메뉴 건너뛰기




Volumn , Issue , 2007, Pages 198-216

Trust management tools

Author keywords

[No Author keywords available]

Indexed keywords


EID: 74049092988     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-59904-207-7.ch008     Document Type: Chapter
Times cited : (4)

References (55)
  • 1
    • 24944549231 scopus 로고    scopus 로고
    • A representation model of trust relationships with delegation extensions
    • In P. Herrmann, V. Issarny, & S. Shiu (Eds.), Paris (LNCS 3477
    • Agudo, I., Lopez, J., & Montenegro, J. A. (2005). A representation model of trust relationships with delegation extensions. In P. Herrmann, V. Issarny, & S. Shiu (Eds.), Third International Conference on Trust Management (iTrust 2005), Paris (LNCS 3477, pp. 116-130).
    • (2005) Third International Conference On Trust Management (iTrust 2005) , pp. 116-130
    • Agudo, I.1    Lopez, J.2    Montenegro, J.A.3
  • 5
    • 84899322732 scopus 로고    scopus 로고
    • Mediating between strangers: A trust management based approach
    • Gaithersburg, MD: NIST. Retrieved January 20, 2006, from
    • Biskup, J., & Karabulut, Y. (2003). Mediating between strangers: A trust management based approach. In 2nd Annual Public Key Infrastructure (PKI) Research Workshop, Gaithersburg, MD: NIST. Retrieved January 20, 2006, from http://middleware.internet2.edu/pki03/presentations/07.pdf
    • (2003) 2nd Annual Public Key Infrastructure (PKI) Research Workshop
    • Biskup, J.1    Karabulut, Y.2
  • 7
    • 0007783431 scopus 로고    scopus 로고
    • KeyNote: Trust management for public-key infrastructures
    • Cambridge, UK. Retrived January 20, 2006, from
    • Blaze, M., Feigenbaum, J., & Keromytis, A. D. (1998). KeyNote: Trust management for public-key infrastructures. In Security Protocols International Workshop, Cambridge, UK. Retrived January 20, 2006, from http://www1.cs.columbia.edu/~angelos/Papers/keynote-position.pdf
    • (1998) Security Protocols International Workshop
    • Blaze, M.1    Feigenbaum, J.2    Keromytis, A.D.3
  • 9
    • 84957651500 scopus 로고    scopus 로고
    • Compliance checking in the PolicyMaker trust management system
    • Ed, Anguilla, British West Indies: Springer-Verlag
    • Blaze, M., Feigenbaum, J., & Strauss, M. (1998). Compliance checking in the PolicyMaker trust management system. In (Ed.), Financial Cryptography: Second International Conference (pp. 251-265). Anguilla, British West Indies: Springer-Verlag.
    • (1998) Financial Cryptography: Second International Conference , pp. 251-265
    • Blaze, M.1    Feigenbaum, J.2    Strauss, M.3
  • 10
    • 35248873087 scopus 로고    scopus 로고
    • Experience with the KeyNote trust management system: Applications and future directions
    • In P. Nixon, & S. Terzis (Eds.), Heraklion, Crete, Greece (LNCS 2692
    • Blaze, M., Ioannidis, J., & Keromytis, A. D. (2003). Experience with the KeyNote trust management system: Applications and future directions. In P. Nixon, & S. Terzis (Eds.), First International Conference on Trust Management (iTrust 2003), Heraklion, Crete, Greece (LNCS 2692, pp. 284-300).
    • (2003) First International Conference On Trust Management (iTrust 2003) , pp. 284-300
    • Blaze, M.1    Ioannidis, J.2    Keromytis, A.D.3
  • 14
    • 31744447412 scopus 로고    scopus 로고
    • Massachusetts institute of Technology. Unpublished masters thesis. Retrieved January 16, 2006, from
