen, pages 213-224, Berne, Switzerland, 2007.
    • (2007) KiVS'07, Kommunikation in Verteilten Systemen , pp. 213-224
    • Kohlas, R.1    Haenni, R.2    Jonczy, J.3
  • 18
    • 84957803553 scopus 로고
    • Confidence valuation in a public-key infrastructure based on uncertain evidence
    • H. Imai and Y. Zheng, editors, PKC'2000, Third International Workshop on Practice and Theory in Public Key Cryptography, Melbourne, Australia, Springer
    • R. Kohlas and U. Maurer. Confidence valuation in a public-key infrastructure based on uncertain evidence. In H. Imai and Y. Zheng, editors, PKC'2000, Third International Workshop on Practice and Theory in Public Key Cryptography, LNCS 1751, pages 93-112, Melbourne, Australia, 2000. Springer.
    • (1751) LNCS , pp. 93-112
    • Kohlas, R.1    Maurer, U.2
  • 19
    • 85084162792 scopus 로고    scopus 로고
    • Attack-resistant trust metrics for public key certification
    • R. Levien and A. Aiken. Attack-resistant trust metrics for public key certification. In 7th on USENIX Security Symposium, pages 229-242, 1998.
    • (1998) 7th on USENIX Security Symposium , pp. 229-242
    • Levien, R.1    Aiken, A.2
  • 21
    • 84947294004 scopus 로고    scopus 로고
    • Modelling a public-key infrastructure
    • E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors, ESORICS, European Symposium on Research in Computer Security, Springer
    • U. Maurer. Modelling a public-key infrastructure. In E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors, ESORICS, European Symposium on Research in Computer Security, LNCS 1146, pages 324-350. Springer, 1996.
    • (1996) LNCS , vol.1146 , pp. 324-350
    • Maurer, U.1
  • 24
    • 44049094370 scopus 로고    scopus 로고
    • R. L. Rivest, A. Shamir, and L. M. Adelman. A method for obtaining digital signatures and public-key cryptosystems. Technical Report TM-82, MIT, Cambridge, USA, 1977.
    • R. L. Rivest, A. Shamir, and L. M. Adelman. A method for obtaining digital signatures and public-key cryptosystems. Technical Report TM-82, MIT, Cambridge, USA, 1977.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.