-
1
-
-
24944549231
-
A representation model of trust relationships with delegation extensions
-
In P. Herrmann, V. Issarny, & S. Shiu (Eds.), Paris (LNCS 3477
-
Agudo, I., Lopez, J., & Montenegro, J. A. (2005). A representation model of trust relationships with delegation extensions. In P. Herrmann, V. Issarny, & S. Shiu (Eds.), Third International Conference on Trust Management (iTrust 2005), Paris (LNCS 3477, pp. 116-130).
-
(2005)
Third International Conference On Trust Management (iTrust 2005)
, pp. 116-130
-
-
Agudo, I.1
Lopez, J.2
Montenegro, J.A.3
-
4
-
-
4644338317
-
Trust negotiation in electronic markets
-
Retrieved January 24, 2006, from
-
Barlow, T., Hess, A., & Seamons, K. E. (2001). Trust negotiation in electronic markets. In Eighth Research Symposium in Emerging Electronic Markets, Maastricht, Netherlands. Retrieved January 24, 2006, from http://isrl.cs.byu.edu/pubs/rseem2001.pdf
-
(2001)
Eighth Research Symposium In Emerging Electronic Markets, Maastricht, Netherlands
-
-
Barlow, T.1
Hess, A.2
Seamons, K.E.3
-
5
-
-
84899322732
-
Mediating between strangers: A trust management based approach
-
Gaithersburg, MD: NIST. Retrieved January 20, 2006, from
-
Biskup, J., & Karabulut, Y. (2003). Mediating between strangers: A trust management based approach. In 2nd Annual Public Key Infrastructure (PKI) Research Workshop, Gaithersburg, MD: NIST. Retrieved January 20, 2006, from http://middleware.internet2.edu/pki03/presentations/07.pdf
-
(2003)
2nd Annual Public Key Infrastructure (PKI) Research Workshop
-
-
Biskup, J.1
Karabulut, Y.2
-
6
-
-
0004078695
-
-
Retrieved February 8, 2006, from
-
Blaze, M., Feigenbaum, J., Ioannidis, J., & Keromytis, A. (1999). The KeyNote Trust Management System, Version 2 (RCF 2704). Retrieved February 8, 2006, from http://www.crypto/papers/rfc2704.txt
-
(1999)
The KeyNote Trust Management System, Version 2 (RCF 2704)
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
7
-
-
0007783431
-
KeyNote: Trust management for public-key infrastructures
-
Cambridge, UK. Retrived January 20, 2006, from
-
Blaze, M., Feigenbaum, J., & Keromytis, A. D. (1998). KeyNote: Trust management for public-key infrastructures. In Security Protocols International Workshop, Cambridge, UK. Retrived January 20, 2006, from http://www1.cs.columbia.edu/~angelos/Papers/keynote-position.pdf
-
(1998)
Security Protocols International Workshop
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
8
-
-
0029700344
-
Decentralized trust management
-
Oakland, CA: IEEE Computer Society Press
-
Blaze, M., Feigenbaum, J., & Lacy, J.(1996). Decentralized trust management. In IEEE Conference on Security and Privacy. Oakland, CA: IEEE Computer Society Press.
-
(1996)
IEEE Conference On Security and Privacy
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
9
-
-
84957651500
-
Compliance checking in the PolicyMaker trust management system
-
Ed, Anguilla, British West Indies: Springer-Verlag
-
Blaze, M., Feigenbaum, J., & Strauss, M. (1998). Compliance checking in the PolicyMaker trust management system. In (Ed.), Financial Cryptography: Second International Conference (pp. 251-265). Anguilla, British West Indies: Springer-Verlag.
-
(1998)
Financial Cryptography: Second International Conference
, pp. 251-265
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
10
-
-
35248873087
-
Experience with the KeyNote trust management system: Applications and future directions
-
In P. Nixon, & S. Terzis (Eds.), Heraklion, Crete, Greece (LNCS 2692
-
Blaze, M., Ioannidis, J., & Keromytis, A. D. (2003). Experience with the KeyNote trust management system: Applications and future directions. In P. Nixon, & S. Terzis (Eds.), First International Conference on Trust Management (iTrust 2003), Heraklion, Crete, Greece (LNCS 2692, pp. 284-300).
