-
2
-
-
0029227516
-
Trusted system concepts
-
In M. V. Joyce (Ed.)
-
Abrams, M. D. (1995). Trusted system concepts. In M. V. Joyce (Ed.), Computers and security (pp 45-56).
-
(1995)
Computers and Security
, pp. 45-56
-
-
Abrams, M.D.1
-
3
-
-
0029238317
-
Trusted computing update
-
Abrams, M. D., & Joyce, M. V. (1995). Trusted computing update. Computers and Security, 14(1), 57-68.
-
(1995)
Computers and Security
, vol.14
, Issue.1
, pp. 57-68
-
-
Abrams, M.D.1
Joyce, M.V.2
-
4
-
-
25144470629
-
-
Retrieved from
-
Anderson, S., Bohren, J., Boubez, T., Chanliau, M., Della-Libera, G., Dixon, B., et al. (2004). Web services trust language (ws-trust), Version 1.1. Retrieved from http://www-106.ibm.com/developerworks/library/ws-trust/
-
(2004)
Web Services Trust Language (ws-trust), Version 1.1
-
-
Anderson, S.1
Bohren, J.2
Boubez, T.3
Chanliau, M.4
Della-Libera, G.5
Dixon, B.6
-
5
-
-
84957800809
-
-
LNCS 1550
-
Blaze, M., Feigenbaum, J., & Keromytis, A. D. (1999). KeyNote: Trust management for public-key infrastructures (LNCS 1550, pp. 59-63).
-
(1999)
KeyNote: Trust Management For Public-key Infrastructures
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
7
-
-
0001470602
-
REFEREE: Trust management for Web applications
-
Chu, Y. H., Feigenbaum, J., Lamacchia, B., Resnick, P., & Strauss, M. (1997). REFEREE: Trust management for Web applications. Computer Networks and ISDN Systems, 29(8-13), 953-964.
-
(1997)
Computer Networks and ISDN Systems
, vol.29
, Issue.8-13
, pp. 953-964
-
-
Chu, Y.H.1
Feigenbaum, J.2
Lamacchia, B.3
Resnick, P.4
Strauss, M.5
-
8
-
-
0038011186
-
A reputation-based approach for choosing reliable resources in peer-to-peer networks
-
Washington, DC: ACM Press
-
Damiani, E., Vimercati, S., Paraboschi, S., Samarati, P., & Violante, F. (2002). A reputation-based approach for choosing reliable resources in peer-to-peer networks. In CCS '02: 9th ACM conference on Computer and communications security (pp. 207-216). Washington, DC: ACM Press.
-
(2002)
CCS '02: 9th ACM Conference On Computer and Communications Security
, pp. 207-216
-
-
Damiani, E.1
Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
Violante, F.5
-
9
-
-
1342274095
-
-
Retrieved from
-
Della-Libera, G., Della-Libera, G., Dixon, B., Garg, P., Hallam-Baker, P., Hondo, M., et al. (2002). Web services trust language (ws-trust), Version 1.0. Retrieved from http://www-106.ibm.com/developerworks/library/ws-trust/
-
(2002)
Web Services Trust Language (ws-trust), Version 1.0
-
-
Della-Libera, G.1
Della-Libera, G.2
Dixon, B.3
Garg, P.4
Hallam-Baker, P.5
Hondo, M.6
-
11
-
-
3042699012
-
Understanding trusted computing: Will its benefits outweigh its drawbacks?
-
Felten, E. W. (2003). Understanding trusted computing: Will its benefits outweigh its drawbacks? IEEE Security & Privacy, 1(3), 60-62.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.3
, pp. 60-62
-
-
Felten, E.W.1
-
12
-
-
0009481412
-
A survey of trust in Internet application
-
Fourth Quarter
-
Grandison, T., & Sloman, M. (2000 Fourth Quarter). A survey of trust in Internet application. IEEE Communications Surveys, 3(4), 1-30.
-
(2000)
IEEE Communications Surveys
, vol.3
, Issue.4
, pp. 1-30
-
-
Grandison, T.1
Sloman, M.2
-
13
-
-
0036565023
-
Trusted autonomy
-
Huhns, M. N., & Buell, D. A. (2002). Trusted autonomy. IEEE Internet Computing, 6(3), 92-95.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.3
, pp. 92-95
-
-
Huhns, M.N.1
Buell, D.A.2
-
14
-
-
84899234995
-
-
IBM, Retrieved from
-
IBM. (2001). IBM trust establishment - policy language. Retrieved from http://www.haifa.il.ibm.com/projects/software/e-Business/TrustManager/PolicyLanguage.html
-
(2001)
IBM Trust Establishment - Policy Language
-
-
-
19
-
-
0043016341
-
Cooperative peer groups in nice
-
Lee, S., Sherwood, R., & Bhattacharjee, B. (2003). Cooperative peer groups in nice. In Proceedings of the INFOCOM 2003 Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (Vol. 2, pp. 1272-1282).
