메뉴 건너뛰기




Volumn 32, Issue 4, 2009, Pages 688-698

Trust model based on behaviors risk evaluation

Author keywords

Asset identification; Risk evaluation; Threat; Trust; Vulnerability identification

Indexed keywords

ASSET IDENTIFICATION; RISK EVALUATION; THREAT; TRUST; VULNERABILITY IDENTIFICATION;

EID: 65349185023     PISSN: 02544164     EISSN: None     Source Type: Journal    
DOI: 10.3724/SP.J.1016.2009.00688     Document Type: Article
Times cited : (21)

References (21)
  • 3
    • 3042525923 scopus 로고    scopus 로고
    • A recommendation based Peer-to-Peer Trust model
    • in Chinese
    • Dou Wen, Wang Huai-Min, Jia Yan, Zou Peng. A recommendation based Peer-to-Peer Trust model. Journal of Software, 2004, 15(4): 571-583 (in Chinese)
    • (2004) Journal of Software , vol.15 , Issue.4 , pp. 571-583
    • Dou, W.1    Wang, H.-M.2    Jia, Y.3    Zou, P.4
  • 4
    • 33748519605 scopus 로고    scopus 로고
    • The decision to trust
    • Hurley R F. The decision to trust. Harvard Business Review, 2006, 84(9): 55-62
    • (2006) Harvard Business Review , vol.84 , Issue.9 , pp. 55-62
    • Hurley, R.F.1
  • 5
    • 33646831908 scopus 로고    scopus 로고
    • Trust guard: Countering vulnerabilities in reputation management for decentralized overlay networks
    • Chiba, Japan
    • Srivatsa M, Xiong L, Liu L. Trust guard: Countering vulnerabilities in reputation management for decentralized overlay networks//Proceedings of the 14th World Wide Web Conference. Chiba, Japan, 2005: 422-431
    • (2005) Proceedings of the 14th World Wide Web Conference , pp. 422-431
    • Srivatsa, M.1    Xiong, L.2    Liu, L.3
  • 6
    • 35048832333 scopus 로고    scopus 로고
    • Analysing the relationship between risk and trust
    • LNCS 2995. Oxford, UK
    • Jøsang A, Presti S. Analysing the relationship between risk and trust//Proceedings of the iTrust'04. LNCS 2995. Oxford, UK, 2004: 135-145
    • (2004) Proceedings of the iTrust'04 , pp. 135-145
    • Jøsang, A.1    Presti, S.2
  • 7
    • 53349128426 scopus 로고    scopus 로고
    • Trust as risk and the foundation of investment value
    • Olsen Robert A. Trust as risk and the foundation of investment value. The Journal of Socio-Economics, 2008, 37(6): 2189-2200
    • (2008) The Journal of Socio-Economics , vol.37 , Issue.6 , pp. 2189-2200
    • Olsen, R.A.1
  • 11
    • 33749487896 scopus 로고    scopus 로고
    • DyTrust: A time-frame based dynamic trust mode for P2P systems
    • in Chinese
    • Chang Jun-Sheng, Wang Huai-Min, Yin Gang. DyTrust: A time-frame based dynamic trust mode for P2P systems. Chinese Journal of Computers, 2006, 29(8): 1301-1307 (in Chinese)
    • (2006) Chinese Journal of Computers , vol.29 , Issue.8 , pp. 1301-1307
    • Chang, J.-S.1    Wang, H.-M.2    Yin, G.3
  • 12
    • 40949153358 scopus 로고    scopus 로고
    • A new trust model based on recommendation evidence for P2P networks
    • in Chinese
    • Tian Chun-Qi, Zou Shi-Hong, Wang Wen-Dong, Cheng Shi-Duan. A new trust model based on recommendation evidence for P2P networks. Chinese Journal of Computers, 2008, 31(2): 270-281 (in Chinese)
    • (2008) Chinese Journal of Computers , vol.31 , Issue.2 , pp. 270-281
    • Tian, C.-Q.1    Zou, S.-H.2    Wang, W.-D.3    Cheng, S.-D.4
  • 13
    • 33644940300 scopus 로고    scopus 로고
    • Construction of Peer-to-Peer multiple-grain Trust model
    • in Chinese
    • Zhang Qian, Zhang Xia, Wen Xue-Zhi et al. Construction of Peer-to-Peer multiple-grain Trust model. Journal of Software, 2006, 17(1): 96-107 (in Chinese)
    • (2006) Journal of Software , vol.17 , Issue.1 , pp. 96-107
    • Zhang, Q.1    Zhang, X.2    Wen, X.-Z.3
  • 18
    • 37348999613 scopus 로고    scopus 로고
    • A kind of game-theoretic control mechanism of user behavior trust based on prediction in trustworthy network
    • in Chinese
    • Tian Li-Qin, Lin Chuang. A kind of game-theoretic control mechanism of user behavior trust based on prediction in trustworthy network. Chinese Journal of Computers, 2007, 30(11): 1930-1938 (in Chinese)
    • (2007) Chinese Journal of Computers , vol.30 , Issue.11 , pp. 1930-1938
    • Tian, L.-Q.1    Lin, C.2
  • 19
    • 65349136794 scopus 로고    scopus 로고
    • From trust to dependability through risk analysis
    • DIT-University of Trento: Technical Report DIT-06-079
    • Asnar Y, Giorgini P, Massacci F, Zannone N. From trust to dependability through risk analysis. DIT-University of Trento: Technical Report DIT-06-079, 2006
    • (2006)
    • Asnar, Y.1    Giorgini, P.2    Massacci, F.3    Zannone, N.4
  • 21
    • 20444392884 scopus 로고    scopus 로고
    • A survey of computer vulnerability assessment
    • in Chinese
    • Xing Xu-Jia, Lin Chuang, Jiang Yi-Xin. A survey of computer vulnerability assessment. Chinese Journal of Computers, 2004, 27(1): 1-11 (in Chinese)
    • (2004) Chinese Journal of Computers , vol.27 , Issue.1 , pp. 1-11
    • Xing, X.-J.1    Lin, C.2    Jiang, Y.-X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.