-
3
-
-
67650032256
-
-
Toni Nykänen, Attribute Certificates in X.509, HUT TML 2000, Tik-110.501 Seminar on Network Security, Helsinki, Finland 2000
-
Toni Nykänen, "Attribute Certificates in X.509", HUT TML 2000, Tik-110.501 Seminar on Network Security, Helsinki, Finland 2000
-
-
-
-
4
-
-
0012077289
-
Attribute Certification: An Enabling Technology for Delegation and Role-Based Controls in Distributed Environments
-
John Linn, Magnus Nystrom, "Attribute Certification: An Enabling Technology for Delegation and Role-Based Controls in Distributed Environments", Proceedings of the fourth ACM workshop on RBAC, pp 121 - 130, 1999
-
(1999)
Proceedings of the fourth ACM workshop on RBAC
, pp. 121-130
-
-
Linn, J.1
Nystrom, M.2
-
5
-
-
13244288768
-
Authentication Metric Analysis and Design
-
May
-
Michael K. Reiter, Stuart G. Stubblebine, "Authentication Metric Analysis and Design", ACM Transactions on Information and System Security, Vol. 2, No. 2, May 1999, Pages 138-158
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.2
, pp. 138-158
-
-
Reiter, M.K.1
Stubblebine, S.G.2
-
6
-
-
24944499839
-
Trust Transfer: Encouraging Self-Recommendations without Sybil Attack
-
Proceedings of the Third International Conference on Trust Management, Springer
-
J.-M. Seigneur, A. Gray, and C. D. Jensen, "Trust Transfer: Encouraging Self-Recommendations without Sybil Attack", in Proceedings of the Third International Conference on Trust Management, LNCS, Springer, 2005
-
(2005)
LNCS
-
-
Seigneur, J.-M.1
Gray, A.2
Jensen, C.D.3
-
7
-
-
67650058654
-
Access Control in Distributed Object Systems: Problems With Access Control Lists
-
p
-
S.V. Nagaraj, "Access Control in Distributed Object Systems: Problems With Access Control Lists," p. 163, IEEE WETICE, 2001
-
(2001)
IEEE WETICE
, pp. 163
-
-
Nagaraj, S.V.1
-
10
-
-
35548992569
-
SybilGuard: Defending Against Sybil Attacks via Social Networks
-
September 11-15, Pisa, Italy
-
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman, "SybilGuard: Defending Against Sybil Attacks via Social Networks", SIGCOMM'06, September 11-15, 2006, Pisa, Italy
-
(2006)
SIGCOMM'06
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
12
-
-
67650005823
-
-
http://advogato.org/trust-metric.html
-
-
-
-
13
-
-
84880467894
-
The EigenTrust Algorithm for Reputation Management in P2P Networks
-
May 20-24, Hungary
-
Sepandar D. Kamvar, Mario T. Schlosser, Hector Garcia Molina, "The EigenTrust Algorithm for Reputation Management in P2P Networks", WWW2003, May 20-24, 2003, Hungary
-
(2003)
WWW2003
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia Molina, H.3
-
14
-
-
3142738238
-
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
-
July
-
Li Xiong, Ling Liu, "PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities", IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 7, July 2004
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.7
-
-
Xiong, L.1
Liu, L.2
-
16
-
-
67650061816
-
-
Department of Computer Science, Univeristy of York, Heslington, York
-
Howard Chivers, "Personal Attributes and Privacy", Department of Computer Science, Univeristy of York, Heslington, York
-
Personal Attributes and Privacy
-
-
Chivers, H.1
-
17
-
-
55149107112
-
A Survey of Attack and Defense Techniques for Reputation Systems
-
TR #07-013, Purdue University
-
Kevin Hoffman, David Zage, and Cristina Nita-Rotaru, "A Survey of Attack and Defense Techniques for Reputation Systems", Tech Report Tech CSD TR #07-013 , Purdue University
-
Tech Report Tech CSD
-
-
Hoffman, K.1
Zage, D.2
Nita-Rotaru, C.3
-
18
-
-
19944395899
-
Propagation of Trust and Distrust
-
May 17-22, USA
-
R. Guha, Ravi Kumar, Prabhakar Raghavan, Andrew Tomkins, "Propagation of Trust and Distrust", WWW2004, May 17-22, 2004, USA
-
(2004)
WWW2004
-
-
Guha, R.1
Kumar, R.2
Raghavan, P.3
Tomkins, A.4
-
19
-
-
84868224769
-
Minimal Information Disclosure with Efficiently Verifiable Credentials
-
to appear in, Fairfax, VA, USA
-
David Bauer, Douglas M. Blough, and David Cash, "Minimal Information Disclosure with Efficiently Verifiable Credentials", to appear in DIM'08 (Fourth ACM Workshop on Digital Identity Management), October 2008, Fairfax, VA, USA
-
(2008)
DIM'08 (Fourth ACM Workshop on Digital Identity Management), October
-
-
Bauer, D.1
Blough, D.M.2
Cash, D.3
-
20
-
-
34547505017
-
PP-Trust-X: A System for Privacy Preserving Trust Negotiations
-
July
-
A. Squicciarini, E. Bertino, E. Ferrari, F. Paci, B. Thuraisingham, "PP-Trust-X: A System for Privacy Preserving Trust Negotiations" , ACM Transactions on Systems and Information Security, July 2007
-
(2007)
ACM Transactions on Systems and Information Security
-
-
Squicciarini, A.1
Bertino, E.2
Ferrari, E.3
Paci, F.4
Thuraisingham, B.5
-
22
-
-
34548181812
-
Personal Attribute Provider: A Secure Framework for Personal Attribute Exchange on the Internet
-
Chiba Masayuki, Urushima Kenji, Maeda Yoji, "Personal Attribute Provider: A Secure Framework for Personal Attribute Exchange on the Internet", Tran. of IPSJ, Volume 47, No 3, Page 676-685 (2006)
-
(2006)
Tran. of IPSJ
, vol.47
, Issue.3
, pp. 676-685
-
-
Masayuki, C.1
Kenji, U.2
Yoji, M.3
-
23
-
-
84944407870
-
Attack-Resistance of Computational Trust Models
-
Andrew Twigg, Nathan Dimmock, "Attack-Resistance of Computational Trust Models", Proceedings of WETICE 2003
-
(2003)
Proceedings of WETICE
-
-
Twigg, A.1
Dimmock, N.2
-
25
-
-
85056545124
-
Limiting the Disclosure of Access Control Policies During Automated Trust Negotiation
-
San Diego, CA, February
-
K. E. Seamons, M. Winslett, and T. Yu, "Limiting the Disclosure of Access Control Policies During Automated Trust Negotiation", Network and Distributed System Security Symposium, San Diego, CA, February 2001
-
(2001)
Network and Distributed System Security Symposium
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
|