-
(2003)
First International Conference On Trust Management (iTrust 2003)
, pp. 284-300
-
-
Blaze, M.1
Ioannidis, J.2
Keromytis, A.D.3
-
11
-
-
0037368611
-
Trust management through fuzzy reputation
-
Carbo, J., Molina, J. M., & Davila, J. (2003). Trust management through fuzzy reputation. International Journal of Cooperative Information Systems 12(1), 135-155.
-
(2003)
International Journal of Cooperative Information Systems
, vol.12
, Issue.1
, pp. 135-155
-
-
Carbo, J.1
Molina, J.M.2
Davila, J.3
-
12
-
-
35048851489
-
A calculus for trust management
-
In K. Lodaya, & M. Mahajan (Eds.), Chennai, India, LNCS 3328
-
Carbone, M., Nielsen, M., & Sassone, V. (2004). A calculus for trust management. In K. Lodaya, & M. Mahajan (Eds.), 24th International Conference on Foundations of Software Technology and Theoretical Computer Science, Chennai, India (LNCS 3328, pp. 161-172).
-
(2004)
24th International Conference On Foundations of Software Technology and Theoretical Computer Science
, pp. 161-172
-
-
Carbone, M.1
Nielsen, M.2
Sassone, V.3
-
14
-
-
31744447412
-
-
Massachusetts institute of Technology. Unpublished masters thesis. Retrieved January 16, 2006, from
-
Chu, Y.-H. (1997). Trust management for the World Wide Web. Massachusetts institute of Technology. Unpublished masters thesis. Retrieved January 16, 2006, from http://www.w3.org/1997/Theses/YanghuaChu/
-
(1997)
Trust Management For the World Wide Web
-
-
Chu, Y.-H.1
-
15
-
-
34147189683
-
-
Retrieved January 17, 2006, from
-
Chu, Y.-H., Feigenbaum, J., LaMacchia, B., Resnick, P., & Strauss, M. (1997). REFEREE: Trust management for Web applications. Retrieved January 17, 2006, from http://www.farcaster.com/papers/www6-referee/
-
(1997)
REFEREE: Trust Management For Web Applications
-
-
Chu, Y.-H.1
Feigenbaum, J.2
Lamacchia, B.3
Resnick, P.4
Strauss, M.5
-
16
-
-
84899252444
-
-
Retrieved March 8, 2006, from
-
Compaq et al. (2005). TPM main: Part 1 Design principles, Version 1. Retrieved March 8, 2006, from https://www.trustedcomputinggroup.org/specs/TPM/tpmwg-mainrev62_Part1_Design_Principles.pdf
-
(2005)
TPM Main: Part 1 Design Principles, Version 1
-
-
Compaq1
-
17
-
-
84899290559
-
-
Workshop on Security in Unbiquitous Computing (UBICOMP) 2002, Retrieved March 3, 2006, from
-
English C., Nixon, P., Terzis, S., McGettrick, A., & Howe, H. (2002). Dynamic trust models for ubiquitous computing environments. In Workshop on Security in Unbiquitous Computing (UBICOMP) 2002. Retrieved March 3, 2006, from http://www.teco.edu/~philip/ubicom2002ws/organize/paddy.pdf
-
(2002)
Dynamic Trust Models For Ubiquitous Computing Environments
-
-
English, C.1
Nixon, P.2
Terzis, S.3
McGettrick, A.4
Howe, H.5
-
18
-
-
0344120498
-
-
Retrieved March 8, 2006, from
-
Evans, C., Feather, C. D. W., Hopmann, A., Presler-Marshall, M., & Resnick, P. (1997). PICSRules 1.1. Retrieved March 8, 2006, from http://www.w3.org/TR/REC-PICS-Rules
-
(1997)
PICSRules 1.1
-
-
Evans, C.1
Feather, C.D.W.2
Hopmann, A.3
Presler-Marshall, M.4
Resnick, P.5
-
19
-
-
35248840735
-
Trust management and whether to delegate
-
In B. Christianson, B. Crispo, J. A. Malcolm, & M. Roe, M. (Eds.), LNCS 2467, Cambridge, UK: Springer-Verlag
-
Foley, S. N. (2002). Trust management and whether to delegate. In B. Christianson, B. Crispo, J. A. Malcolm, & M. Roe, M. (Eds.), 9th International Workshop on Security Protocols (LNCS 2467, pp. 151-157). Cambridge, UK: Springer-Verlag.
