메뉴 건너뛰기




Volumn , Issue , 2010, Pages 872-877

Extending security-by-contract with quantitative trust on mobile devices

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATIC MANAGEMENT; MOBILE APPLICATIONS; RUN-TIME CONFIGURATION; RUNTIME ENVIRONMENTS; SECURITY ASSURANCE; SECURITY POLICY; TRUST LEVEL; TRUST MANAGEMENT;

EID: 77952682763     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CISIS.2010.33     Document Type: Conference Paper
Times cited : (20)

References (19)
  • 3
    • 70349460414 scopus 로고    scopus 로고
    • A framework for contract-policy matching based on symbolic simulations for securing mobile device application
    • P. Greci, F. Martinelli, and I. Matteucci, "A framework for contract-policy matching based on symbolic simulations for securing mobile device application," in ISoLA, 2008, pp. 221-236.
    • (2008) ISoLA , pp. 221-236
    • Greci, P.1    Martinelli, F.2    Matteucci, I.3
  • 4
    • 57049188320 scopus 로고    scopus 로고
    • Enhancing java me security support with resource usage monitoring
    • A. Castrucci, F. Martinelli, P. Mori, and F. Roperti, "Enhancing java me security support with resource usage monitoring," in ICICS, 2008, pp. 256-266.
    • (2008) ICICS , pp. 256-266
    • Castrucci, A.1    Martinelli, F.2    Mori, P.3    Roperti, F.4
  • 7
    • 67651174593 scopus 로고    scopus 로고
    • An implementation of role-base trust management extended with weights on mobile devices
    • proceedings of the 4th International Workshop on Security and Trust Management (STM 2008)
    • D. Fais, M. Colombo, and A. Lazouski, "An implementation of role-base trust management extended with weights on mobile devices," Electronic Notes in Theoretical Computer Science, vol. 244, pp. 53-65, 2009, proceedings of the 4th International Workshop on Security and Trust Management (STM 2008).
    • (2009) Electronic Notes in Theoretical Computer Science , vol.244 , pp. 53-65
    • Fais, D.1    Colombo, M.2    Lazouski, A.3
  • 11
    • 33845411060 scopus 로고    scopus 로고
    • A fine grained and x.509 based access control system for globus
    • Springer
    • H. Koshutanski, F. Martinelli, P. Mori, L. Borz, and A. Vaccarelli, "A fine grained and x.509 based access control system for globus," in OTM. Springer, 2006, pp. 1336-1350.
    • (2006) OTM , pp. 1336-1350
    • Koshutanski, H.1    Martinelli, F.2    Mori, P.3    Borz, L.4    Vaccarelli, A.5
  • 12
    • 38349047685 scopus 로고    scopus 로고
    • Fine grained access control with trust and reputation management for globus
    • M. Colombo, F. Martinelli, P. Mori, M. Petrocchi, and A. Vaccarelli, "Fine grained access control with trust and reputation management for globus," in OTM Conferences (2), 2007, pp. 1505-1515.
    • (2007) OTM Conferences , vol.2 , pp. 1505-1515
    • Colombo, M.1    Martinelli, F.2    Mori, P.3    Petrocchi, M.4    Vaccarelli, A.5
  • 13
    • 68449090010 scopus 로고    scopus 로고
    • Enhancing grid security by fine-grained behavioral control and negotiation-based authorization
    • H. Koshutanski, A. Lazouski, F. Martinelli, and P. Mori, "Enhancing grid security by fine-grained behavioral control and negotiation-based authorization," Int. J. Inf. Sec., vol. 8, no. 4, pp. 291-314, 2009.
    • (2009) Int. J. Inf. Sec. , vol.8 , Issue.4 , pp. 291-314
    • Koshutanski, H.1    Lazouski, A.2    Martinelli, F.3    Mori, P.4
  • 14
    • 34548119177 scopus 로고    scopus 로고
    • An incentive compatible reputation mechanism for ubiquitous computing environments
    • J. Liu and V. Issarny, "An incentive compatible reputation mechanism for ubiquitous computing environments," Int. J. Inf. Secur., vol. 6, no. 5, pp. 297-311, 2007.
    • (2007) Int. J. Inf. Secur. , vol.6 , Issue.5 , pp. 297-311
    • Liu, J.1    Issarny, V.2
  • 15
    • 0003313661 scopus 로고    scopus 로고
    • Java Security: Present and Near Future
    • L. Gong, "Java Security: Present and Near Future," IEEE Micro, vol. 17, no. 3, pp. 14-19, 1997.
    • (1997) IEEE Micro , vol.17 , Issue.3 , pp. 14-19
    • Gong, L.1
  • 17
    • 84886887597 scopus 로고    scopus 로고
    • What the heck is this application doing? - A security-by-contract architecture for pervasive services
    • to appear in Elsevier
    • N. Dragoni, F. Massacci, T. Walter, and C. Schaefer, "What the heck is this application doing? - a security-by-contract architecture for pervasive services," to appear in Computers & Security, Elsevier.
    • Computers & Security
    • Dragoni, N.1    Massacci, F.2    Walter, T.3    Schaefer, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.