메뉴 건너뛰기




Volumn , Issue , 2008, Pages 175-187

Trust management for secure information flows

Author keywords

ID PKC; Information flow; Risk; Trust

Indexed keywords

DEFENCE SECTOR; ECONOMIC MODELS; ENCRYPTION SCHEMES; ID-PKC; INFORMATION FLOW; INFORMATION FLOWS; INFORMATION LEAKAGE; SECURE INFORMATION FLOW; TRUST; TRUST MANAGEMENT; TRUST MANAGEMENT SYSTEMS;

EID: 67650660211     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1455770.1455794     Document Type: Conference Paper
Times cited : (20)

References (51)
  • 1
    • 1542299118 scopus 로고    scopus 로고
    • Ad Hoc-VCG: A Truthful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents
    • ACM
    • L. Anderegg and S. Eidenbenz. Ad Hoc-VCG: A Truthful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents. In Proc. of the 9th Annual Int. Conf. on Mobile Computing and Networking, pages 245-259. ACM, 2003.
    • (2003) Proc. of the 9th Annual Int. Conf. on Mobile Computing and Networking , pp. 245-259
    • Anderegg, L.1    Eidenbenz, S.2
  • 5
    • 33646823652 scopus 로고    scopus 로고
    • Efficient Identity-Based Key Encapsulation to Multiple Parties
    • Cryptography and Coding, of
    • M. Barbosa and P. Farshim. Efficient Identity-Based Key Encapsulation to Multiple Parties. In Cryptography and Coding, volume 3796 of LNCS, 2005.
    • (2005) LNCS , vol.3796
    • Barbosa, M.1    Farshim, P.2
  • 6
    • 43249104504 scopus 로고    scopus 로고
    • Generic Constructions of Identity-Based and Certificateless KEMs
    • K. Bentahar, P. Farshim, J. Malone-Lee, and N.P. Smart, Generic Constructions of Identity-Based and Certificateless KEMs. Journal of Cryptology, 21(2):178-199, 2008.
    • (2008) Journal of Cryptology , vol.21 , Issue.2 , pp. 178-199
    • Bentahar, K.1    Farshim, P.2    Malone-Lee, J.3    Smart, N.P.4
  • 7
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical Identity-Based Encryption with Constant Size Ciphertext
    • EUROCRYPT, of, Springer
    • D. Boneh, X. Boyen, and E.-J. Goh. Hierarchical Identity-Based Encryption with Constant Size Ciphertext. In EUROCRYPT, volume 3494 of LNCS, pages 440-456. Springer, 2005.
    • (2005) LNCS , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 8
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • CRYPTO, of, Springer
    • D. Boneh and M.K. Franklin. Identity-Based Encryption from the Weil Pairing. In CRYPTO, volume 2139 of LNCS, pages 213-229. Springer, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 9
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, Subset, and Range Queries on Encrypted Data
    • Proc. of the Jtih Theory of Cryptography Conf, of, Springer
    • D. Boneh and B. Waters. Conjunctive, Subset, and Range Queries on Encrypted Data. In Proc. of the Jtih Theory of Cryptography Conf., volume 4392 of LNCS, pages 535-554. Springer, 2007.
    • (2007) LNCS , vol.4392 , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 10
    • 24744432675 scopus 로고    scopus 로고
    • S. Buchegger and J.-Y. Le Boudec. Self-Policing Mobile Ad Hoc Networks by Reputation Systems. Communications Magazine, IEEE, 43(7):101-107, 2005.
    • S. Buchegger and J.-Y. Le Boudec. Self-Policing Mobile Ad Hoc Networks by Reputation Systems. Communications Magazine, IEEE, 43(7):101-107, 2005.
  • 22
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-Based Cryptography
    • ASIACRYPT, of, Springer
    • C. Gentry and A. Silverberg. Hierarchical ID-Based Cryptography. In ASIACRYPT, volume 2501 of LNCS, pages 548-566. Springer, 2002.
    • (2002) LNCS , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 25
