메뉴 건너뛰기




Volumn 366, Issue 1881, 2008, Pages 3781-3793

Trust models in ubiquitous computing

Author keywords

Probabilistic modelling; Science for ubiquitous computing; Trust and reputation management

Indexed keywords

PROBABILISTIC MODELLING; SCIENCE FOR UBIQUITOUS COMPUTING; TRUST AND REPUTATION MANAGEMENT; TRUST MODELING;

EID: 51849163735     PISSN: 1364503X     EISSN: None     Source Type: Journal    
DOI: 10.1098/rsta.2008.0134     Document Type: Article
Times cited : (37)

References (54)
  • 5
    • 84958048748 scopus 로고    scopus 로고
    • Compliance checking in the PolicyMaker trust management system
    • Proc. Financial Cryptography: 2nd Int. Conf, FC'98, Berlin, Germany: Springer
    • Blaze, M., Feigenbaum, J. & Strauss, M. 1998 Compliance checking in the PolicyMaker trust management system. In Proc. Financial Cryptography: 2nd Int. Conf. (FC'98). Lecture Notes in Computer Science, no. 1465, pp. 254-274. Berlin, Germany: Springer.
    • (1998) Lecture Notes in Computer Science , vol.1465 , pp. 254-274
    • Blaze, M.1    Feigenbaum, J.2    Strauss, M.3
  • 6
    • 85020827561 scopus 로고    scopus 로고
    • Blaze, M., Feigenbaum, J., Ionnidis, J. & Keromytis, A. D. 1999a The KeyNote trust management system, version 2, RFC-2704. See ftp://ftp.rfc-editor.org/in-notes/rfc2704.txt.
    • Blaze, M., Feigenbaum, J., Ionnidis, J. & Keromytis, A. D. 1999a The KeyNote trust management system, version 2, RFC-2704. See ftp://ftp.rfc-editor.org/in-notes/rfc2704.txt.
  • 7
    • 84982899264 scopus 로고    scopus 로고
    • The role of trust management in distributed systems security
    • Secure internet programming: security issues for mobile and distributed objects eds J. Vitek & C. D. Jensen, Berlin, Germany: Springer
    • Blaze, M., Feigenbaum, J., Ionnidis, J. & Keromytis, A. D. 1999b The role of trust management in distributed systems security. In Secure internet programming: security issues for mobile and distributed objects (eds J. Vitek & C. D. Jensen). Lecture Notes in Computer Science, no. 1603, pp. 185-210. Berlin, Germany: Springer.
    • (1999) Lecture Notes in Computer Science , Issue.1603 , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Ionnidis, J.3    Keromytis, A.D.4
  • 8
    • 84957800809 scopus 로고    scopus 로고
    • KeyNote: Trust management for public-key infrastructures
    • Proc. Security Protocols: 6th Int. Workshop, Berlin, Germany: Springer
    • Blaze, M., Feigenbaum, J. & Keromytis, A. D. 1999c KeyNote: trust management for public-key infrastructures. In Proc. Security Protocols: 6th Int. Workshop. Lecture Notes in Computer Science, no. 1550, pp. 59-63. Berlin, Germany: Springer.
    • (1999) Lecture Notes in Computer Science , vol.1550 , pp. 59-63
    • Blaze, M.1    Feigenbaum, J.2    Keromytis, A.D.3
  • 10
    • 84949238095 scopus 로고    scopus 로고
    • Offline micropayments without trusted hardware
    • Financial Cryptography, 5th Int. Conf, FC'01, ed. P. F. Syverson, Berlin, Germany: Springer
    • Blaze, M., Ionnidis, J. & Keromytis, A. D. 2002 Offline micropayments without trusted hardware. In Financial Cryptography, 5th Int. Conf. (FC'01) (ed. P. F. Syverson). Lecture Notes in Computer Science, no. 2339, pp. 21-40. Berlin, Germany: Springer.
    • (2002) Lecture Notes in Computer Science , vol.2339 , pp. 21-40
    • Blaze, M.1    Ionnidis, J.2    Keromytis, A.D.3
  • 12
    • 2442549069 scopus 로고    scopus 로고
    • Using trust for secure collaboration in uncertain environments
    • doi:10.1109/MPRV.2003.1228527
    • Cahill, V. et al. 2003 Using trust for secure collaboration in uncertain environments. IEEE Pervasive Comput. 2, 52-61. (doi:10.1109/MPRV.2003.1228527)
    • (2003) IEEE Pervasive Comput , vol.2 , pp. 52-61
    • Cahill, V.1
  • 14
    • 33646551446 scopus 로고    scopus 로고
    • Nonmonotonic trust management for P2P applications
    • 1st Int. Workshop on Security and Trust Management STM, Amsterdam, The Netherlands: Elsevier
