메뉴 건너뛰기




Volumn , Issue , 2008, Pages 555-561

An ad hoc trust inference model for flexible and controlled information sharing

Author keywords

Ad hoc trust inference; Secure information sharing

Indexed keywords

ACCESS CONTROL MECHANISMS; ACCESS DECISIONS; AD HOC TRUST INFERENCE; CONTROL MECHANISMS; DATA SHARING; DIGITAL IDENTITIES; INFERENCE MODELS; PERVASIVE COMPUTING; PERVASIVE COMPUTING ENVIRONMENTS; PROBLEM-SOLVING; SECURE INFORMATION SHARING;

EID: 60349107258     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (19)
  • 4
    • 85047685314 scopus 로고    scopus 로고
    • Communicating throughout Katrina: Competing and complementary conceptual lenses on crisis communication
    • November- December
    • J. L. Garnett and A. Kouzmin. Communicating throughout Katrina: Competing and complementary conceptual lenses on crisis communication. Public Administration Review, Special Issue, November- December: 170 - 187, 2007.
    • (2007) Public Administration Review, Special Issue , vol.187 , pp. 170
    • Garnett, J.L.1    Kouzmin, A.2
  • 5
    • 62749093615 scopus 로고    scopus 로고
    • HORIZONTAL INTEGRATION: Broader access models for realizing information dominance. Technical report, MITRE Corporation, 2004. JASON Program Office. http://www.fas.org/irp/agency/dod/jason/classpol.pdf.
    • HORIZONTAL INTEGRATION: Broader access models for realizing information dominance. Technical report, MITRE Corporation, 2004. JASON Program Office. http://www.fas.org/irp/agency/dod/jason/classpol.pdf.
  • 6
    • 62749089249 scopus 로고    scopus 로고
    • A. J0sang. Artificial reasoning with subjective logic. In Proceedings of Australian Workshop on Commonsense Reasoning, 1997. In conjunction with the Tenth Australian Joint Conference on Artificial Intelligence.
    • A. J0sang. Artificial reasoning with subjective logic. In Proceedings of Australian Workshop on Commonsense Reasoning, 1997. In conjunction with the Tenth Australian Joint Conference on Artificial Intelligence.
  • 8
    • 84957803553 scopus 로고    scopus 로고
    • Confidence valuation in a public-key infrastructure based on uncertain evidence
    • Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography PKC '00, of, Springer
    • R. Kohlas and U. M. Maurer. Confidence valuation in a public-key infrastructure based on uncertain evidence. In Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography (PKC '00), volume 1751 of Lecture Notes in Computer Science, pages 93-112. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1751 , pp. 93-112
    • Kohlas, R.1    Maurer, U.M.2
  • 9
    • 0028386809 scopus 로고
    • Fuzzy systems: An overview
    • T. Munakata and Y. Jani. Fuzzy systems: An overview. In Communications of the ACM, volume 37 (3), pages 69 - 76, 1994.
    • (1994) Communications of the ACM , vol.37 , Issue.3 , pp. 69-76
    • Munakata, T.1    Jani, Y.2
  • 11
    • 5544326539 scopus 로고    scopus 로고
    • Trust for ubiquitous, transparent collaboration
    • B. Shand, N. Dimmock, and J. Bacon. Trust for ubiquitous, transparent collaboration. Wirel. Netw., 10(6):711-721, 2004.
    • (2004) Wirel. Netw , vol.10 , Issue.6 , pp. 711-721
    • Shand, B.1    Dimmock, N.2    Bacon, J.3
  • 12
    • 62749156022 scopus 로고    scopus 로고
    • Automatic verification of distributed and layered security policy implementation using the access policy tool
    • S. Singh, D. M. Nicol, and W. H. Sanders. Automatic verification of distributed and layered security policy implementation using the access policy tool. In 3rd Midwest Security Workshop (MSW), 2006.
    • (2006) 3rd Midwest Security Workshop (MSW)
    • Singh, S.1    Nicol, D.M.2    Sanders, W.H.3
  • 13
    • 28844464697 scopus 로고    scopus 로고
    • Trusted grid computing with security binding and trust integration
    • S. Song, K. Hwang, and Y.-K. Kwok. Trusted grid computing with security binding and trust integration. J. Grid Comput., 3(1-2):53-73, 2005.
    • (2005) J. Grid Comput , vol.3 , Issue.1-2 , pp. 53-73
    • Song, S.1    Hwang, K.2    Kwok, Y.-K.3
  • 14
  • 17
    • 78349255568 scopus 로고    scopus 로고
    • Point-based trust: Define how much privacy is worth
    • Proc. Int. Conf. on Information and Communications Security ICICS, of, Springer
    • D. Yao, K. B. Frikken, M. J. Atallah, and R. Tamassia. Point-based trust: Define how much privacy is worth. In Proc. Int. Conf. on Information and Communications Security (ICICS), volume 4307 of LNCS, pages 190-209. Springer, 2006.
    • (2006) LNCS , vol.4307 , pp. 190-209
    • Yao, D.1    Frikken, K.B.2    Atallah, M.J.3    Tamassia, R.4
  • 19
    • 0028385414 scopus 로고
    • Fuzzy logic, neural networks, and soft computing
    • L. A. Zadeh. Fuzzy logic, neural networks, and soft computing. In Communications of the ACM, volume 37 (3), pages 77 - 84, 1994.
    • (1994) Communications of the ACM , vol.37 , Issue.3 , pp. 77-84
    • Zadeh, L.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.