-
2
-
-
24944456051
-
Risk models for trust-based access control
-
In: Proceedings of the third annual conference on trust management Springer, Heidelberg
-
Dimmock N, Bacon J, Ingram D, Moody K (2005) Risk models for trust-based access control. In: Proceedings of the third annual conference on trust management, Lecture Notes in Computer Science, vol 3477. Springer, Heidelberg, pp 364-371
-
(2005)
Lecture Notes in Computer Science
, vol.3477
, pp. 364-371
-
-
Dimmock, N.1
Bacon, J.2
Ingram, D.3
Moody, K.4
-
4
-
-
62349085358
-
Visualizing service interaction in an open distributed system
-
Prague, Czech Republic. IEEE CS Press, Los Alamitos
-
Bond A, Arnold D (1994) Visualizing service interaction in an open distributed system. In: Proceedings of the first international workshop on services in distributed and networked environments, Prague, Czech Republic. IEEE CS Press, Los Alamitos, pp 19-25
-
(1994)
Proceedings of the First International Workshop on Services in Distributed and Networked Environments
, pp. 19-25
-
-
Bond, A.1
Arnold, D.2
-
5
-
-
37349052663
-
An omnipresent formal trust model (FTM) for pervasive computing environment
-
Beijing, China. IEEE CS Press, Los Alamitos
-
Haque M, Ahamed SI (2007) An omnipresent formal trust model (FTM) for pervasive computing environment. In: Proceedings of the 31st annual IEEE international computer software and applications conference, Beijing, China. IEEE CS Press, Los Alamitos, 49-56
-
(2007)
Proceedings of the 31st Annual IEEE International Computer Software and Applications Conference
, pp. 49-56
-
-
Haque, M.1
Ahamed, S.I.2
-
6
-
-
71049170403
-
Trust assessment using provenance in service oriented applications
-
Hongkong. IEEE CS Press, Los Alamitos
-
Rajbhandari S, Contes A, Rana OF, Deora V, Wootten I (2006) Trust assessment using provenance in service oriented applications. In: Proceedings of the tenth IEEE on international enterprise distributed object computing conference workshops, Hongkong. IEEE CS Press, Los Alamitos, pp 65-72
-
(2006)
Proceedings of the Tenth IEEE on International Enterprise Distributed Object Computing Conference Workshops
, pp. 65-72
-
-
Rajbhandari, S.1
Contes, A.2
Rana, O.F.3
Deora, V.4
Wootten, I.5
-
7
-
-
4143058053
-
Using trust and risk in role-based access control policies
-
ACM Press, New York
-
Dimmock N, Belokosztolszki A, Eyers D, Bacon J, Ingram D, Moody K (2004) Using trust and risk in role-based access control policies. In: Proceedings of the ninth ACM symposium on access control models and technologies. ACM Press, New York, pp 156-162
-
(2004)
Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies
, pp. 156-162
-
-
Dimmock, N.1
Belokosztolszki, A.2
Eyers, D.3
Bacon, J.4
Ingram, D.5
Moody, K.6
-
10
-
-
35248892017
-
Trust based service provider selection in open environments
-
Seoul, Korea, ACM Press, New York
-
Billhardt H, Hermoso R, Ossowski S, Centeno R (2007) Trust based service provider selection in open environments. In: Proceedings of the 22nd annual ACM symposium on applied computing, Seoul, Korea. ACM Press, New York, pp 1375-1380
-
(2007)
Proceedings of the 22nd Annual ACM Symposium on Applied Computing
, pp. 1375-1380
-
-
Billhardt, H.1
Hermoso, R.2
Ossowski, S.3
Centeno, R.4
-
11
-
-
35248816893
-
Certain trust: A trust model for users and agents
-
Seoul, Korea. ACM Press, New York
-
Ries S (2007) Certain trust: a trust model for users and agents. In: Proceedings of the 22nd annual ACM symposium on applied computing, Seoul, Korea. ACM Press, New York, pp 1599-1604
-
(2007)
Proceedings of the 22nd Annual ACM Symposium on Applied Computing
, pp. 1599-1604
-
-
Ries, S.1
-
12
-
-
33751049091
-
A fuzzy model for reasoning about reputation in web services
-
Dijon, France. ACM Press, New York
-
Sherchan W, Loke S, Krishnaswamy S (2006) A fuzzy model for reasoning about reputation in web services. In: Proceedings of the 21st annual ACM symposium on applied computing, Dijon, France. ACM Press, New York, pp 1886-1892
-
(2006)
Proceedings of the 21st Annual ACM Symposium on Applied Computing
, pp. 1886-1892
-
-
Sherchan, W.1
Loke, S.2
Krishnaswamy, S.3
-
13
-
-