    • Czenko, M., Tran, H., Doumen, J., Etalle, S., Hartel, P. & den Hartog, J. 2005 Nonmonotonic trust management for P2P applications. In 1st Int. Workshop on Security and Trust Management (STM). Electronic Notes in Theoretical Computer Science, vol. 157, pp. 101-116. Amsterdam, The Netherlands: Elsevier.
    • (2005) Electronic Notes in Theoretical Computer Science , vol.157 , pp. 101-116
    • Czenko, M.1    Tran, H.2    Doumen, J.3    Etalle, S.4    Hartel, P.5    den Hartog, J.6
  • 16
    • 0242641140 scopus 로고    scopus 로고
    • The digitization of word of mouth: Promise and challenges of online feedback mechanisms
    • doi:10.1287/mnsc.49.10.1407.17308
    • Dellarocas, C. 2003 The digitization of word of mouth: promise and challenges of online feedback mechanisms. Manage. Sci. 49, 1407-1424. (doi:10.1287/mnsc.49.10.1407.17308)
    • (2003) Manage. Sci , vol.49 , pp. 1407-1424
    • Dellarocas, C.1
  • 17
    • 14044267274 scopus 로고    scopus 로고
    • Sanctioning reputation mechanisms in online trading environments with moral hazard. Working paper
    • Dellarocas, C. 2004 Sanctioning reputation mechanisms in online trading environments with moral hazard. Working paper. See http://ccs.mit.edu/dell.
    • (2004)
    • Dellarocas, C.1
  • 18
    • 22944492087 scopus 로고    scopus 로고
    • A probabilistic approach to predict peers' performance in P2P networks
    • Proc. 8th Int. Workshop on Cooperative Information Agents CIA 2004, Berlin, Germany: Springer
    • Despotovic, Z. & Aberer, K. 2004 A probabilistic approach to predict peers' performance in P2P networks. In Proc. 8th Int. Workshop on Cooperative Information Agents (CIA 2004). Lecture Notes in Computer Science, no. 3191, pp. 62-76. Berlin, Germany: Springer.
    • (2004) Lecture Notes in Computer Science , vol.3191 , pp. 62-76
    • Despotovic, Z.1    Aberer, K.2
  • 19
    • 29244482785 scopus 로고    scopus 로고
    • P2P reputation management: Probabilistic estimation vs. social networks
    • doi:10.1016/j.comnet.2005.07.003
    • Despotovic, Z. & Aberer, K. 2006 P2P reputation management: probabilistic estimation vs. social networks. Comput. Netw. 60, 485-500. (doi:10.1016/j.comnet.2005.07.003)
    • (2006) Comput. Netw , vol.60 , pp. 485-500
    • Despotovic, Z.1    Aberer, K.2
  • 20
  • 21
    • 85020775650 scopus 로고    scopus 로고
    • Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B. & Ylonen, T. 1999 SPKI certificate theory, RFC 2693. See ftp://ftp.rfc-editor.org/ in-notes/rfc2693.txt.
    • Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B. & Ylonen, T. 1999 SPKI certificate theory, RFC 2693. See ftp://ftp.rfc-editor.org/ in-notes/rfc2693.txt.
  • 24
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A trust management system with certified evaluation
    • Oakland, CA: IEEE Computer Society Press
    • Jim, T. 2001 SD3: a trust management system with certified evaluation. In Proc. 2001 IEEE Symposium on Security and Privacy, pp. 106-115. Oakland, CA: IEEE Computer Society Press.
    • (2001) Proc. 2001 IEEE Symposium on Security and Privacy , pp. 106-115
    • Jim, T.1
  • 25
    • 85150403522 scopus 로고    scopus 로고
    • Jøsang, A. 2001 A logic for uncertain probabilities. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 9, 279-311.
    • Jøsang, A. 2001 A logic for uncertain probabilities. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 9, 279-311.
  • 27
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • doi:10.1016/j.dss.2005.05.019
    • Jøsang, A., Ismail, R. & Boyd, C. 2006 A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43, 618-644. (doi:10.1016/j.dss.2005.05.019)
    • (2006) Decis. Support Syst , vol.43 , pp. 618-644
    • Jøsang, A.1    Ismail, R.2    Boyd, C.3
  • 28
  • 29
    • 44149093434 scopus 로고
    • Reputation and imperfect information
    • doi:10.1016/0022-0531(82)90030-8