    • Chu, Y.-H. (1997). Trust management for the World Wide Web. Massachusetts institute of Technology. Unpublished masters thesis. Retrieved January 16, 2006, from http://www.w3.org/1997/Theses/YanghuaChu/
    • (1997) Trust Management For the World Wide Web
    • Chu, Y.-H.1
  • 16
    • 84899252444 scopus 로고    scopus 로고
    • Retrieved March 8, 2006, from
    • Compaq et al. (2005). TPM main: Part 1 Design principles, Version 1. Retrieved March 8, 2006, from https://www.trustedcomputinggroup.org/specs/TPM/tpmwg-mainrev62_Part1_Design_Principles.pdf
    • (2005) TPM Main: Part 1 Design Principles, Version 1
    • Compaq1
  • 19
    • 35248840735 scopus 로고    scopus 로고
    • Trust management and whether to delegate
    • In B. Christianson, B. Crispo, J. A. Malcolm, & M. Roe, M. (Eds.), LNCS 2467, Cambridge, UK: Springer-Verlag
    • Foley, S. N. (2002). Trust management and whether to delegate. In B. Christianson, B. Crispo, J. A. Malcolm, & M. Roe, M. (Eds.), 9th International Workshop on Security Protocols (LNCS 2467, pp. 151-157). Cambridge, UK: Springer-Verlag.
    • (2002) 9th International Workshop On Security Protocols , pp. 151-157
    • Foley, S.N.1
  • 20
    • 16244363538 scopus 로고    scopus 로고
    • Tech. Rep. No. TR2003-848, New York: Courant Institute of Mathematical Sciences, New York University. Retrieved January 20, 2006, from
    • Freudenthal, E., & Karamcheti, V. (2003). QTM: Trust management with quantified stochastic attributes (Tech. Rep. No. TR2003-848). New York: Courant Institute of Mathematical Sciences, New York University. Retrieved January 20, 2006, from http://csdocs.cs.nyu.edu/Dienst/Repository/2.0/Body/ncstrl.nyu_cs%2fTR2003-848/pdf
    • (2003) QTM: Trust Management With Quantified Stochastic Attributes
    • Freudenthal, E.1    Karamcheti, V.2
  • 21
    • 84899208876 scopus 로고    scopus 로고
    • Trust specification and analysis for Internet applications
    • Lisbon, Portugal. Retrieved January 16, 2006, from
    • Grandison, T. (2001). Trust specification and analysis for Internet applications. In 2nd IFIP Conference on E-Commerce, E-Business, E-Government (I3e 2002), Lisbon, Portugal. Retrieved January 16, 2006, from http://www.eyetap.org/~maali/trust-papers/I3e2002.pdf
    • (2001) 2nd IFIP Conference On E-Commerce, E-Business, E-Government (I3e 2002)
    • Grandison, T.1
  • 22
    • 7644226470 scopus 로고    scopus 로고
    • Unpublished doctoral dissertation, Imperial College - University of, London, UK
    • Grandison, T. (2003). Trust management for Internet applications. Unpublished doctoral dissertation, Imperial College - University of London, UK.
    • (2003) Trust Management For Internet Applications
    • Grandison, T.1
  • 24
    • 35248826597 scopus 로고    scopus 로고
    • Trust Management Tools For Internet Applications
    • In P. Nixon, & S. Terzis, S. (Eds.), Heraklion, Crete, Greece, LNCS 2692
    • Grandison, T., & Sloman, M. (2003). Trust management tools for Internet applications. In P. Nixon, & S. Terzis, S. (Eds.), First International Conference on Trust Management (iTrust 2003), Heraklion, Crete, Greece (LNCS 2692, pp. 91-107).
    • (2003) First International Conference on Trust Management (iTrust 2003) , pp. 91-107
    • Grandison, T.1    Sloman, M.2
  • 26
    • 0031650454 scopus 로고    scopus 로고
    • OASIS: Access control in an open, distributed environment