    • 33749611163 scopus 로고    scopus 로고
    • Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation
    • Technical Report CACR 2006-04, University of Waterloo, Canada
    • K. Hoeper and G. Gong. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation. Technical Report CACR 2006-04, University of Waterloo, Canada, 2006.
    • (2006)
    • Hoeper, K.1    Gong, G.2
  • 32
    • 0025022888 scopus 로고    scopus 로고
    • CD. McCollum and J.R. Messing L. Notargiacomo. Beyond the Pale of MAC and DAC-Defming New Forms of Access Control. In Proc. of the 1990 IEEE Symp. on Security and Privacy, pages 190-200. IEEE Comp. Soc, 1990.
    • CD. McCollum and J.R. Messing L. Notargiacomo. Beyond the Pale of MAC and DAC-Defming New Forms of Access Control. In Proc. of the 1990 IEEE Symp. on Security and Privacy, pages 190-200. IEEE Comp. Soc, 1990.
  • 33
    • 70349291859 scopus 로고    scopus 로고
    • P. Michiardi and R. Molva. CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. In IFIP TC6/TC11 6th Joint Working Conf. on Communications and Multimedia Security, 228 of IFIP Conf. Proceedings, pages 107-121. Kluwer Academic, 2002.
    • P. Michiardi and R. Molva. CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. In IFIP TC6/TC11 6th Joint Working Conf. on Communications and Multimedia Security, volume 228 of IFIP Conf. Proceedings, pages 107-121. Kluwer Academic, 2002.
  • 34
  • 36
    • 33845437573 scopus 로고    scopus 로고
    • HORIZONTAL INTEGRATION: Broader Access Models for Realizing Information Dominance
    • Jason Program Office, Special Report JSR-04-13, MITRE Corporation
    • Jason Program Office. HORIZONTAL INTEGRATION: Broader Access Models for Realizing Information Dominance. Special Report JSR-04-13, MITRE Corporation, 2004.
    • (2004)
  • 43
    • 1842829828 scopus 로고    scopus 로고
    • Risk Management Guide for Information Technology Systems
    • Special Report 800-300, NIST, 2002
    • G. Stoneburner, A. Goguen, and A. Feringa. Risk Management Guide for Information Technology Systems. Special Report 800-300, NIST, 2002.
    • Stoneburner, G.1    Goguen, A.2    Feringa, A.3
  • 44
    • 47949111299 scopus 로고    scopus 로고
    • Verified Enforcement of Security Policies for Cross-Domain Information Flows
    • IEEE Comp. Soc
    • N. Swamy, M. Hicks, and S. Tsang. Verified Enforcement of Security Policies for Cross-Domain Information Flows. In Proc. of the 2007 Military Communications Conf., pages 192-206. IEEE Comp. Soc, 2007.
    • (2007) Proc. of the 2007 Military Communications Conf , pp. 192-206
    • Swamy, N.1    Hicks, M.2    Tsang, S.3
  • 47
    • 3142738238 scopus 로고    scopus 로고
    • Supporting Reputation based Trust in Peer-to-Peer Communities
    • L. Xiong and L. Liu. Supporting Reputation based Trust in Peer-to-Peer Communities. In IEEE Transactions on Knowledge and Data Engineering, Special Issue on Peer-to-Peer Based Data Management, 16(7), 2004.
    • (2004) IEEE Transactions on Knowledge and Data Engineering , vol.16 , Issue.7
    • Xiong, L.1    Liu, L.2
  • 51
    • 34548493227 scopus 로고    scopus 로고
    • On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks: An Integrated Approach Using Game Theoretic and Cryptographic Techniques
    • S. Zhong, L.E. Li, Y.G. Liu, and Y.R. Yang. On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks: An Integrated Approach Using Game Theoretic and Cryptographic Techniques. Wireless Networks, 13(6):799-816, 2007.
    • (2007) Wireless Networks , vol.13 , Issue.6 , pp. 799-816
    • Zhong, S.1    Li, L.E.2    Liu, Y.G.3    Yang, Y.R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.