-
4
-
-
0029700344
-
Decentralized trust management
-
Los Alamitos, CA: IEEE Computer Society Press
-
Blaze, M., Feigenbaum, J. & Lacy, J. 1996 Decentralized trust management. In Proc. 17th Symposium on Security and Privacy, pp. 164-173. Los Alamitos, CA: IEEE Computer Society Press.
-
(1996)
Proc. 17th Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
5
-
-
84958048748
-
Compliance checking in the PolicyMaker trust management system
-
Proc. Financial Cryptography: 2nd Int. Conf, FC'98, Berlin, Germany: Springer
-
Blaze, M., Feigenbaum, J. & Strauss, M. 1998 Compliance checking in the PolicyMaker trust management system. In Proc. Financial Cryptography: 2nd Int. Conf. (FC'98). Lecture Notes in Computer Science, no. 1465, pp. 254-274. Berlin, Germany: Springer.
-
(1998)
Lecture Notes in Computer Science
, vol.1465
, pp. 254-274
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
6
-
-
85020827561
-
-
Blaze, M., Feigenbaum, J., Ionnidis, J. & Keromytis, A. D. 1999a The KeyNote trust management system, version 2, RFC-2704. See ftp://ftp.rfc-editor.org/in-notes/rfc2704.txt.
-
Blaze, M., Feigenbaum, J., Ionnidis, J. & Keromytis, A. D. 1999a The KeyNote trust management system, version 2, RFC-2704. See ftp://ftp.rfc-editor.org/in-notes/rfc2704.txt.
-
-
-
-
7
-
-
84982899264
-
The role of trust management in distributed systems security
-
Secure internet programming: security issues for mobile and distributed objects eds J. Vitek & C. D. Jensen, Berlin, Germany: Springer
-
Blaze, M., Feigenbaum, J., Ionnidis, J. & Keromytis, A. D. 1999b The role of trust management in distributed systems security. In Secure internet programming: security issues for mobile and distributed objects (eds J. Vitek & C. D. Jensen). Lecture Notes in Computer Science, no. 1603, pp. 185-210. Berlin, Germany: Springer.
-
(1999)
Lecture Notes in Computer Science
, Issue.1603
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ionnidis, J.3
Keromytis, A.D.4
-
8
-
-
84957800809
-
KeyNote: Trust management for public-key infrastructures
-
Proc. Security Protocols: 6th Int. Workshop, Berlin, Germany: Springer
-
Blaze, M., Feigenbaum, J. & Keromytis, A. D. 1999c KeyNote: trust management for public-key infrastructures. In Proc. Security Protocols: 6th Int. Workshop. Lecture Notes in Computer Science, no. 1550, pp. 59-63. Berlin, Germany: Springer.
-
(1999)
Lecture Notes in Computer Science
, vol.1550
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
10
-
-
84949238095
-
Offline micropayments without trusted hardware
-
Financial Cryptography, 5th Int. Conf, FC'01, ed. P. F. Syverson, Berlin, Germany: Springer
-
Blaze, M., Ionnidis, J. & Keromytis, A. D. 2002 Offline micropayments without trusted hardware. In Financial Cryptography, 5th Int. Conf. (FC'01) (ed. P. F. Syverson). Lecture Notes in Computer Science, no. 2339, pp. 21-40. Berlin, Germany: Springer.
-
(2002)
Lecture Notes in Computer Science
, vol.2339
, pp. 21-40
-
-
Blaze, M.1
Ionnidis, J.2
Keromytis, A.D.3
-
12
-
-
2442549069
-
Using trust for secure collaboration in uncertain environments
-
doi:10.1109/MPRV.2003.1228527
-
Cahill, V. et al. 2003 Using trust for secure collaboration in uncertain environments. IEEE Pervasive Comput. 2, 52-61. (doi:10.1109/MPRV.2003.1228527)
-
(2003)
IEEE Pervasive Comput
, vol.2
, pp. 52-61
-
-
Cahill, V.1
-
13
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
Clarke, D., Elien, J.-E., Ellison, C., Fredette, M., Morcos, A. & Rivest, R. L. 2001 Certificate chain discovery in SPKI/SDSI. J. Comput. Secur. 9, 285-322.