    • May, Oakland CA: IEEE Computer Society Press
    • Hayton, R., Bacon, J., & Moody, K. (1998, May). OASIS: Access control in an open, distributed environment. In IEEE Symposium on Security and Privacy (pp. 3-14). Oakland CA: IEEE Computer Society Press.
    • (1998) IEEE Symposium On Security and Privacy , pp. 3-14
    • Hayton, R.1    Bacon, J.2    Moody, K.3
  • 27
    • 84885889108 scopus 로고    scopus 로고
    • IBM. (n.d.), Retrieved March 3, 2006, from
    • IBM. (n.d.). IBM trust establishment policy language. Retrieved March 3, 2006, from http://www.haifa.il.ibm.com/projects/software/e-Business/TrustManager/PolicyLanguage.html
    • IBM Trust Establishment Policy Language
  • 29
    • 0030677524 scopus 로고    scopus 로고
    • A logical language for expressing authorizations
    • Oakland, CA: IEEE Press
    • Jajodia, S. S. P., & Subrahmanian, V. (1997). A logical language for expressing authorizations. In IEEE Symposium on Security and Privacy (pp. 31-42). Oakland, CA: IEEE Press.
    • (1997) IEEE Symposium On Security and Privacy , pp. 31-42
    • Jajodia, S.S.P.1    Subrahmanian, V.2
  • 30
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A trust management system with certified evaluation
    • In (Ed.), Oakland, CA: IEEE Computer Society
    • Jim, T. (2001). SD3: A trust management system with certified evaluation. In (Ed.), IEEE Symposium on Security and Privacy (pp. 106-115). Oakland, CA: IEEE Computer Society.
    • (2001) IEEE Symposium On Security and Privacy , pp. 106-115
    • Jim, T.1
  • 31
    • 84949942881 scopus 로고    scopus 로고
    • The right type of trust for distributed systems
    • Lake Arrowhead, CA
    • Jøsang, A.(1996). The right type of trust for distributed systems. In ACM New Security Paradigms Workshop (pp. 119-131). Lake Arrowhead, CA.
    • (1996) ACM New Security Paradigms Workshop , pp. 119-131
    • Jøsang, A.1
  • 34
    • 54649084295 scopus 로고    scopus 로고
    • Trust management on the World Wide Web
    • Retrieved Janury 15, 2006, from
    • Khare, R., & Rifkin, A. (1998). Trust management on the World Wide Web. Peer-reviewed Journal on the Internet 3(6). Retrieved Janury 15, 2006, from http://www.firstmonday.org/issues/issue3_6/khare/index.html
    • (1998) Peer-reviewed Journal On the Internet , vol.3 , Issue.6
    • Khare, R.1    Rifkin, A.2
  • 37
    • 27944447957 scopus 로고    scopus 로고
    • Technical report, University of Aarhus, Denmark. Retrieved January 16, 2006, from
    • Krukow, K. (2004). On foundations for dynamic trust management. Technical report, University of Aarhus, Denmark. Retrieved January 16, 2006, from http://www.brics.dk/~krukow/research/publications/online_papers/Progress.pdf
    • (2004) On Foundations For Dynamic Trust Management
    • Krukow, K.1
  • 38
    • 62349090353 scopus 로고    scopus 로고
    • RT: A role-based trust-management framework
    • Washington, DC. Retrieved January 16, 2006, from
    • Li, N., & Mitchell, J. C. (2003). RT: A role-based trust-management framework. In DARPA Information Survivability Conference and Exposition (DISCEX), Washington, DC. Retrieved January 16, 2006, from http://theory.stanford.edu/people/jcm/papers/rt_discex03.pdf
    • (2003) DARPA Information Survivability Conference and Exposition (DISCEX)
    • Li, N.1    Mitchell, J.C.2
  • 39
  • 40
    • 0036085965 scopus 로고    scopus 로고