33751118798
-
Autonomic trust prediction for pervasive systems
-
Vienna, Austria, IEEE CS Press, Los Alamitos
-
Capra L, Musolesi M (2006) Autonomic trust prediction for pervasive systems. In: Proceedings of the 20th international conference on Advanced Information Networking and Applications. Vienna, Austria, IEEE CS Press, Los Alamitos, 481-488
-
(2006)
Proceedings of the 20th International Conference on Advanced Information Networking and Applications
, pp. 481-488
-
-
Capra, L.1
Musolesi, M.2
-
16
-
-
33745913622
-
B-trust: Bayesian trust framework for pervasive computing
-
In: Proceedings of the fourth international conference on Trust Management Springer, Heidelberg
-
Quercia D, Hailes S, Capra L (2006) B-trust: Bayesian trust framework for pervasive computing. In: Proceedings of the fourth international conference on Trust Management, Lecture Notes in Computer Science, vol 3986, Springer, Heidelberg, pp 298-312
-
(2006)
Lecture Notes in Computer Science
, vol.3986
, pp. 298-312
-
-
Quercia, D.1
Hailes, S.2
Capra, L.3
-
17
-
-
84949942881
-
The right type of trust for distributed systems
-
Lake Arrowhead. ACM Press, New York
-
Jøsang A (1996) The right type of trust for distributed systems. In: Proceedings of the 1996 workshop on new security paradigms, Lake Arrowhead. ACM Press, New York, pp 119-131
-
(1996)
Proceedings of the 1996 Workshop on New Security Paradigms
, pp. 119-131
-
-
Jøsang, A.1
-
18
-
-
56749097285
-
CAT: A context-aware trust model for open and dynamic systems
-
Brazil. ACM Press, New York
-
Uddin MG, Zulkernine M, Ahamed SI (2008) CAT: a context-aware trust model for open and dynamic systems. In: Proceedings of the 23rd annual ACM symposium on applied computing, Brazil. ACM Press, New York, pp 2024-2029
-
(2008)
Proceedings of the 23rd Annual ACM Symposium on Applied Computing
, pp. 2024-2029
-
-
Uddin, M.G.1
Zulkernine, M.2
Ahamed, S.I.3
-
21
-
-
0142187797
-
A novel two-level trust model for grid
-
In: Information and communications security Springer, Heidelberg
-
Tie-Yan L, HuaFei Z, Kwok-Yan L (2003) A novel two-level trust model for grid. In: Information and communications security, Lecture Notes in Computer Science, vol 2836. Springer, Heidelberg, pp 214-225
-
(2003)
Lecture Notes in Computer Science
, vol.2836
, pp. 214-225
-
-
Tie-Yan, L.1
Huafei, Z.2
Kwok-Yan, L.3
-
23
-
-
33750952887
-
Trust based risk management for distributed system security-a new approach
-
Vienna, Austria, IEEE CS Press, Los Alamitos
-
Lin C, Varadharajan V (2006) Trust based risk management for distributed system security-a new approach. In: Proceedings of the first international conference on availability, reliability and security. Vienna, Austria, IEEE CS Press, Los Alamitos, pp 6-13
-
(2006)
Proceedings of the First International Conference on Availability, Reliability and Security
, pp. 6-13
-
-
Lin, C.1
Varadharajan, V.2
-
31
-
-
33751041485
-
BambooTrust: Practical scalable trust management for global public computing
-
Dijon, France. ACM Press, New York
-
Kotsovinos E, Williams A (2006) BambooTrust: practical scalable trust management for global public computing. In Proceedings of the 21st annual ACM symposium on applied computing, Dijon, France. ACM Press, New York, pp 1893-1897
-
(2006)
Proceedings of the 21st Annual ACM Symposium on Applied Computing
, pp. 1893-1897
-
-
Kotsovinos, E.1
Williams, A.2
-
34
-
-
33749660420
-
Adaptive trust negotiation and access control for grids
-
Washington, USA. IEEE CS Press, Los Alamitos
-
Ryutov T, Zhou L, Neuman C, Foukia N, Leithead T, Seamons K (2005) Adaptive trust negotiation and access control for grids, In: Proceedings of the sixth IEEE/ACM international workshop on grid computing, Washington, USA. IEEE CS Press, Los Alamitos, pp 55-62
-
(2005)
Proceedings of the Sixth IEEE/ACM International Workshop on Grid Computing
, pp. 55-62
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Foukia, N.4
Leithead, T.5
Seamons, K.6
-
36
-
-
7044225904
-
Towards incentive-compatible reputation management
-
In: Trust, reputation and security: theories and practice Springer, Heidelberg
-
