-
1
-
-
0001853125
-
The computer for the 21st century
-
M. Weiser, "The computer for the 21st century," Scientific American, vol.265, 1991, pp. 75-166
-
(1991)
Scientific American
, vol.265
, pp. 75-166
-
-
Weiser, M.1
-
4
-
-
0035577649
-
Trust-based security in pervasive computing environments
-
L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments," Computer, vol.34, 2001, pp. 154-157.
-
(2001)
Computer
, vol.34
, pp. 154-157
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
5
-
-
14544292118
-
Privacy and trust issues with invisible computers
-
S. Lalilou, M. Langheinrich, and C. Röcker, "Privacy and trust issues with invisible computers," Communications of the ACM, vol.48, 2005, pp. 59-60.
-
(2005)
Communications of the ACM
, vol.48
, pp. 59-60
-
-
Lalilou, S.1
Langheinrich, M.2
Röcker, C.3
-
6
-
-
84945556728
-
Privacy by design. - principles of privacy-aware ubiquitous systems
-
Atlanta, Georgia, USA: Springer-Verlag
-
M. Langheinrich, "Privacy by Design. - Principles of Privacy-Aware Ubiquitous Systems," Proceedings of the 3rd international conference on Ubiquitous Computing, Atlanta, Georgia, USA: Springer-Verlag, 2001, pp. 273-291.
-
(2001)
Proceedings of the 3rd International Conference on Ubiquitous Computing
, pp. 273-291
-
-
Langheinrich, M.1
-
7
-
-
77950986321
-
Trust modeling and management: From social trust to digital trust
-
IGI Global
-
Z. Yan and S. Holtmanns, "Trust Modeling and Management: from Social Trust to Digital Trust," Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions, IGI Global, 2008, pp. 290-323.
-
(2008)
Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions
, pp. 290-323
-
-
Yan, Z.1
Holtmanns, S.2
-
8
-
-
34250782069
-
A bayesian network based trust model for improving collaboration in mobile ad hoc networks
-
C.T. Nguyen, O. Camp, and S. Loiseau, "A Bayesian network based trust model for improving collaboration in mobile ad hoc networks," Proceedings of the 2007 IEEE International Conference on Research, Innovation and Vision for the Future, 2007, pp. 144-151.
-
(2007)
Proceedings of the 2007 IEEE International Conference on Research, Innovation and Vision for the Future
, pp. 144-151
-
-
Nguyen, C.T.1
Camp, O.2
Loiseau, S.3
-
12
-
-
5044222209
-
A dynamic trust model for mobile ad hoc networks
-
Z. Liu, A. Joy, and R. Thompson, "A Dynamic Trust Model for Mobile Ad Hoc Networks," Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems FTDCS 2004, 2004, pp. 80-85.
-
(2004)
Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems FTDCS 2004
, pp. 80-85
-
-
Liu, Z.1
Joy, A.2
Thompson, R.3
-
14
-
-
85006210403
-
Review on computational trust and reputation models
-
J. Sabater and C. Sierra, "Review on Computational Trust and Reputation Models," Artificial Intelligence Review, vol.24, 2005, pp. 33-60.
-
(2005)
Artificial Intelligence Review
, vol.24
, pp. 33-60
-
-
Sabater, J.1
Sierra, C.2
-
15
-
-
33845940978
-
A conceptual architecture of a trusted mobile environment,"
-
Lyon: IEEE Computer Society
-
Z. Yan, "A Conceptual Architecture of a Trusted Mobile Environment," Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006, Lyon: IEEE Computer Society, 2006, pp. 75-81.
-
(2006)
Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006
, pp. 75-81
-
-
Yan, Z.1
-
16
-
-
77950994810
-
-
"Trusted Computing Group," http://www.trustedcomputinggroup. org.
-
-
-
-
17
-
-
3142738238
-
Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities
-
L. Xiong and L. Liu, "PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities," IEEE Transactions on Knowledge and Data Engineering, vol.16, 2004, pp. 843-857.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, pp. 843-857
-
-
Xiong, L.1
Liu, L.2
-
18
-
-
0029700344
-
Decentralized trust management
-
M, Blaze, J. Feigenbaum, and J. Lacy, "Decentralized Trust Management," Proceedings of the IEEE Symposium on Security and Privacy, 1996, pp. 164-173.
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Feigenbaum, B.J.1
Lacy, J.2
-
23
-
-
33845924801
-
A multi-property trust model for reconfiguring component software
-
DOI 10.1109/QSIC.2005.5, 1579130, Proceedings - Fifth International Conference on Quality Software, QSIC 2005
-
M. Zhou, H. Mei, and L. Zhang, "A Multi-Property Trust Model for Reconfiguring Component Software," Proceedings of the Fifth International Conference on Quality Software, IEEE Computer Society, 2005, pp. 142-149. (Pubitemid 46442553)
-
(2005)
Proceedings - International Conference on Quality Software
, vol.2005
, pp. 142-149
-
-
Zhou, M.1
Mei, H.2
Zhang, L.3
-
24
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
Y.L. Sun, W. Yu, Z. Han, and K. Liu, "Information theoretic framework of trust modeling and evaluation for ad hoc networks," IEEE Journal on Selected Areas in Communications, vol.24, 2006, pp. 305-317.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, pp. 305-317
-
-
Sun, Y.L.1
Yu, W.2
Han, Z.3
Liu, K.4
-
25
-
-
33750076651
-
Autonomic trust management in a component based software system
-
Springer Berlin / Heidelberg
-
Z. Yan and R. MacLaverty, "Autonomic Trust Management in a Component Based Software System," Autonomic and Trusted Computing, Springer Berlin / Heidelberg, 2006, pp. 279-292.
