메뉴 건너뛰기




Volumn , Issue , 2008, Pages 201-212

AttributeTrust - A framework for evaluating trust in aggregated attributes via a reputation system

Author keywords

[No Author keywords available]

Indexed keywords

AUTHORIZATION SYSTEMS; MULTIPLE ATTRIBUTES; REPUTATION SYSTEMS; SERVICE PROVIDER; TRUSTED ATTRIBUTE; VOTING MECHANISM;

EID: 67650083441     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PST.2008.28     Document Type: Conference Paper
Times cited : (21)

References (25)
  • 3
    • 67650032256 scopus 로고    scopus 로고
    • Toni Nykänen, Attribute Certificates in X.509, HUT TML 2000, Tik-110.501 Seminar on Network Security, Helsinki, Finland 2000
    • Toni Nykänen, "Attribute Certificates in X.509", HUT TML 2000, Tik-110.501 Seminar on Network Security, Helsinki, Finland 2000
  • 4
    • 0012077289 scopus 로고    scopus 로고
    • Attribute Certification: An Enabling Technology for Delegation and Role-Based Controls in Distributed Environments
    • John Linn, Magnus Nystrom, "Attribute Certification: An Enabling Technology for Delegation and Role-Based Controls in Distributed Environments", Proceedings of the fourth ACM workshop on RBAC, pp 121 - 130, 1999
    • (1999) Proceedings of the fourth ACM workshop on RBAC , pp. 121-130
    • Linn, J.1    Nystrom, M.2
  • 6
    • 24944499839 scopus 로고    scopus 로고
    • Trust Transfer: Encouraging Self-Recommendations without Sybil Attack
    • Proceedings of the Third International Conference on Trust Management, Springer
    • J.-M. Seigneur, A. Gray, and C. D. Jensen, "Trust Transfer: Encouraging Self-Recommendations without Sybil Attack", in Proceedings of the Third International Conference on Trust Management, LNCS, Springer, 2005
    • (2005) LNCS
    • Seigneur, J.-M.1    Gray, A.2    Jensen, C.D.3
  • 7
    • 67650058654 scopus 로고    scopus 로고
    • Access Control in Distributed Object Systems: Problems With Access Control Lists
    • p
    • S.V. Nagaraj, "Access Control in Distributed Object Systems: Problems With Access Control Lists," p. 163, IEEE WETICE, 2001
    • (2001) IEEE WETICE , pp. 163
    • Nagaraj, S.V.1
  • 10
    • 35548992569 scopus 로고    scopus 로고
    • SybilGuard: Defending Against Sybil Attacks via Social Networks
    • September 11-15, Pisa, Italy
    • Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman, "SybilGuard: Defending Against Sybil Attacks via Social Networks", SIGCOMM'06, September 11-15, 2006, Pisa, Italy
    • (2006) SIGCOMM'06
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4
  • 12
    • 67650005823 scopus 로고    scopus 로고
    • http://advogato.org/trust-metric.html
  • 13
    • 84880467894 scopus 로고    scopus 로고
    • The EigenTrust Algorithm for Reputation Management in P2P Networks
    • May 20-24, Hungary
    • Sepandar D. Kamvar, Mario T. Schlosser, Hector Garcia Molina, "The EigenTrust Algorithm for Reputation Management in P2P Networks", WWW2003, May 20-24, 2003, Hungary
    • (2003) WWW2003
    • Kamvar, S.D.1    Schlosser, M.T.2    Garcia Molina, H.3
  • 14
    • 3142738238 scopus 로고    scopus 로고
    • PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
    • July
    • Li Xiong, Ling Liu, "PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities", IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 7, July 2004
    • (2004) IEEE Transactions on Knowledge and Data Engineering , vol.16 , Issue.7
    • Xiong, L.1    Liu, L.2
  • 16
    • 67650061816 scopus 로고    scopus 로고
    • Department of Computer Science, Univeristy of York, Heslington, York
    • Howard Chivers, "Personal Attributes and Privacy", Department of Computer Science, Univeristy of York, Heslington, York
    • Personal Attributes and Privacy
    • Chivers, H.1
  • 17
    • 55149107112 scopus 로고    scopus 로고
    • A Survey of Attack and Defense Techniques for Reputation Systems
    • TR #07-013, Purdue University
    • Kevin Hoffman, David Zage, and Cristina Nita-Rotaru, "A Survey of Attack and Defense Techniques for Reputation Systems", Tech Report Tech CSD TR #07-013 , Purdue University
    • Tech Report Tech CSD
    • Hoffman, K.1    Zage, D.2    Nita-Rotaru, C.3
  • 18
    • 19944395899 scopus 로고    scopus 로고
    • Propagation of Trust and Distrust
    • May 17-22, USA
    • R. Guha, Ravi Kumar, Prabhakar Raghavan, Andrew Tomkins, "Propagation of Trust and Distrust", WWW2004, May 17-22, 2004, USA
    • (2004) WWW2004
    • Guha, R.1    Kumar, R.2    Raghavan, P.3    Tomkins, A.4
  • 22
    • 34548181812 scopus 로고    scopus 로고
    • Personal Attribute Provider: A Secure Framework for Personal Attribute Exchange on the Internet
    • Chiba Masayuki, Urushima Kenji, Maeda Yoji, "Personal Attribute Provider: A Secure Framework for Personal Attribute Exchange on the Internet", Tran. of IPSJ, Volume 47, No 3, Page 676-685 (2006)
    • (2006) Tran. of IPSJ , vol.47 , Issue.3 , pp. 676-685
    • Masayuki, C.1    Kenji, U.2    Yoji, M.3
  • 23
    • 84944407870 scopus 로고    scopus 로고
    • Attack-Resistance of Computational Trust Models
    • Andrew Twigg, Nathan Dimmock, "Attack-Resistance of Computational Trust Models", Proceedings of WETICE 2003
    • (2003) Proceedings of WETICE
    • Twigg, A.1    Dimmock, N.2
  • 25
    • 85056545124 scopus 로고    scopus 로고
    • Limiting the Disclosure of Access Control Policies During Automated Trust Negotiation
    • San Diego, CA, February
    • K. E. Seamons, M. Winslett, and T. Yu, "Limiting the Disclosure of Access Control Policies During Automated Trust Negotiation", Network and Distributed System Security Symposium, San Diego, CA, February 2001
    • (2001) Network and Distributed System Security Symposium
    • Seamons, K.E.1    Winslett, M.2    Yu, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.