-
(2001)
J. Comput. Secur
, vol.9
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
14
-
-
33646551446
-
Nonmonotonic trust management for P2P applications
-
1st Int. Workshop on Security and Trust Management STM, Amsterdam, The Netherlands: Elsevier
-
Czenko, M., Tran, H., Doumen, J., Etalle, S., Hartel, P. & den Hartog, J. 2005 Nonmonotonic trust management for P2P applications. In 1st Int. Workshop on Security and Trust Management (STM). Electronic Notes in Theoretical Computer Science, vol. 157, pp. 101-116. Amsterdam, The Netherlands: Elsevier.
-
(2005)
Electronic Notes in Theoretical Computer Science
, vol.157
, pp. 101-116
-
-
Czenko, M.1
Tran, H.2
Doumen, J.3
Etalle, S.4
Hartel, P.5
den Hartog, J.6
-
15
-
-
4544310744
-
Trust-based mechanism design
-
New York, NY: ACM Press
-
Dash, R. K., Ramchurn, S. D. & Jennings, N. R. 2004 Trust-based mechanism design. In Proc. 3rd Int. Conf. on Autonomous Agents and Multi-Agent Systems (AAMAS'04), pp. 748-755. New York, NY: ACM Press.
-
(2004)
Proc. 3rd Int. Conf. on Autonomous Agents and Multi-Agent Systems (AAMAS'04)
, pp. 748-755
-
-
Dash, R.K.1
Ramchurn, S.D.2
Jennings, N.R.3
-
16
-
-
0242641140
-
The digitization of word of mouth: Promise and challenges of online feedback mechanisms
-
doi:10.1287/mnsc.49.10.1407.17308
-
Dellarocas, C. 2003 The digitization of word of mouth: promise and challenges of online feedback mechanisms. Manage. Sci. 49, 1407-1424. (doi:10.1287/mnsc.49.10.1407.17308)
-
(2003)
Manage. Sci
, vol.49
, pp. 1407-1424
-
-
Dellarocas, C.1
-
17
-
-
14044267274
-
Sanctioning reputation mechanisms in online trading environments with moral hazard. Working paper
-
Dellarocas, C. 2004 Sanctioning reputation mechanisms in online trading environments with moral hazard. Working paper. See http://ccs.mit.edu/dell.
-
(2004)
-
-
Dellarocas, C.1
-
18
-
-
22944492087
-
A probabilistic approach to predict peers' performance in P2P networks
-
Proc. 8th Int. Workshop on Cooperative Information Agents CIA 2004, Berlin, Germany: Springer
-
Despotovic, Z. & Aberer, K. 2004 A probabilistic approach to predict peers' performance in P2P networks. In Proc. 8th Int. Workshop on Cooperative Information Agents (CIA 2004). Lecture Notes in Computer Science, no. 3191, pp. 62-76. Berlin, Germany: Springer.
-
(2004)
Lecture Notes in Computer Science
, vol.3191
, pp. 62-76
-
-
Despotovic, Z.1
Aberer, K.2
-
19
-
-
29244482785
-
P2P reputation management: Probabilistic estimation vs. social networks
-
doi:10.1016/j.comnet.2005.07.003
-
Despotovic, Z. & Aberer, K. 2006 P2P reputation management: probabilistic estimation vs. social networks. Comput. Netw. 60, 485-500. (doi:10.1016/j.comnet.2005.07.003)
-
(2006)
Comput. Netw
, vol.60
, pp. 485-500
-
-
Despotovic, Z.1
Aberer, K.2
-
20
-
-
0036083264
-
Binder, a logic-based security language
-
Washington, DC: IEEE Computer Society Press
-
DeTreville, J. 2002 Binder, a logic-based security language. In Proc. 2002 IEEE Symposium on Security and Privacy (S&P 2002), pp. 105-113. Washington, DC: IEEE Computer Society Press.