-
(2002)
9th International Workshop On Security Protocols
, pp. 151-157
-
-
Foley, S.N.1
-
20
-
-
16244363538
-
-
Tech. Rep. No. TR2003-848, New York: Courant Institute of Mathematical Sciences, New York University. Retrieved January 20, 2006, from
-
Freudenthal, E., & Karamcheti, V. (2003). QTM: Trust management with quantified stochastic attributes (Tech. Rep. No. TR2003-848). New York: Courant Institute of Mathematical Sciences, New York University. Retrieved January 20, 2006, from http://csdocs.cs.nyu.edu/Dienst/Repository/2.0/Body/ncstrl.nyu_cs%2fTR2003-848/pdf
-
(2003)
QTM: Trust Management With Quantified Stochastic Attributes
-
-
Freudenthal, E.1
Karamcheti, V.2
-
21
-
-
84899208876
-
Trust specification and analysis for Internet applications
-
Lisbon, Portugal. Retrieved January 16, 2006, from
-
Grandison, T. (2001). Trust specification and analysis for Internet applications. In 2nd IFIP Conference on E-Commerce, E-Business, E-Government (I3e 2002), Lisbon, Portugal. Retrieved January 16, 2006, from http://www.eyetap.org/~maali/trust-papers/I3e2002.pdf
-
(2001)
2nd IFIP Conference On E-Commerce, E-Business, E-Government (I3e 2002)
-
-
Grandison, T.1
-
22
-
-
7644226470
-
-
Unpublished doctoral dissertation, Imperial College - University of, London, UK
-
Grandison, T. (2003). Trust management for Internet applications. Unpublished doctoral dissertation, Imperial College - University of London, UK.
-
(2003)
Trust Management For Internet Applications
-
-
Grandison, T.1
-
23
-
-
0009481412
-
A survey of trust in Internet applications
-
Grandison, T., & Sloman, M. (2000). A survey of trust in Internet applications. IEEE Communications Surveys and Tutorials, 4(4), 2-16.
-
(2000)
IEEE Communications Surveys and Tutorials
, vol.4
, Issue.4
, pp. 2-16
-
-
Grandison, T.1
Sloman, M.2
-
24
-
-
35248826597
-
Trust Management Tools For Internet Applications
-
In P. Nixon, & S. Terzis, S. (Eds.), Heraklion, Crete, Greece, LNCS 2692
-
Grandison, T., & Sloman, M. (2003). Trust management tools for Internet applications. In P. Nixon, & S. Terzis, S. (Eds.), First International Conference on Trust Management (iTrust 2003), Heraklion, Crete, Greece (LNCS 2692, pp. 91-107).
-
(2003)
First International Conference on Trust Management (iTrust 2003)
, pp. 91-107
-
-
Grandison, T.1
Sloman, M.2
-
25
-
-
0034428960
-
Policy-directed certificate retrieval
-
Gunter, C.A. & Jim, T. (2000). Policy-directed certificate retrieval. Software: Practice & Experience, 2000, 30(15) 1609-1640.
-
(2000)
Software: Practice & Experience, 2006
, vol.30
, Issue.15
, pp. 1609-1640
-
-
Gunter, C.A.1
Jim, T.2
-
26
-
-
0031650454
-
OASIS: Access control in an open, distributed environment
-
May, Oakland CA: IEEE Computer Society Press
-
Hayton, R., Bacon, J., & Moody, K. (1998, May). OASIS: Access control in an open, distributed environment. In IEEE Symposium on Security and Privacy (pp. 3-14). Oakland CA: IEEE Computer Society Press.
