메뉴 건너뛰기




Volumn 3, Issue 1, 2009, Pages 47-63

Collaboration through computation: Incorporating trust model into service-based software systems

Author keywords

Interaction; Recommendation; Service based software; Trust

Indexed keywords

QUALITY ASSURANCE;

EID: 62349132763     PISSN: 18632386     EISSN: 18632394     Source Type: Journal    
DOI: 10.1007/s11761-009-0037-8     Document Type: Article
Times cited : (8)

References (49)
  • 2
    • 24944456051 scopus 로고    scopus 로고
    • Risk models for trust-based access control
    • In: Proceedings of the third annual conference on trust management Springer, Heidelberg
    • Dimmock N, Bacon J, Ingram D, Moody K (2005) Risk models for trust-based access control. In: Proceedings of the third annual conference on trust management, Lecture Notes in Computer Science, vol 3477. Springer, Heidelberg, pp 364-371
    • (2005) Lecture Notes in Computer Science , vol.3477 , pp. 364-371
    • Dimmock, N.1    Bacon, J.2    Ingram, D.3    Moody, K.4
  • 11
    • 35248816893 scopus 로고    scopus 로고
    • Certain trust: A trust model for users and agents
    • Seoul, Korea. ACM Press, New York
    • Ries S (2007) Certain trust: a trust model for users and agents. In: Proceedings of the 22nd annual ACM symposium on applied computing, Seoul, Korea. ACM Press, New York, pp 1599-1604
    • (2007) Proceedings of the 22nd Annual ACM Symposium on Applied Computing , pp. 1599-1604
    • Ries, S.1
  • 16
    • 33745913622 scopus 로고    scopus 로고
    • B-trust: Bayesian trust framework for pervasive computing
    • In: Proceedings of the fourth international conference on Trust Management Springer, Heidelberg
    • Quercia D, Hailes S, Capra L (2006) B-trust: Bayesian trust framework for pervasive computing. In: Proceedings of the fourth international conference on Trust Management, Lecture Notes in Computer Science, vol 3986, Springer, Heidelberg, pp 298-312
    • (2006) Lecture Notes in Computer Science , vol.3986 , pp. 298-312
    • Quercia, D.1    Hailes, S.2    Capra, L.3
  • 17
    • 84949942881 scopus 로고    scopus 로고
    • The right type of trust for distributed systems
    • Lake Arrowhead. ACM Press, New York
    • Jøsang A (1996) The right type of trust for distributed systems. In: Proceedings of the 1996 workshop on new security paradigms, Lake Arrowhead. ACM Press, New York, pp 119-131
    • (1996) Proceedings of the 1996 Workshop on New Security Paradigms , pp. 119-131
    • Jøsang, A.1
  • 20
  • 21
    • 0142187797 scopus 로고    scopus 로고
    • A novel two-level trust model for grid
    • In: Information and communications security Springer, Heidelberg
    • Tie-Yan L, HuaFei Z, Kwok-Yan L (2003) A novel two-level trust model for grid. In: Information and communications security, Lecture Notes in Computer Science, vol 2836. Springer, Heidelberg, pp 214-225
    • (2003) Lecture Notes in Computer Science , vol.2836 , pp. 214-225
    • Tie-Yan, L.1    Huafei, Z.2    Kwok-Yan, L.3
  • 31
    • 33751041485 scopus 로고    scopus 로고
    • BambooTrust: Practical scalable trust management for global public computing
    • Dijon, France. ACM Press, New York
    • Kotsovinos E, Williams A (2006) BambooTrust: practical scalable trust management for global public computing. In Proceedings of the 21st annual ACM symposium on applied computing, Dijon, France. ACM Press, New York, pp 1893-1897
    • (2006) Proceedings of the 21st Annual ACM Symposium on Applied Computing , pp. 1893-1897
    • Kotsovinos, E.1    Williams, A.2
  • 36
    • 7044225904 scopus 로고    scopus 로고
    • Towards incentive-compatible reputation management
    • In: Trust, reputation and security: theories and practice Springer, Heidelberg
    • Jurca R, Faltings B (2002) Towards incentive-compatible reputation management. In: Trust, reputation and security: theories and practice. Lecture Notes in Computer Science, vol 2631. Springer, Heidelberg, pp 138-147
    • (2002) Lecture Notes in Computer Science , vol.2631 , pp. 138-147
    • Jurca, R.1    Faltings, B.2
  • 39
    • 33748081445 scopus 로고    scopus 로고
    • TrustBAC: Integrating trust relationships into the RBAC model for access control in open systems
    • California, USA. ACM Press, New York
    • Chakraborty S, Ray I (2006) TrustBAC: integrating trust relationships into the RBAC model for access control in open systems. In: Proceedings of the 11th ACM symposium on access control models and technologies. California, USA. ACM Press, New York, pp 49-58
    • (2006) Proceedings of the 11th ACM Symposium on Access Control Models and Technologies , pp. 49-58
    • Chakraborty, S.1    Ray, I.2
  • 44
    • 28644440574 scopus 로고    scopus 로고
    • Towards self-protecting ubiquitous systems: Monitoring trust-based interactions
    • 1
    • C English S Terzis P Nixon 2005 Towards self-protecting ubiquitous systems: monitoring trust-based interactions Pers Ubiquitous Comput 10 1 50 54
    • (2005) Pers Ubiquitous Comput , vol.10 , pp. 50-54
    • English, C.1    Terzis, S.2    Nixon, P.3
  • 45
    • 84942921136 scopus 로고    scopus 로고
    • Modelling trust for system design using the i*strategic actors framework
    • Proceedings of the international workshop on deception, fraud, and trust in agent societies Springer, Heidelberg
    • Yu E, Liu L (2001) Modelling trust for system design using the i*strategic actors framework. In: Proceedings of the international workshop on deception, fraud, and trust in agent societies, Lecture Notes in Computer Science, vol 2246. Springer, Heidelberg, pp 175-194
    • (2001) Lecture Notes in Computer Science , vol.2246 , pp. 175-194
    • Yu, E.1    Liu, L.2
  • 48
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • In: Proceedings of the first international workshop on peer-to-peer systems Cambridge, MA, USA, Springer, Heidelberg
    • Douceur J (2002) The sybil attack. In: Proceedings of the first international workshop on peer-to-peer systems, Lecture Notes in Computer Science, vol 2429. Cambridge, MA, USA, Springer, Heidelberg, pp 251-260
    • (2002) Lecture Notes in Computer Science , vol.2429 , pp. 251-260
    • Douceur, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.