Jurca R, Faltings B (2002) Towards incentive-compatible reputation management. In: Trust, reputation and security: theories and practice. Lecture Notes in Computer Science, vol 2631. Springer, Heidelberg, pp 138-147
-
(2002)
Lecture Notes in Computer Science
, vol.2631
, pp. 138-147
-
-
Jurca, R.1
Faltings, B.2
-
39
-
-
33748081445
-
TrustBAC: Integrating trust relationships into the RBAC model for access control in open systems
-
California, USA. ACM Press, New York
-
Chakraborty S, Ray I (2006) TrustBAC: integrating trust relationships into the RBAC model for access control in open systems. In: Proceedings of the 11th ACM symposium on access control models and technologies. California, USA. ACM Press, New York, pp 49-58
-
(2006)
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies
, pp. 49-58
-
-
Chakraborty, S.1
Ray, I.2
-
42
-
-
84880467894
-
The eigentrust algorithm for reputation management in P2P networks
-
Budapest. ACM Press, New York
-
Kamvar SD, Schlosser MT, Molina-Garcia H (2003) The eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th international conference on world wide web, Budapest. ACM Press, New York, pp 640-651
-
(2003)
Proceedings of the 12th International Conference on World Wide Web
, pp. 640-651
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Molina-Garcia, H.3
-
43
-
-
46449123957
-
An approach to optimize local trust algorithm for suremsg service
-
Edinburg, IEEE CS Press, Los Alamitos
-
Zhang W, Bi J, Wu J, Qin Z (2007) An approach to optimize local trust algorithm for suremsg service. In: Proceedings of the 2007 ECSIS symposium on bio-inspired, learning, and intelligent systems for security, Edinburg, IEEE CS Press, Los Alamitos, pp 51-54
-
(2007)
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security
, pp. 51-54
-
-
Zhang, W.1
Bi, J.2
Wu, J.3
Qin, Z.4
-
44
-
-
28644440574
-
Towards self-protecting ubiquitous systems: Monitoring trust-based interactions
-
1
-
C English S Terzis P Nixon 2005 Towards self-protecting ubiquitous systems: monitoring trust-based interactions Pers Ubiquitous Comput 10 1 50 54
-
(2005)
Pers Ubiquitous Comput
, vol.10
, pp. 50-54
-
-
English, C.1
Terzis, S.2
Nixon, P.3
-
45
-
-
84942921136
-
Modelling trust for system design using the i*strategic actors framework
-
Proceedings of the international workshop on deception, fraud, and trust in agent societies Springer, Heidelberg
-
Yu E, Liu L (2001) Modelling trust for system design using the i*strategic actors framework. In: Proceedings of the international workshop on deception, fraud, and trust in agent societies, Lecture Notes in Computer Science, vol 2246. Springer, Heidelberg, pp 175-194
-
(2001)
Lecture Notes in Computer Science
, vol.2246
, pp. 175-194
-
-
Yu, E.1
Liu, L.2
-
46
-
-
84969992019
-
Analyzing trust in technology strategies
-
McGraw-Hill, New York
-
Horkoff J, Yu E, Liu L (2006) Analyzing trust in technology strategies. In: Proceedings of the international conference on privacy, security, and trust. McGraw-Hill, New York, pp 21-32
-
(2006)
Proceedings of the International Conference on Privacy, Security, and Trust
, pp. 21-32
-
-
Horkoff, J.1
Yu, E.2
Liu, L.3
-
48
-
-
84947273682
-
The sybil attack
-
In: Proceedings of the first international workshop on peer-to-peer systems Cambridge, MA, USA, Springer, Heidelberg
-
Douceur J (2002) The sybil attack. In: Proceedings of the first international workshop on peer-to-peer systems, Lecture Notes in Computer Science, vol 2429. Cambridge, MA, USA, Springer, Heidelberg, pp 251-260
-
(2002)
Lecture Notes in Computer Science
, vol.2429
, pp. 251-260
-
-
Douceur, J.1
-
49
-
-
48049092037
-
A mechanism for detecting and responding to misbehaving nodes in wireless networks
-
IEEE CS Press, Los Alamitos
-
Damon M, Doug S, Dirk G (2007) A mechanism for detecting and responding to misbehaving nodes in wireless networks. In: Proceedings of the fourth IEEE communications society conference on sensor, mesh and ad hoc communications and networks. IEEE CS Press, Los Alamitos, pp 678-684
-
(2007)
Proceedings of the Fourth IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks
, pp. 678-684
-
-
Damon, M.1
Doug, S.2
Dirk, G.3
|