-
(1998)
IEEE Symposium On Security and Privacy
, pp. 3-14
-
-
Hayton, R.1
Bacon, J.2
Moody, K.3
-
27
-
-
84885889108
-
-
IBM. (n.d.), Retrieved March 3, 2006, from
-
IBM. (n.d.). IBM trust establishment policy language. Retrieved March 3, 2006, from http://www.haifa.il.ibm.com/projects/software/e-Business/TrustManager/PolicyLanguage.html
-
IBM Trust Establishment Policy Language
-
-
-
30
-
-
0034829512
-
SD3: A trust management system with certified evaluation
-
In (Ed.), Oakland, CA: IEEE Computer Society
-
Jim, T. (2001). SD3: A trust management system with certified evaluation. In (Ed.), IEEE Symposium on Security and Privacy (pp. 106-115). Oakland, CA: IEEE Computer Society.
-
(2001)
IEEE Symposium On Security and Privacy
, pp. 106-115
-
-
Jim, T.1
-
31
-
-
84949942881
-
The right type of trust for distributed systems
-
Lake Arrowhead, CA
-
Jøsang, A.(1996). The right type of trust for distributed systems. In ACM New Security Paradigms Workshop (pp. 119-131). Lake Arrowhead, CA.
-
(1996)
ACM New Security Paradigms Workshop
, pp. 119-131
-
-
Jøsang, A.1
-
33
-
-
1142292851
-
-
Retrieved January 14, 2006, from
-
Kagal, L., Undercoffer, J., Perich, F., Joshi, A., & Finin, T. (2002). A security architecture based on trust management for pervasive computing systems. Retrieved January 14, 2006, from http://ebiquity.umbc.edu/_file_directory_/papers/15.pdf
-
(2002)
A Security Architecture Based On Trust Management For Pervasive Computing Systems
-
-
Kagal, L.1
Undercoffer, J.2
Perich, F.3
Joshi, A.4
Finin, T.5
-
34
-
-
54649084295
-
Trust management on the World Wide Web
-
Retrieved Janury 15, 2006, from
-
Khare, R., & Rifkin, A. (1998). Trust management on the World Wide Web. Peer-reviewed Journal on the Internet 3(6). Retrieved Janury 15, 2006, from http://www.firstmonday.org/issues/issue3_6/khare/index.html
-
(1998)
Peer-reviewed Journal On the Internet
, vol.3
, Issue.6
-
-
Khare, R.1
Rifkin, A.2
-
35
-
-
0035780845
-
Security and trust management in supply chains
-
Kolluru, R., & Meredith, P. H. (2001). Security and trust management in supply chains. Information Management and Computer Security, 9(5), 233-236.
-
(2001)
Information Management and Computer Security
, vol.9
, Issue.5
, pp. 233-236
-
-
Kolluru, R.1
Meredith, P.H.2
-
36
-
-
0013423215
-
-
Retrieved February 8, 2006, from
-
Krauskopf, T., Miller, J., Resnick, P., & Treesee, W. (1996). PICS label distribution label syntax and communication protocols, Version 1.1. Retrieved February 8, 2006, from http://www.w3.org/TR/REC-PICS-labels
-
(1996)
PICS Label Distribution Label Syntax and Communication Protocols, Version 1.1
-
-
Krauskopf, T.1
Miller, J.2
Resnick, P.3
Treesee, W.4
-
37
-
-
27944447957
-
-
Technical report, University of Aarhus, Denmark. Retrieved January 16, 2006, from
-
Krukow, K. (2004). On foundations for dynamic trust management. Technical report, University of Aarhus, Denmark. Retrieved January 16, 2006, from http://www.brics.dk/~krukow/research/publications/online_papers/Progress.pdf
-
(2004)
On Foundations For Dynamic Trust Management
-
-
Krukow, K.1
-
38
-
-
62349090353
-
RT: A role-based trust-management framework
-
Washington, DC. Retrieved January 16, 2006, from
-
Li, N., & Mitchell, J. C. (2003). RT: A role-based trust-management framework. In DARPA Information Survivability Conference and Exposition (DISCEX), Washington, DC. Retrieved January 16, 2006, from http://theory.stanford.edu/people/jcm/papers/rt_discex03.pdf
-
(2003)
DARPA Information Survivability Conference and Exposition (DISCEX)
-
-
Li, N.1
Mitchell, J.C.2
-
39
-
-
35248834606
-
Datalog with constraints: A foundation for trust management languages
-
In V. Dahl, & P. Wadler (Eds.), LNCS 2562
-
Li, N., & Mitchell, J. C. (2003). Datalog with constraints: A foundation for trust management languages. In V. Dahl, & P. Wadler (Eds.), Fifth International Symposium on Practical Aspects of Declarative Languages (LNCS 2562, pp. 58-73).