-
(2002)
Proc. 2002 IEEE Symposium on Security and Privacy (S&P 2002)
, pp. 105-113
-
-
DeTreville, J.1
-
21
-
-
85020775650
-
-
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B. & Ylonen, T. 1999 SPKI certificate theory, RFC 2693. See ftp://ftp.rfc-editor.org/ in-notes/rfc2693.txt.
-
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B. & Ylonen, T. 1999 SPKI certificate theory, RFC 2693. See ftp://ftp.rfc-editor.org/ in-notes/rfc2693.txt.
-
-
-
-
24
-
-
0034829512
-
SD3: A trust management system with certified evaluation
-
Oakland, CA: IEEE Computer Society Press
-
Jim, T. 2001 SD3: a trust management system with certified evaluation. In Proc. 2001 IEEE Symposium on Security and Privacy, pp. 106-115. Oakland, CA: IEEE Computer Society Press.
-
(2001)
Proc. 2001 IEEE Symposium on Security and Privacy
, pp. 106-115
-
-
Jim, T.1
-
25
-
-
85150403522
-
-
Jøsang, A. 2001 A logic for uncertain probabilities. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 9, 279-311.
-
Jøsang, A. 2001 A logic for uncertain probabilities. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 9, 279-311.
-
-
-
-
27
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
doi:10.1016/j.dss.2005.05.019
-
Jøsang, A., Ismail, R. & Boyd, C. 2006 A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43, 618-644. (doi:10.1016/j.dss.2005.05.019)
-
(2006)
Decis. Support Syst
, vol.43
, pp. 618-644
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
28
-
-
84880467894
-
The eigentrust algorithm for reputation management in P2P networks
-
New York, NY: ACM Press
-
Kamvar, S. D., Schlosser, M. T. & Garcia-Molina, H. 2003 The eigentrust algorithm for reputation management in P2P networks. In Proc. 12th Int. Conf. on World Wide Web, pp. 640-651. New York, NY: ACM Press.
-
(2003)
Proc. 12th Int. Conf. on World Wide Web
, pp. 640-651
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
29
-
-
44149093434
-
Reputation and imperfect information
-
doi:10.1016/0022-0531(82)90030-8
-
Kreps, D. & Wilson, R. 1982 Reputation and imperfect information. J. Econ. Theory 27, 253-279. (doi:10.1016/0022-0531(82)90030-8)
-
(1982)
J. Econ. Theory
, vol.27
, pp. 253-279
-
-
Kreps, D.1
Wilson, R.2
-
31
-
-
38049110885
-
From simulations to theorems: A position paper on research in the field of computational trust
-
Proc. Formal Aspects in Security and Trust, 2006, Berlin, Germany: Springer
-
Krukow, K. & Nielsen, M. 2007 From simulations to theorems: a position paper on research in the field of computational trust. In Proc. Formal Aspects in Security and Trust, 2006. Lecture Notes in Computer Science, no. 4691, pp. 96-111. Berlin, Germany: Springer.
-
(2007)
Lecture Notes in Computer Science
, vol.4691
, pp. 96-111
-
-
Krukow, K.1
Nielsen, M.2
-
32
-
-
33745725093
-
A formal framework for concrete reputation-systems with applications to history-based access control
-
New York, NY: ACM Press
-
Krukow, K., Nielsen, M. & Sassone, V. 2005 A formal framework for concrete reputation-systems with applications to history-based access control. In Proc. 12th ACM Conf. on Computer and Communications Security (CCS'05), pp. 260-269. New York, NY: ACM Press.