-
(2006)
Autonomic and Trusted Computing
, pp. 279-292
-
-
Yan, Z.1
MacLaverty, R.2
-
26
-
-
33144465377
-
On trust models and trust evaluation metrics for ad hoc networks
-
DOI 10.1109/JSAC.2005.861390
-
G. Theodorakopoulos and J.S. Baras, "On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks," IEEE Journal on Selected Areas in Communications, vol.24, 2006, pp. 318-328. (Pubitemid 43269752)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 318-328
-
-
Theodorakopoulos, G.1
Baras, J.S.2
-
28
-
-
52249115842
-
A trustbased approach to control privacy exposure in ubiquitous computing environments
-
P.D. Giang, L.X. Hung, R.A. Shaikh, Y. Zhung, and S. Lee, "A TrustBased Approach to Control Privacy Exposure in Ubiquitous Computing Environments," Proceedings of IEEE International Conference on Pervasive Services, 2007, pp. 149-152.
-
(2007)
Proceedings of IEEE International Conference on Pervasive Services
, pp. 149-152
-
-
Giang, P.D.1
Hung, L.X.2
Shaikh, R.A.3
Zhung, Y.4
Lee, S.5
-
29
-
-
70350362335
-
A trust-based access control model for pervasive computing applications
-
Montreal, P.Q., Canada: Springer-Verlag
-
M. Toahchoodee, R. Abdunabi, I. Ray, and I. Ray, "A Trust-Based Access Control Model for Pervasive Computing Applications," Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII, Montreal, P.Q., Canada: Springer-Verlag, 2009, pp. 307-314.
-
(2009)
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
, pp. 307-314
-
-
Toahchoodee, M.1
Abdunabi, R.2
Ray, I.3
Ray, I.4
-
30
-
-
77951015124
-
-
S. Suriadi, C. Ouyang, J, Smith, and E. Foo, "Modeling and verification of privacy enhancing security protocols," 2009.
-
(2009)
Modeling and Verification of Privacy Enhancing Security Protocols
-
-
Suriadi, S.1
Ouyang, C.2
Smith, J.3
Foo, E.4
-
31
-
-
54249121830
-
Trusted computing serving an anonymity service
-
A. Böttcher, B. Kauer, and H. Härtig, "Trusted Computing Serving an Anonymity Service," Trusted Computing - Challenges and Applications, 2008, pp. 143-154.
-
(2008)
Trusted Computing - Challenges and Applications
, pp. 143-154
-
-
Böttcher, A.1
Kauer, B.2
Härtig, H.3
-
33
-
-
38349006925
-
Simplified privacy controls for aggregated services -suspend and resume of personal data
-
M. Schunter and M. Waidner, "Simplified Privacy Controls for Aggregated Services -Suspend and Resume of Personal Data," Privacy Enhancing Technologies, 2007, pp. 218-232.
-
(2007)
Privacy Enhancing Technologies
, pp. 218-232
-
-
Schunter, M.1
Waidner, M.2
-
34
-
-
33845532776
-
A system for privacy-aware resource allocation and data processing in dynamic environments
-
S. Pearson and M. Casassa-Mont, "A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments," Security and Privacy in Dynamic Environments, 2006, pp. 471-482.
-
(2006)
Security and Privacy in Dynamic Environments
, pp. 471-482
-
-
Pearson, S.1
Casassa-Mont, M.2
-
35
-
-
80052579597
-
Security and privacy preserving data in eGovernment integration
-
C. Biancalana and F. Profiti, "Security and privacy preserving data in eGovernment integration," ESIIG2, 2008.
-
(2008)
ESIIG2
-
-
Biancalana, C.1
Profiti, F.2
-
36
-
-
77950997461
-
Trusted privacy manager: A system, for privacy enforcement
-
IEEE Computer Society
-
B. Carminati and E. Ferrari, "Trusted Privacy Manager: A System, for Privacy Enforcement," Proceedings of the 21st International Conference on Data Engineering Workshops, IEEE Computer Society, 2005, p. 1195.
-
(2005)
Proceedings of the 21st International Conference on Data Engineering Workshops
, pp. 1195
-
-
Carminati, B.1
Ferrari, E.2
-
37
-
-
57649174593
-
A privacy paradigm, that tradeoffs anonymity and trust,"
-
G. Bella, F. Librizzi, and S. Riccobene, "A privacy paradigm, that tradeoffs anonymity and trust," 16th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2008), 2008, pp. 384-388.
-
(2008)
16th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2008)
, pp. 384-388
-
-
Bella, G.1
Librizzi, F.2
Riccobene, S.3
-
40
-
-
24944506569
-
Trusted computing: Strengths, weaknesses and further opportunities for enhancing privacy
-
S. Pearson, "Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy," Trust Management, 2005, pp. 305-320.
-
(2005)
Trust Management
, pp. 305-320
-
-
Pearson, S.1
|