    • Design of a role-based trust management framework
    • In (Ed.), IEEE Computer Society. Retrieved January 15, 2006, from
    • Li, N., Mitchell, J. C., & Winsborough, W. H. (2002). Design of a role-based trust management framework. In (Ed.), 2002 IEEE Symposium on Security and Privacy (pp. 114-130). IEEE Computer Society. Retrieved January 15, 2006, from http://www.cs.purdue.edu/homes/ninghui/papers/rt_oakland02.pdf
    • (2002) 2002 IEEE Symposium On Security and Privacy , pp. 114-130
    • Li, N.1    Mitchell, J.C.2    Winsborough, W.H.3
  • 42
    • 84858542463 scopus 로고
    • An introduction to cryptography
    • Network Associates, Network Associates Inc
    • Network Associates. (1990). An introduction to cryptography. In PGP 6.5.1 user's guide (pp. 11-36). Network Associates Inc.
    • (1990) PGP 6.5.1 User's Guide , pp. 11-36
  • 45
    • 85056545124 scopus 로고    scopus 로고
    • Limiting the disclosure of access control policies during automated trust negotiation
    • San Diego, CA. Retrieved January 13, 2006, from
    • Seamons, K. E., Winslett, M., & Yu, T.(2001). Limiting the disclosure of access control policies during automated trust negotiation. In Network and Distributed System Security Symposium, San Diego, CA. Retrieved January 13, 2006, from http://dais.cs.uiuc.edu/pubs/winslett/ndss2001.pdf
    • (2001) Network and Distributed System Security Symposium
    • Seamons, K.E.1    Winslett, M.2    Yu, T.3
  • 48
    • 35248885865 scopus 로고    scopus 로고
    • Active trust management for autonomous adaptive survivable systems (ATMs for AAsss)
    • In P. Robertson, H. Shrobe, & R. Laddaga, (Eds.), Springer-Verlag
    • Shrobe, H., & Doyle, J. (2000). Active trust management for autonomous adaptive survivable systems (ATMs for AAsss). In P. Robertson, H. Shrobe, & R. Laddaga, (Eds.), 1st International Workshop on Self-Adaptive Software (IWSAS 2000) (pp. 40-49). Springer-Verlag.
    • (2000) 1st International Workshop On Self-Adaptive Software (IWSAS 2000) , pp. 40-49
    • Shrobe, H.1    Doyle, J.2
  • 49
  • 51
    • 0034835799 scopus 로고    scopus 로고
    • Understanding trust management systems
    • In (Ed.), Oakland, CA: IEEE Computer Society
    • Weeks, S. (2001). Understanding trust management systems. In (Ed.), IEEE Symposium on Security and Privacy (pp. 94-105). Oakland, CA: IEEE Computer Society.
    • (2001) IEEE Symposium On Security and Privacy , pp. 94-105
    • Weeks, S.1
  • 54
    • 35248894984 scopus 로고    scopus 로고
    • Fidelis: A policy-driven trust management framework
    • In P. Nixon, & S. Terzis (Ed.), Heraklion, Crete, Greece, LNCS 2692
    • Yao, W. T., Moody, K., & Bacon, J. (2003). Fidelis: A policy-driven trust management framework. In P. Nixon, & S. Terzis (Ed.), First International Conference on Trust Management (iTrust 2003), Heraklion, Crete, Greece (LNCS 2692, pp 301-317).
    • (2003) First International Conference On Trust Management (iTrust 2003) , pp. 301-317
    • Yao, W.T.1    Moody, K.2    Bacon, J.3
  • 55
    • 0034309383 scopus 로고    scopus 로고
    • Trust management through reputation mechanisms
    • Zacharia, G., & Maes, P. (2000). Trust management through reputation mechanisms. Applied Artificial Intelligence, 14(9), 881-907.
    • (2000) Applied Artificial Intelligence , vol.14 , Issue.9 , pp. 881-907
    • Zacharia, G.1    Maes, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.