-
1
-
-
33846973728
-
An integrated trust and reputation model for open multi-agent systems
-
Valencia, Spain
-
Huynh, T., Jennings, N., Shadbolt, N. FIRE: An integrated trust and reputation model for open multi-agent systems, in Proc of the 16th European Conference on Artificial Intelligence, Valencia, Spain, 2004. 18-22.
-
(2004)
Proc of the 16th European Conference on Artificial Intelligence
, pp. 18-22
-
-
Huynh, T.1
Jennings, N.2
Shadbolt3
FIRE, N.4
-
4
-
-
35248892017
-
Trust based service provider selection in open environments
-
Seoul, Korea, ACM Press
-
Billhardt, H., Hermoso, R., Ossowski, S., Centeno, R. Trust based service provider selection in open environments, in Proc of the 22nd Annual ACM Symposium on Applied Computing, Seoul, Korea, 2007. ACM Press: 1375-1380.
-
(2007)
Proc of the 22nd Annual ACM Symposium on Applied Computing
, pp. 1375-1380
-
-
Billhardt, H.1
Hermoso, R.2
Ossowski, S.3
Centeno, R.4
-
5
-
-
35248816893
-
Certain trust: A trast model for users and agents
-
Seoul, Korea, ACM Press
-
Ries, S. Certain trust: a trast model for users and agents, in Proc of the 22nd Annual ACM Symposium on Applied Computing, Seoul, Korea, 2007. ACM Press: 1599-1604.
-
(2007)
Proc of the 22nd Annual ACM Symposium on Applied Computing
, pp. 1599-1604
-
-
Ries, S.1
-
6
-
-
33751049091
-
A fuzzy model for reasoning about reputation in web services
-
Dijon, France, ACM Press
-
Sherchan, W., Loke, S., Krishnaswamy, S. A fuzzy model for reasoning about reputation in web services, in Proc of the 21st Annual ACM Symposium on Applied Computing, Dijon, France, 2006. ACM Press: 1886-1892.
-
(2006)
Proc of the 21st Annual ACM Symposium on Applied Computing
, pp. 1886-1892
-
-
Sherchan, W.1
Loke, S.2
Krishnaswamy, S.3
-
7
-
-
33751041485
-
BambooTrust: Practical scalable trust management for global public computing
-
Dijon, France, ACM Press
-
Kotsovinos, E., Williams, A. BambooTrust: practical scalable trust management for global public computing, in Proc of the 21st Annual ACM Symposium on Applied Computing, Dijon, France, 2006. ACM Press: 1893-1897.
-
(2006)
Proc of the 21st Annual ACM Symposium on Applied Computing
, pp. 1893-1897
-
-
Kotsovinos, E.1
Williams, A.2
-
8
-
-
0009481412
-
A survey of trust in internet application
-
September, IEEE Communications Society: 15pp
-
Grandison, T., Sloman, M. A survey of trust in internet application, in IEEE Communications Surveys & Tutorials, September 2000, 3(4). IEEE Communications Society: 15pp.
-
(2000)
IEEE Communications Surveys & Tutorials
, vol.3
, Issue.4
-
-
Grandison, T.1
Sloman, M.2
-
9
-
-
0034309383
-
Trust management through reputation mechanisms
-
Taylor and Francis Ltd
-
Zacharia, G., Maes, P. Trust management through reputation mechanisms, in Applied Artificial Intelligence, 14(9), 2000. Taylor and Francis Ltd: 881-908.
-
(2000)
Applied Artificial Intelligence
, vol.14
, Issue.9
, pp. 881-908
-
-
Zacharia, G.1
Maes, P.2
-
10
-
-
0002353862
-
REGRETA reputation model for gregarious societies
-
Montreal, Canada
-
Sabater, J., Sierra,C. REGRETA reputation model for gregarious societies, in Proc of the 4th workshop on deception fraud and trust in agent societies, Montreal, Canada, 2001. 61-70.
-
(2001)
Proc of the 4th workshop on deception fraud and trust in agent societies
, pp. 61-70
-
-
Sabater, J.1
Sierra, C.2
-
11
-
-
7044225904
-
Towards incentive-compatible reputation management
-
Bologna, Italy, Springer Berlin/Heidelberg
-
Jurca, R., Faltings, B. Towards incentive-compatible reputation management, in Proceedings of the AAMS Workshop on Trust, reputation and security: theories and practice (LNCS v2631), Bologna, Italy, 2002. Springer Berlin/Heidelberg: 138-147.