-
(2005)
Proc. 12th ACM Conf. on Computer and Communications Security (CCS'05)
, pp. 260-269
-
-
Krukow, K.1
Nielsen, M.2
Sassone, V.3
-
33
-
-
0001927585
-
On information and sufficiency
-
doi:10.1214/aoms/1177729694
-
Kullback, S. & Leibler, R. A. 1951 On information and sufficiency. Ann. Math. Statist. 22, 79-86. (doi:10.1214/aoms/1177729694)
-
(1951)
Ann. Math. Statist
, vol.22
, pp. 79-86
-
-
Kullback, S.1
Leibler, R.A.2
-
34
-
-
0036085965
-
Design of a role-based trust-management framework
-
Washington, DC: IEEE Computer Society Press
-
Li, N. & Mitchell, J. 2002 Design of a role-based trust-management framework. In Proc. 2002 IEEE Symposium on Security and Privacy (S&P 2002), pp. 114-130. Washington, DC: IEEE Computer Society Press.
-
(2002)
Proc. 2002 IEEE Symposium on Security and Privacy (S&P 2002)
, pp. 114-130
-
-
Li, N.1
Mitchell, J.2
-
35
-
-
35248834606
-
Datalog with constraints: A foundation for trust-management languages
-
Proc. 5th Int. Symposium on Practical Aspects of Declarative Languages PADL 2003, Berlin, Germany: Springer
-
Li, N. & Mitchell, J. 2003a Datalog with constraints: a foundation for trust-management languages. In Proc. 5th Int. Symposium on Practical Aspects of Declarative Languages (PADL 2003). Lecture Notes in Computer Science, no. 2562, pp. 58-73. Berlin, Germany: Springer.
-
(2003)
Lecture Notes in Computer Science
, vol.2562
, pp. 58-73
-
-
Li, N.1
Mitchell, J.2
-
38
-
-
0032671779
-
A logic-based knowledge representation for authorization with delegation
-
Washington, DC: IEEE Computer Society
-
Li, N., Feigenbaum, J. & Grosof, B. N. 1999 A logic-based knowledge representation for authorization with delegation. In Proc. 9th Computer Security Foundations Workshop (CSFW'99), pp. 162-174. Washington, DC: IEEE Computer Society.
-
(1999)
Proc. 9th Computer Security Foundations Workshop (CSFW'99)
, pp. 162-174
-
-
Li, N.1
Feigenbaum, J.2
Grosof, B.N.3
-
39
-
-
0033718059
-
A practically implementable and tractable delegation logic
-
Washington, DC: IEEE Computer Society
-
Li, N., Grosof, B. N. & Feigenbaum, J. 2000 A practically implementable and tractable delegation logic. In Proc. 2000 IEEE Symposium on Security and Privacy (S&P 2000), pp. 27-42. Washington, DC: IEEE Computer Society.
-
(2000)
Proc. 2000 IEEE Symposium on Security and Privacy (S&P 2000)
, pp. 27-42
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
40
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
doi:10.1145/605434. 605438
-
Li, N., Grosof, B. N. & Feigenbaum, J. 2003 Delegation logic: a logic-based approach to distributed authorization. ACM Trans. Inform. Syst. Secur. (TISSEC) 6, 128-171. (doi:10.1145/605434. 605438)
-
(2003)
ACM Trans. Inform. Syst. Secur. (TISSEC)
, vol.6
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
41
-
-
0003839495
-
-
PhD thesis, Department of Computer Science and Mathematics, University of Stirling
-
Marsh, S. P. 1994 Formalising trust as a computational concept. PhD thesis, Department of Computer Science and Mathematics, University of Stirling.
