메뉴 건너뛰기




Volumn , Issue , 2009, Pages 71-74

An architectural approach for assessing system trust based on security policy specifications and security mechanisms

Author keywords

Assessment; Trust

Indexed keywords

ARCHITECTURAL APPROACH; ASSESSMENT; AUTOMATED SYSTEMS; COMPLEX TASK; DYNAMIC ENVIRONMENTS; SECURITY MECHANISM; SECURITY POLICY; SERVICE-ORIENTED ENVIRONMENT; SOFTWARE APPLICATIONS; TRUST; TRUST METRICS; TRUST RELATIONSHIP;

EID: 70350634081     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1626195.1626214     Document Type: Conference Paper
Times cited : (1)

References (20)
  • 1
    • 70350653379 scopus 로고    scopus 로고
    • Ws-trust 1.3, March 2007.
    • Ws-trust 1.3, March 2007.
  • 2
    • 70350695620 scopus 로고    scopus 로고
    • Trust modeling for security architecture development
    • Technical report, Sun Microsystems, Inc
    • D. Andert, R. Wakefield, and J. Weise. Trust modeling for security architecture development. Technical report, Sun Microsystems, Inc., 2002.
    • (2002)
    • Andert, D.1    Wakefield, R.2    Weise, J.3
  • 6
    • 34250647985 scopus 로고
    • Security and systems engineering
    • Technical report, Department of Computer Engineering and University of York and Heslington and York and UK
    • H. Chivers. Security and systems engineering. Technical report, Department of Computer Engineering and University of York and Heslington and York and UK, 1994.
    • (1994)
    • Chivers, H.1
  • 8
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • A. Jøsang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems, 43:618-644, 2007.
    • (2007) Decision Support Systems , vol.43 , pp. 618-644
    • Jøsang, A.1    Ismail, R.2    Boyd, C.3
  • 9
    • 0035577649 scopus 로고    scopus 로고
    • Trust-based security in pervasive computing environments
    • December
    • L. Kagal, T. Finin, and A. Joshi. Trust-based security in pervasive computing environments. IEEE Computer, 34:154-157, December 2001.
    • (2001) IEEE Computer , vol.34 , pp. 154-157
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 14
    • 84899365375 scopus 로고    scopus 로고
    • Trust in E-services: Technologies,Practices and Challenges
    • chapter A, Idea Group Inc
    • P. Massa. Trust in E-services: Technologies,Practices and Challenges, chapter A Survey of Trust Use and Modeling in Real Online Systems, pages 51-83. Idea Group Inc., 2007.
    • (2007) Survey of Trust Use and Modeling in Real Online Systems , pp. 51-83
    • Massa, P.1
  • 18
    • 56749140937 scopus 로고    scopus 로고
    • Defense of trust management vulnerabilities in distributed networks
    • Z. Sun, Y. L. Han and K. J. R. Liu. Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine, 46:112-119, 2008.
    • (2008) IEEE Communications Magazine , vol.46 , pp. 112-119
    • Sun, Z.1    Han, Y.L.2    Liu, K.J.R.3
  • 19
    • 55749083894 scopus 로고    scopus 로고
    • A formal apparatus for modeling trust in computing environments
    • D. Trček. A formal apparatus for modeling trust in computing environments. Mathematical and Computer Modelling, 49:226-233, 2009.
    • (2009) Mathematical and Computer Modelling , vol.49 , pp. 226-233
    • Trček, D.1
  • 20
    • 70350690952 scopus 로고    scopus 로고
    • PhD thesis, Department of Electrical and Communication Engineering, Helsinki University of Technology, Network Laboratory
    • Z. Yan. Trust Management for Mobile Computing Platforms. PhD thesis, Department of Electrical and Communication Engineering, Helsinki University of Technology, Network Laboratory, 2007.
    • (2007) Trust Management for Mobile Computing Platforms
    • Yan, Z.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.