-
(2002)
Proceedings of the AAMS Workshop on Trust, reputation and security: Theories and practice (LNCS v2631)
, pp. 138-147
-
-
Jurca, R.1
Faltings, B.2
-
12
-
-
33645035106
-
Coping with inaccurate reputation sources: Experimental analysis of a probabilistic trust model
-
Bologna, Italy
-
Teacy, W., Patel, J., Jennings, N., Luck, M. Coping with inaccurate reputation sources: Experimental analysis of a probabilistic trust model, in Proc of 4th Int Joint Conference on Autonomous Agents and Multiagent Systems, Bologna, Italy, 2002. 997-1004.
-
(2002)
Proc of 4th Int Joint Conference on Autonomous Agents and Multiagent Systems
, pp. 997-1004
-
-
Teacy, W.1
Patel, J.2
Jennings, N.3
Luck, M.4
-
13
-
-
84943784070
-
Trust and reputation model in peer-to-peer networks
-
Sweden, IEEE CS Press
-
Wang, Y., Vassileva, J. Trust and reputation model in peer-to-peer networks, in Proc of the 3rd Int Conference on Peer-to-Peer Computing, Sweden, 2003. IEEE CS Press: 150-157.
-
(2003)
Proc of the 3rd Int Conference on Peer-to-Peer Computing
, pp. 150-157
-
-
Wang, Y.1
Vassileva, J.2
-
14
-
-
33750952887
-
Trust based risk management for distributed system, security - a new approach
-
Vienna, Austria, IEEE CS Press
-
Lin, C., Varadharajan, V. Trust based risk management for distributed system, security - a new approach, in Proc of the 1st Int Conference on Availability, Reliability and Security, Vienna, Austria, 2006. IEEE CS Press: 6-13.
-
(2006)
Proc of the 1st Int Conference on Availability, Reliability and Security
, pp. 6-13
-
-
Lin, C.1
Varadharajan, V.2
-
15
-
-
4143058053
-
Using trust and risk in role-based access control policies
-
New York, USA, ACM Press
-
Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J., Ingram, D., Moody, K. Using trust and risk in role-based access control policies, in Proc of the 9th ACMsymposium on Access control models and technologies, New York, USA, 2004. ACM Press: 156-162.
-
(2004)
Proc of the 9th ACMsymposium on Access control models and technologies
, pp. 156-162
-
-
Dimmock, N.1
Belokosztolszki, A.2
Eyers, D.3
Bacon, J.4
Ingram, D.5
Moody, K.6
-
16
-
-
24944456051
-
Risk models for trust-based access control (TBAC)
-
Rocquencourt, France, Springer Berlin/ Heidelberg
-
Dimmock, N., Bacon, J., Ingram, D., Moody, K. Risk models for trust-based access control (TBAC), in Proc of the 3rd Annual Conference on Trust Management (LNCS V3477), Rocquencourt, France, 2005. Springer Berlin/ Heidelberg: 364-371.
-
(2005)
Proc of the 3rd Annual Conference on Trust Management (LNCS V3477)
, pp. 364-371
-
-
Dimmock, N.1
Bacon, J.2
Ingram, D.3
Moody, K.4
-
17
-
-
33751118798
-
Autonomic trust prediction for pervasive systems
-
Vienna, Austria, IEEE CS Press
-
Capra, L. Musolesi, M. Autonomic trust prediction for pervasive systems, in Proc of the 20th Int Conference on Advanced Information Networking and Applications, Vienna, Austria, 2006. IEEE CS Press: 481-488.
-
(2006)
Proc of the 20th Int Conference on Advanced Information Networking and Applications
, pp. 481-488
-
-
Capra, L.1
Musolesi, M.2
-
18
-
-
37349052663
-
-
Haque, M, Ahamed, S. An omnipresent formal trust model, FTM for pervasive computing environment, in Proc of the 31st Annual IEEE Int Computer Software and Applications Conference, Beijing, China, 2007. IEEE CS Press: 49-56
-
Haque, M., Ahamed, S. An omnipresent formal trust model. (FTM) for pervasive computing environment, in Proc of the 31st Annual IEEE Int Computer Software and Applications Conference, Beijing, China, 2007. IEEE CS Press: 49-56.
-
-
-
-
19
-
-
0036362188
-
An evidential model of distributed reputation mechanism
-
Bologna, Italy, ACM Press
-
Yu, B., Singh, M. An evidential model of distributed reputation mechanism, in Proc of the 1st Int Joint Conference on Autonomous Agents and multiagent systems, Bologna, Italy, 2002. ACM Press: 294-301.