-
(2003)
Fifth International Symposium On Practical Aspects of Declarative Languages
, pp. 58-73
-
-
Li, N.1
Mitchell, J.C.2
-
40
-
-
0036085965
-
Design of a role-based trust management framework
-
In (Ed.), IEEE Computer Society. Retrieved January 15, 2006, from
-
Li, N., Mitchell, J. C., & Winsborough, W. H. (2002). Design of a role-based trust management framework. In (Ed.), 2002 IEEE Symposium on Security and Privacy (pp. 114-130). IEEE Computer Society. Retrieved January 15, 2006, from http://www.cs.purdue.edu/homes/ninghui/papers/rt_oakland02.pdf
-
(2002)
2002 IEEE Symposium On Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
41
-
-
3342997876
-
-
Retrieved January 8, 2006, from
-
Miller, J., Resnick, P., & Singer, D. PICS rating services and rating systems (and their machine readable descriptions), Version 1.1. Retrieved January 8, 2006, from http://www.w3.org/TR/REC-PICS-services
-
PICS Rating Services and Rating Systems (and their Machine Readable Descriptions), Version 1.1
-
-
Miller, J.1
Resnick, P.2
Singer, D.3
-
42
-
-
84858542463
-
An introduction to cryptography
-
Network Associates, Network Associates Inc
-
Network Associates. (1990). An introduction to cryptography. In PGP 6.5.1 user's guide (pp. 11-36). Network Associates Inc.
-
(1990)
PGP 6.5.1 User's Guide
, pp. 11-36
-
-
-
43
-
-
14744304112
-
The mechanics of trust: A framework for research and design
-
Riegelsberger, J., Sasse, A. M., & McCarthy, J. D. (2005). The mechanics of trust: A framework for research and design. International Journal of Human-Computer Studies, 62(3), 381-422.
-
(2005)
International Journal of Human-Computer Studies
, vol.62
, Issue.3
, pp. 381-422
-
-
Riegelsberger, J.1
Sasse, A.M.2
McCarthy, J.D.3
-
44
-
-
24944461245
-
Trust management survey
-
In P. Herrmann, V. Issarny, & S. Shiu (Eds.), Paris, LNCS 3477
-
Ruohomaa, S., & Kutvonen, L. (2005). Trust management survey. In P. Herrmann, V. Issarny, & S. Shiu (Eds.), Third International Conference on Trust Management (iTrust 2005), Paris (LNCS 3477, pp. 77-92).
-
(2005)
Third International Conference On Trust Management (iTrust 2005)
, pp. 77-92
-
-
Ruohomaa, S.1
Kutvonen, L.2
-
45
-
-
85056545124
-
Limiting the disclosure of access control policies during automated trust negotiation
-
San Diego, CA. Retrieved January 13, 2006, from
-
Seamons, K. E., Winslett, M., & Yu, T.(2001). Limiting the disclosure of access control policies during automated trust negotiation. In Network and Distributed System Security Symposium, San Diego, CA. Retrieved January 13, 2006, from http://dais.cs.uiuc.edu/pubs/winslett/ndss2001.pdf
-
(2001)
Network and Distributed System Security Symposium
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
-
46
-
-
35048864339
-
Trading privacy for trust
-
In C. Jensen, S. Poslad, & T. Dimitrakos (Eds.), Oxford, UK, LNCS 2995
-
Seigneur, J. M., & Jensen, C. D. (2004). Trading privacy for trust. In C. Jensen, S. Poslad, & T. Dimitrakos (Eds.), Second International Conference on Trust Management (iTrust 2004), Oxford, UK (LNCS 2995, pp. 93-107).