    • Kreps, D. & Wilson, R. 1982 Reputation and imperfect information. J. Econ. Theory 27, 253-279. (doi:10.1016/0022-0531(82)90030-8)
    • (1982) J. Econ. Theory , vol.27 , pp. 253-279
    • Kreps, D.1    Wilson, R.2
  • 31
    • 38049110885 scopus 로고    scopus 로고
    • From simulations to theorems: A position paper on research in the field of computational trust
    • Proc. Formal Aspects in Security and Trust, 2006, Berlin, Germany: Springer
    • Krukow, K. & Nielsen, M. 2007 From simulations to theorems: a position paper on research in the field of computational trust. In Proc. Formal Aspects in Security and Trust, 2006. Lecture Notes in Computer Science, no. 4691, pp. 96-111. Berlin, Germany: Springer.
    • (2007) Lecture Notes in Computer Science , vol.4691 , pp. 96-111
    • Krukow, K.1    Nielsen, M.2
  • 32
    • 33745725093 scopus 로고    scopus 로고
    • A formal framework for concrete reputation-systems with applications to history-based access control
    • New York, NY: ACM Press
    • Krukow, K., Nielsen, M. & Sassone, V. 2005 A formal framework for concrete reputation-systems with applications to history-based access control. In Proc. 12th ACM Conf. on Computer and Communications Security (CCS'05), pp. 260-269. New York, NY: ACM Press.
    • (2005) Proc. 12th ACM Conf. on Computer and Communications Security (CCS'05) , pp. 260-269
    • Krukow, K.1    Nielsen, M.2    Sassone, V.3
  • 33
    • 0001927585 scopus 로고
    • On information and sufficiency
    • doi:10.1214/aoms/1177729694
    • Kullback, S. & Leibler, R. A. 1951 On information and sufficiency. Ann. Math. Statist. 22, 79-86. (doi:10.1214/aoms/1177729694)
    • (1951) Ann. Math. Statist , vol.22 , pp. 79-86
    • Kullback, S.1    Leibler, R.A.2
  • 34
    • 0036085965 scopus 로고    scopus 로고
    • Design of a role-based trust-management framework
    • Washington, DC: IEEE Computer Society Press
    • Li, N. & Mitchell, J. 2002 Design of a role-based trust-management framework. In Proc. 2002 IEEE Symposium on Security and Privacy (S&P 2002), pp. 114-130. Washington, DC: IEEE Computer Society Press.
    • (2002) Proc. 2002 IEEE Symposium on Security and Privacy (S&P 2002) , pp. 114-130
    • Li, N.1    Mitchell, J.2
  • 35
    • 35248834606 scopus 로고    scopus 로고
    • Datalog with constraints: A foundation for trust-management languages
    • Proc. 5th Int. Symposium on Practical Aspects of Declarative Languages PADL 2003, Berlin, Germany: Springer
    • Li, N. & Mitchell, J. 2003a Datalog with constraints: a foundation for trust-management languages. In Proc. 5th Int. Symposium on Practical Aspects of Declarative Languages (PADL 2003). Lecture Notes in Computer Science, no. 2562, pp. 58-73. Berlin, Germany: Springer.
    • (2003) Lecture Notes in Computer Science , vol.2562 , pp. 58-73
    • Li, N.1    Mitchell, J.2
  • 37
    • 33947617835 scopus 로고    scopus 로고
    • Understanding SPKI/SDSI using first-order logic
    • Los Alamitos, CA: IEEE Computer Society Press
    • Li, N. & Mitchell, J. 2003c Understanding SPKI/SDSI using first-order logic. In Proc. 16th IEEE Computer Security Foundations Workshop (CSFW'03), pp. 89-103. Los Alamitos, CA: IEEE Computer Society Press.
    • (2003) Proc. 16th IEEE Computer Security Foundations Workshop (CSFW'03) , pp. 89-103
    • Li, N.1    Mitchell, J.2
  • 38
    • 0032671779 scopus 로고    scopus 로고
    • A logic-based knowledge representation for authorization with delegation
    • Washington, DC: IEEE Computer Society
    • Li, N., Feigenbaum, J. & Grosof, B. N. 1999 A logic-based knowledge representation for authorization with delegation. In Proc. 9th Computer Security Foundations Workshop (CSFW'99), pp. 162-174. Washington, DC: IEEE Computer Society.
    • (1999) Proc. 9th Computer Security Foundations Workshop (CSFW'99) , pp. 162-174
    • Li, N.1    Feigenbaum, J.2    Grosof, B.N.3
  • 40
    • 0041524661 scopus 로고    scopus 로고
    • Delegation logic: A logic-based approach to distributed authorization
