메뉴 건너뛰기




Volumn , Issue , 2008, Pages 344-351

Trust modelling in e-commerce through fuzzy cognitive maps

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; CONFORMAL MAPPING; ELECTRONIC COMMERCE; FUZZY RULES; LARGE SCALE SYSTEMS; MAPS; OPTICAL PROJECTORS;

EID: 49049106373     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2008.23     Document Type: Conference Paper
Times cited : (6)

References (23)
  • 2
    • 33750066953 scopus 로고    scopus 로고
    • Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers
    • Proc. of the International Conference on E-Commerce and Web Technologies EC-Web, Springer, pp
    • C. Schläger, M. Sojer, B. Muschall, and G. Pernul, "Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers," Proc. of the International Conference on E-Commerce and Web Technologies (EC-Web 2006), Lecture Notes in Computer Science (LNCS), Vol. 4082, Springer, pp. 132-141.
    • (2006) Lecture Notes in Computer Science (LNCS , vol.4082 , pp. 132-141
    • Schläger, C.1    Sojer, M.2    Muschall, B.3    Pernul, G.4
  • 4
    • 26844545857 scopus 로고    scopus 로고
    • Towards an Ontology of Trust
    • Proc. of the International Conference on Trust, Privacy & Security in Digital Business TrustBus, Springer, pp
    • L. Viljanen, "Towards an Ontology of Trust.," Proc. of the International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2005), Lecture Notes in Computer Science (LNCS), Vol. 3592, Springer, pp. 175-184.
    • (2005) Lecture Notes in Computer Science (LNCS , vol.3592 , pp. 175-184
    • Viljanen, L.1
  • 11
    • 26844573387 scopus 로고    scopus 로고
    • Authentication and Authorisation Infrastructures in b2c E-Commerce
    • Proc. of the International Conference on E-Commerce and Web Technologies EC-Web, Springer, pp
    • C. Schläger, and G. Pernul, "Authentication and Authorisation Infrastructures in b2c E-Commerce," Proc. of the International Conference on E-Commerce and Web Technologies (EC-Web 2005), Lecture Notes in Computer Science (LNCS), Vol. 3590, Springer, pp. 306-315.
    • (2005) Lecture Notes in Computer Science (LNCS , vol.3590 , pp. 306-315
    • Schläger, C.1    Pernul, G.2
  • 15
    • 33646534622 scopus 로고    scopus 로고
    • Trust, Privacy and Security in E-Business: Requirements and Solutions
    • Proc. of the 10th Panhellenic Conference on Informatics PCI 2005, Volas, Greece, Springer, pp
    • S. Katsikas, J. Lopez, and G. Pernul, "Trust, Privacy and Security in E-Business: Requirements and Solutions," Proc. of the 10th Panhellenic Conference on Informatics (PCI 2005), Volas, Greece, Lecture Notes in Computer Science (LNCS), Vol. 3746, Springer, pp. 548-558.
    • Lecture Notes in Computer Science (LNCS , vol.3746 , pp. 548-558
    • Katsikas, S.1    Lopez, J.2    Pernul, G.3
  • 19
    • 38949174954 scopus 로고    scopus 로고
    • On the Effects of Authentication and Authorisation Infrastructures on E-Commerce Environments
    • To be published in the
    • C. Schläger, and T. Nowey, "On the Effects of Authentication and Authorisation Infrastructures on E-Commerce Environments," To be published in the International Journal of Computer Systems Science & Engineering (CSSE), vol. 22, 2007.
    • (2007) International Journal of Computer Systems Science & Engineering (CSSE) , vol.22
    • Schläger, C.1    Nowey, T.2
  • 20
    • 33646149431 scopus 로고    scopus 로고
    • OASIS Security Services Technical Committee
    • OASIS Security Services Technical Committee, "Security Assertion Markup Language (SAML)," 2005; http://www.oasis-open.org/committees/ security/.
    • (2005) Security Assertion Markup Language (SAML)
  • 21
    • 33745883651 scopus 로고    scopus 로고
    • extensible Access Control Markup Language (XACML)
    • OASIS extensible Access Control Markup Language Technical Committee
    • OASIS extensible Access Control Markup Language Technical Committee, "extensible Access Control Markup Language (XACML)," 2005; http://www.oasis-open.org/committees/xacml/.
    • (2005)
  • 22
    • 26844534244 scopus 로고    scopus 로고
    • Privacy Enhanced Technologies: Methods, Markets, Misuse
    • Proc. of the International Conference on Trust, Privacy & Security in Digital Business TrustBus, Springer, pp
    • H. Federrath, "Privacy Enhanced Technologies: Methods, Markets, Misuse," Proc. of the International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2005), Lecture Notes in Computer Science (LNCS), Vol. 3592, Springer, pp. 1-9.
    • (2005) Lecture Notes in Computer Science (LNCS , vol.3592 , pp. 1-9
    • Federrath, H.1
  • 23
    • 49049089653 scopus 로고    scopus 로고
    • A. Anderson, and H. Lockhart, SAML 2.0 Profile of XACML v2.0 (OASIS Standard), 2005; http://docs.oasis-open.org/xacml/2.0/access_control- xacml-2.0-saml-profile-spec-os.pdf.
    • A. Anderson, and H. Lockhart, "SAML 2.0 Profile of XACML v2.0 (OASIS Standard)," 2005; http://docs.oasis-open.org/xacml/2.0/access_control- xacml-2.0-saml-profile-spec-os.pdf.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.