-
(1994)
Formalising trust as a computational concept
-
-
Marsh, S.P.1
-
43
-
-
33847638942
-
A Bayesian model for event-based trust
-
doi:10.1016/j.entcs.2007.02.017
-
Nielsen, M., Krukow, K. & Sassone, V. 2007 A Bayesian model for event-based trust. Electronic Notes Theor. Comput. Sci. 172, 499-521. (doi:10.1016/j.entcs.2007.02.017)
-
(2007)
Electronic Notes Theor. Comput. Sci
, vol.172
, pp. 499-521
-
-
Nielsen, M.1
Krukow, K.2
Sassone, V.3
-
45
-
-
4544375031
-
Trust in multi-agent systems
-
doi:10.1017/S0269888904000116
-
Ramchurn, S. D., Huyhn, D. & Jennings, N. R. 2004 Trust in multi-agent systems. Knowl. Eng. Rev. 19, 1-25. (doi:10.1017/S0269888904000116)
-
(2004)
Knowl. Eng. Rev
, vol.19
, pp. 1-25
-
-
Ramchurn, S.D.1
Huyhn, D.2
Jennings, N.R.3
-
46
-
-
85006210403
-
Review on computational trust and reputation models
-
doi:10.1007/s10462-004-0041-5
-
Sabater, J. & Sierra, C. 2005 Review on computational trust and reputation models. Artif. Intell. Rev. 24, 33-60. (doi:10.1007/s10462-004-0041-5)
-
(2005)
Artif. Intell. Rev
, vol.24
, pp. 33-60
-
-
Sabater, J.1
Sierra, C.2
-
47
-
-
38549115527
-
Towards a formal framework for computational trust
-
Proc. 5th Int. Symposium on Formal Methods for Components and Objects, Berlin, Germany: Springer
-
Sassone, V., Krukow, K. & Nielsen, M. 2007 Towards a formal framework for computational trust. In Proc. 5th Int. Symposium on Formal Methods for Components and Objects. Lecture Notes in Computer Science, no. 2562, pp. 175-184. Berlin, Germany: Springer.
-
(2007)
Lecture Notes in Computer Science
, vol.2562
, pp. 175-184
-
-
Sassone, V.1
Krukow, K.2
Nielsen, M.3
-
48
-
-
11944249167
-
Reputation-based trust management
-
Shmatikov, V. & Talcott, C. 2005 Reputation-based trust management. J. Comput. Secur. 13, 167-190.
-
(2005)
J. Comput. Secur
, vol.13
, pp. 167-190
-
-
Shmatikov, V.1
Talcott, C.2
-
50
-
-
33645035106
-
Coping with inaccurate reputation sources: Experimental analysis of a probabilistic trust model
-
New York, NY: ACM Press
-
Teacy, W. T. L., Patel, J., Jennings, N. R. & Luck, M. 2005 Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model. In Proc. 4th Int. Joint Conf. on Autonomous Agents and Multiagent Systems, pp. 997-1004. New York, NY: ACM Press.
-
(2005)
Proc. 4th Int. Joint Conf. on Autonomous Agents and Multiagent Systems
, pp. 997-1004
-
-
Teacy, W.T.L.1
Patel, J.2
Jennings, N.R.3
Luck, M.4
-
51
-
-
0034835799
-
Understanding trust management systems
-
Los Alamitos, CA: IEEE Computer Society Press
-
Weeks, S. 2001 Understanding trust management systems. In Proc. 2001 IEEE Symposium on Security and Privacy, pp. 94-106. Los Alamitos, CA: IEEE Computer Society Press.
-
(2001)
Proc. 2001 IEEE Symposium on Security and Privacy
, pp. 94-106
-
-
Weeks, S.1
-
52
-
-
0002846846
-
Reputations in games and markets
-
Cambridge, UK: Cambridge University Press
-
Wilson, R. 1985 Reputations in games and markets. In Game-theoretic models of bargaining, pp. 27-62. Cambridge, UK: Cambridge University Press.
-
(1985)
Game-theoretic models of bargaining
, pp. 27-62
-
-
Wilson, R.1
-
53
-
-
3142738238
-
PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities
-
doi:10.1109/TKDE.2004.1318566
-
Xiong, L. & Liu, L. 2004 PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16, 843-857. (doi:10.1109/TKDE.2004.1318566)
-
(2004)
IEEE Trans. Knowl. Data Eng
, vol.16
, pp. 843-857
-
-
Xiong, L.1
Liu, L.2
|