-
(2002)
Proc of the 1st Int Joint Conference on Autonomous Agents and multiagent systems
, pp. 294-301
-
-
Yu, B.1
Singh, M.2
-
20
-
-
33947362514
-
Building trust in decentralized peer-to-peer electronic communities
-
Montreal, Canada, 15pp
-
Xiong, L., Liu, L. Building trust in decentralized peer-to-peer electronic communities, in Proc of the 5th Int Conference on Electronic Commerce Research, Montreal, Canada, 2002. 15pp.
-
(2002)
Proc of the 5th Int Conference on Electronic Commerce Research
-
-
Xiong, L.1
Liu, L.2
-
21
-
-
28644440574
-
Towards self-protecting ubiquitous systems: Monitoring trust-based interactions
-
Springer-Verlag: UK
-
English, C., Terzis, S., Nixon, P. Towards self-protecting ubiquitous systems: monitoring trust-based interactions, in Personal and Ubiquitous Computing, 10(1), 2005. Springer-Verlag: UK, 50-54.
-
(2005)
Personal and Ubiquitous Computing
, vol.10
, Issue.1
, pp. 50-54
-
-
English, C.1
Terzis, S.2
Nixon, P.3
-
22
-
-
84949942881
-
The right type of trust for distributed systems
-
California, USA, ACM Press
-
Jøsang, A. The right type of trust for distributed systems, in Proc of the 1996 Workshop on New Security Paradigms, California, USA, 1996. ACM Press: 119-131.
-
(1996)
Proc of the 1996 Workshop on New Security Paradigms
, pp. 119-131
-
-
Jøsang, A.1
-
24
-
-
33745913622
-
Bayesian trust framework for pervasive computing
-
Italy, Springer Berlin/Heidelberg
-
Quercia, D., Hailes, S., Capra, L. B-trust: Bayesian trust framework for pervasive computing, in Proc of the 4th Int Conference on Trust Management (LNCS v3986), Tuscany, Italy, 2006. Springer Berlin/Heidelberg: 298-312.
-
(2006)
Proc of the 4th Int Conference on Trust Management (LNCS v3986), Tuscany
, pp. 298-312
-
-
Quercia, D.1
Hailes, S.2
Capra3
B-trust, L.4
-
25
-
-
0001951820
-
Can we trust trust?
-
Gambetta, D, ed, Chapter 13, 1988. University of Oxford
-
Gambetta, D. Can we trust trust?, in Trust: Making and Breaking Cooperative Relations, Gambetta, D. (ed.), Chapter 13, 1988. University of Oxford: 213-237.
-
Trust: Making and Breaking Cooperative Relations
, pp. 213-237
-
-
Gambetta, D.1
-
26
-
-
62949144446
-
Context-aware trust evaluation functions for dynamic reconfigurable systems
-
Edinburgh, Scotland, 11pp
-
Toivonen, S., Lenzini, G., Uusitalo, I. Context-aware trust evaluation functions for dynamic reconfigurable systems, in Proc of the Workshop on Models of Trust for the Web, Edinburgh, Scotland, 2006. 11pp.
-
(2006)
Proc of the Workshop on Models of Trust for the Web
-
-
Toivonen, S.1
Lenzini, G.2
Uusitalo, I.3
-
27
-
-
48049092037
-
A mechanism for detecting and responding to misbehaving nodes in wireless networks
-
California, USA, IEEE CS Press
-
Damon, M. Doug, S., Dirk, G. A mechanism for detecting and responding to misbehaving nodes in wireless networks, in Proc of the 4th IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, California, USA, 2007. IEEE CS Press: 678-684.
-
(2007)
Proc of the 4th IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks
, pp. 678-684
-
-
Damon, M.1
Doug, S.2
Dirk, G.3
-
28
-
-
84947273682
-
The sybil attack
-
Cambridge, MA, USA, Springer Berlin/ Heidelberg
-
Douceur, J. The sybil attack, in Proc of the 1st Int Workshop on Peer-to-Peer Systems (LNCS v2429), Cambridge, MA, USA, 2002. Springer Berlin/ Heidelberg: 251-260.
-
(2002)
Proc of the 1st Int Workshop on Peer-to-Peer Systems (LNCS v2429)
, pp. 251-260
-
-
Douceur, J.1
|