-
(2004)
Second International Conference On Trust Management (iTrust 2004)
, pp. 93-107
-
-
Seigneur, J.M.1
Jensen, C.D.2
-
47
-
-
11944249167
-
Reputation-based trust management
-
Shmatikov, V., & Talcott, C. (2005). Reputation-based trust management. Journal of Computer Security, 13(1), 167-190.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.1
, pp. 167-190
-
-
Shmatikov, V.1
Talcott, C.2
-
48
-
-
35248885865
-
Active trust management for autonomous adaptive survivable systems (ATMs for AAsss)
-
In P. Robertson, H. Shrobe, & R. Laddaga, (Eds.), Springer-Verlag
-
Shrobe, H., & Doyle, J. (2000). Active trust management for autonomous adaptive survivable systems (ATMs for AAsss). In P. Robertson, H. Shrobe, & R. Laddaga, (Eds.), 1st International Workshop on Self-Adaptive Software (IWSAS 2000) (pp. 40-49). Springer-Verlag.
-
(2000)
1st International Workshop On Self-Adaptive Software (IWSAS 2000)
, pp. 40-49
-
-
Shrobe, H.1
Doyle, J.2
-
50
-
-
33646702918
-
-
Tech. Rep. No. UCI-ISR-04-6, Irvine, CA: University of California, Irvine
-
Suryanarayana, G., & Taylor, R. N. (2004). A survey of trust management and resource discovery technologies in peer-to-peer applications (Tech. Rep. No. UCI-ISR-04-6). Irvine, CA: University of California, Irvine.
-
(2004)
A Survey of Trust Management and Resource Discovery Technologies In Peer-to-peer Applications
-
-
Suryanarayana, G.1
Taylor, R.N.2
-
51
-
-
0034835799
-
Understanding trust management systems
-
In (Ed.), Oakland, CA: IEEE Computer Society
-
Weeks, S. (2001). Understanding trust management systems. In (Ed.), IEEE Symposium on Security and Privacy (pp. 94-105). Oakland, CA: IEEE Computer Society.
-
(2001)
IEEE Symposium On Security and Privacy
, pp. 94-105
-
-
Weeks, S.1
-
53
-
-
33746075609
-
Negotiating disclosure of sensitive credentials
-
Amalfi, Italy. Retrieved January 24, 2006, from
-
Winsborough, W. H., Seamons, K. E., & Jones, V. E.(1999). Negotiating disclosure of sensitive credentials. In Second Conference on Security in Communication Networks, Amalfi, Italy. Retrieved January 24, 2006, from http://isrl.cs.byu.edu/pubs/scn99.pdf
-
(1999)
Second Conference On Security In Communication Networks
-
-
Winsborough, W.H.1
Seamons, K.E.2
Jones, V.E.3
-
54
-
-
35248894984
-
Fidelis: A policy-driven trust management framework
-
In P. Nixon, & S. Terzis (Ed.), Heraklion, Crete, Greece, LNCS 2692
-
Yao, W. T., Moody, K., & Bacon, J. (2003). Fidelis: A policy-driven trust management framework. In P. Nixon, & S. Terzis (Ed.), First International Conference on Trust Management (iTrust 2003), Heraklion, Crete, Greece (LNCS 2692, pp 301-317).
-
(2003)
First International Conference On Trust Management (iTrust 2003)
, pp. 301-317
-
-
Yao, W.T.1
Moody, K.2
Bacon, J.3
-
55
-
-
0034309383
-
Trust management through reputation mechanisms
-
Zacharia, G., & Maes, P. (2000). Trust management through reputation mechanisms. Applied Artificial Intelligence, 14(9), 881-907.
-
(2000)
Applied Artificial Intelligence
, vol.14
, Issue.9
, pp. 881-907
-
-
Zacharia, G.1
Maes, P.2
|