    • doi:10.1145/605434. 605438
    • Li, N., Grosof, B. N. & Feigenbaum, J. 2003 Delegation logic: a logic-based approach to distributed authorization. ACM Trans. Inform. Syst. Secur. (TISSEC) 6, 128-171. (doi:10.1145/605434. 605438)
    • (2003) ACM Trans. Inform. Syst. Secur. (TISSEC) , vol.6 , pp. 128-171
    • Li, N.1    Grosof, B.N.2    Feigenbaum, J.3
  • 41
    • 0003839495 scopus 로고
    • PhD thesis, Department of Computer Science and Mathematics, University of Stirling
    • Marsh, S. P. 1994 Formalising trust as a computational concept. PhD thesis, Department of Computer Science and Mathematics, University of Stirling.
    • (1994) Formalising trust as a computational concept
    • Marsh, S.P.1
  • 43
    • 33847638942 scopus 로고    scopus 로고
    • A Bayesian model for event-based trust
    • doi:10.1016/j.entcs.2007.02.017
    • Nielsen, M., Krukow, K. & Sassone, V. 2007 A Bayesian model for event-based trust. Electronic Notes Theor. Comput. Sci. 172, 499-521. (doi:10.1016/j.entcs.2007.02.017)
    • (2007) Electronic Notes Theor. Comput. Sci , vol.172 , pp. 499-521
    • Nielsen, M.1    Krukow, K.2    Sassone, V.3
  • 45
    • 4544375031 scopus 로고    scopus 로고
    • Trust in multi-agent systems
    • doi:10.1017/S0269888904000116
    • Ramchurn, S. D., Huyhn, D. & Jennings, N. R. 2004 Trust in multi-agent systems. Knowl. Eng. Rev. 19, 1-25. (doi:10.1017/S0269888904000116)
    • (2004) Knowl. Eng. Rev , vol.19 , pp. 1-25
    • Ramchurn, S.D.1    Huyhn, D.2    Jennings, N.R.3
  • 46
    • 85006210403 scopus 로고    scopus 로고
    • Review on computational trust and reputation models
    • doi:10.1007/s10462-004-0041-5
    • Sabater, J. & Sierra, C. 2005 Review on computational trust and reputation models. Artif. Intell. Rev. 24, 33-60. (doi:10.1007/s10462-004-0041-5)
    • (2005) Artif. Intell. Rev , vol.24 , pp. 33-60
    • Sabater, J.1    Sierra, C.2
  • 47
    • 38549115527 scopus 로고    scopus 로고
    • Towards a formal framework for computational trust
    • Proc. 5th Int. Symposium on Formal Methods for Components and Objects, Berlin, Germany: Springer
    • Sassone, V., Krukow, K. & Nielsen, M. 2007 Towards a formal framework for computational trust. In Proc. 5th Int. Symposium on Formal Methods for Components and Objects. Lecture Notes in Computer Science, no. 2562, pp. 175-184. Berlin, Germany: Springer.
    • (2007) Lecture Notes in Computer Science , vol.2562 , pp. 175-184
    • Sassone, V.1    Krukow, K.2    Nielsen, M.3
  • 48
    • 11944249167 scopus 로고    scopus 로고
    • Reputation-based trust management
    • Shmatikov, V. & Talcott, C. 2005 Reputation-based trust management. J. Comput. Secur. 13, 167-190.
    • (2005) J. Comput. Secur , vol.13 , pp. 167-190
    • Shmatikov, V.1    Talcott, C.2
  • 51
    • 0034835799 scopus 로고    scopus 로고
    • Understanding trust management systems
    • Los Alamitos, CA: IEEE Computer Society Press
    • Weeks, S. 2001 Understanding trust management systems. In Proc. 2001 IEEE Symposium on Security and Privacy, pp. 94-106. Los Alamitos, CA: IEEE Computer Society Press.
    • (2001) Proc. 2001 IEEE Symposium on Security and Privacy , pp. 94-106
    • Weeks, S.1
  • 52
    • 0002846846 scopus 로고
    • Reputations in games and markets
    • Cambridge, UK: Cambridge University Press
    • Wilson, R. 1985 Reputations in games and markets. In Game-theoretic models of bargaining, pp. 27-62. Cambridge, UK: Cambridge University Press.
    • (1985) Game-theoretic models of bargaining , pp. 27-62
    • Wilson, R.1
  • 53
    • 3142738238 scopus 로고    scopus 로고
    • PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities
    • doi:10.1109/TKDE.2004.1318566
    • Xiong, L. & Liu, L. 2004 PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16, 843-857. (doi:10.1109/TKDE.2004.1318566)
    • (2004) IEEE Trans. Knowl. Data Eng , vol.16 , pp. 843-857
    • Xiong, L.1    Liu, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.