-
(2003)
In Proceedings of the INFOCOM 2003 Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies
, vol.2
, pp. 1272-1282
-
-
Lee, S.1
Sherwood, R.2
Bhattacharjee, B.3
-
20
-
-
0033893895
-
E-commerce trust metrics and models
-
Manchala, D. W. (2000). E-commerce trust metrics and models. IEEE Internet Computing, 4(2), 36-44.
-
(2000)
IEEE Internet Computing
, vol.4
, Issue.2
, pp. 36-44
-
-
Manchala, D.W.1
-
22
-
-
84948698587
-
A computational model of trust and reputation
-
Big Island, HI
-
Mui, L., Mohtashemi, M., & Halberstadt, A. (2002). A computational model of trust and reputation. In Proceedings of the 35th Annual Hawaii International Conference on System sciences, Big Island, HI (pp. 7-10).
-
(2002)
Proceedings of the 35th Annual Hawaii International Conference On System Sciences
, pp. 7-10
-
-
Mui, L.1
Mohtashemi, M.2
Halberstadt, A.3
-
23
-
-
0036362646
-
Extracting reputation in multiagent systems by means of social network topology
-
Bologna, Italy, ACM Press
-
Pujol, J. M., Sangüesa, R., Delgado, J. (2002). Extracting reputation in multiagent systems by means of social network topology. In Proceedings of the AAMAS '02: First international Joint Conference on Autonomous Agents and Multi-Agent Systems, Bologna, Italy (pp. 467-474). ACM Press.
-
(2002)
Proceedings of the AAMAS '02: First International Joint Conference On Autonomous Agents and Multi-Agent Systems
, pp. 467-474
-
-
Pujol, J.M.1
Sangüesa, R.2
Delgado, J.3
-
24
-
-
0034286541
-
Using trust for detecting deceitful agents in artificial societies
-
In C. Castelfranchi, Y. Tan, R. Falcone, & B. Firozabadi
-
Schillo, M., Rovatsos, M., & Funk, P. (2000). Using trust for detecting deceitful agents in artificial societies. In C. Castelfranchi, Y. Tan, R. Falcone, & B. Firozabadi, Applied Artificial Intelligence Journal, Special Issue on Deception, Fraud and Trust in Agent Societies, 14, 825-848.
-
(2000)
Applied Artificial Intelligence Journal, Special Issue On Deception, Fraud and Trust In Agent Societies
, vol.14
, pp. 825-848
-
-
Schillo, M.1
Rovatsos, M.2
Funk, P.3
-
25
-
-
0003969633
-
-
U.S.A. National Computer Security Council, (DOD standard 5200.28-STD)
-
U.S.A. National Computer Security Council. (1985). Trusted computer system evaluation criteria (DOD standard 5200.28-STD).
-
(1985)
Trusted Computer System Evaluation Criteria
-
-
-
28
-
-
0036871183
-
Negotiating trust in the Web
-
Winslett, M., Yu, T., Seamons, K. E., Hess, A., Jacobson, J., Jarvis, R., et al. (2002). Negotiating trust in the Web. IEEE Internet Computing, 6(6), 30-37.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
-
30
-
-
33646831506
-
-
LNCS 3184
-
Zhao, W., Varadharajan, V., & Bryan, G. (2004). Modelling trust relationships in distributed environments (LNCS 3184, pp. 40-49).
-
(2004)
Modelling Trust Relationships In Distributed Environments
, pp. 40-49
-
-
Zhao, W.1
Varadharajan, V.2
Bryan, G.3
-
31
-
-
33646851747
-
-
LNCS 3808
-
Zhao, W., Varadharajan, V., & Bryan, G. (2005). Analysis and modelling of trust in distributed information systems (LNCS 3808, pp. 106-119).
-
(2005)
Analysis and Modelling of Trust In Distributed Information Systems
, pp. 106-119
-
-
Zhao, W.1
Varadharajan, V.2
Bryan, G.3
|