-
2
-
-
0012699601
-
Relying on trust to find reliable information
-
Baden- Baden, Germany, August
-
Abdul-Rahman, A., Hailes, S.: Relying on trust to find reliable information. In: Proceedings of 1999 international symposium on database, web and cooperative systems (DWACOS'99), Baden- Baden, Germany, August (1999).
-
(1999)
Proceedings of 1999 international symposium on database, web and cooperative systems (DWACOS'99)
-
-
Abdul-Rahman, A.1
Hailes, S.2
-
4
-
-
0029700344
-
Decentralized trust management
-
Oakland, CA, May
-
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE conference on security and Privacy, Oakland, CA, pp. 164 -173, May (1996).
-
(1996)
Proceedings of the 1996 IEEE conference on security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
5
-
-
0002380598
-
Security issues in mobile code systems
-
Editor Vigna, volume LNCS1419. Springer-Verlag
-
Chess, D. M.: Security issues in mobile code systems. In: Mobile agents and security, Editor Vigna, volume LNCS1419. Springer-Verlag (1998).
-
(1998)
Mobile agents and security
-
-
Chess, D.M.1
-
6
-
-
2642568213
-
Why isn't trust transitive?
-
Cambridge, UK, April
-
Christianson, B., Harbison, W. S.: Why isn't trust transitive?. In: Proceedings of the 4th security protocols international workshop, Cambridge, UK, April (1996).
-
(1996)
Proceedings of the 4th security protocols international workshop
-
-
Christianson, B.1
Harbison, W.S.2
-
8
-
-
84892253945
-
Specifying and analysing trust for Internet applications
-
October
-
Grandison, T., Sloman, M.: Specifying and analysing trust for Internet applications. Second IFIP Conference on e-Commerce, e-Business, e-Government, October (2002).
-
(2002)
Second IFIP Conference on e-Commerce, e-Business, e-Government
-
-
Grandison, T.1
Sloman, M.2
-
11
-
-
77953082737
-
-
IEEE. (ed.): IEEE Security and Privacy, volume 3 of economics of information security. IEEE Computer Society (2005)
-
IEEE. (ed.): IEEE Security and Privacy, volume 3 of economics of information security. IEEE Computer Society (2005).
-
-
-
-
12
-
-
27944456637
-
Mobile agents and security
-
Jansen, W.: Mobile agents and security. NIST (1999).
-
(1999)
NIST
-
-
Jansen, W.1
-
14
-
-
0013238897
-
A subjective metric of authentication
-
In: Quisquater, J. et al. (eds.), Louvain-la-Neuve, Belgium
-
Jøsang, A.: A subjective metric of authentication. In: Quisquater, J. et al. (eds.) Proceedings of ESORICS'98, Louvain-la-Neuve, Belgium (1998).
-
(1998)
Proceedings of ESORICS'98
-
-
Jøsang, A.1
-
18
-
-
44049085117
-
A trust evaluation method based on logic and probability theory
-
In: Karabulut, Y., Mitchell, J., Herrmann, P., Jensen, C. D. (eds.), Trondheim, Norway
-
Kohlas, R., Jonczy, J., Haenni, R.: A trust evaluation method based on logic and probability theory. In: Karabulut, Y., Mitchell, J., Herrmann, P., Jensen, C. D. (eds.) IFIPTM'08, 2nd joint iTrust and PST conferences on privacy trust management and security, volume II of trust management, pp. 17-32. Trondheim, Norway.
-
IFIPTM'08, 2nd joint iTrust and PST conferences on privacy trust management and security, volume II of trust management
, pp. 17-32
-
-
Kohlas, R.1
Jonczy, J.2
Haenni, R.3
-
19
-
-
33847638942
-
-
Amsterdam, The Netherlands: Elsevier Science Publishers B. V
-
Krukow K., Nielsen M., Sassone V.: A bayesian model for event-based trust, vol. 172, pp. 499-521. Elsevier Science Publishers B. V, Amsterdam, The Netherlands (2007).
-
(2007)
A Bayesian Model for Event-Based Trust
, vol.172
, pp. 499-521
-
-
Krukow, K.1
Nielsen, M.2
Sassone, V.3
-
20
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Lampson B., Abadi M., Burrows M., Wobber E.: Authentication in distributed systems: theory and practice. ACM Trans. Comput. Syst. 10(4), 265-310 (1992).
-
(1992)
ACM Trans. Comput. Syst.
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
22
-
-
85014167243
-
Seven good reasons for mobile agents
-
Lange D. B., Oshima M.: Seven good reasons for mobile agents. Commun ACM 42(3), 88-89 (1999).
-
(1999)
Commun ACM
, vol.42
, Issue.3
, pp. 88-89
-
-
Lange, D.B.1
Oshima, M.2
-
23
-
-
77953083088
-
-
Phd thesis, Information and Communication Sciences Division, Macquarie University, Sydney, Australia, May
-
Lin, C.: Trust Enhanced Security for Mobile Agent. Phd thesis, Information and Communication Sciences Division, Macquarie University, Sydney, Australia, May (2007).
-
(2007)
Trust Enhanced Security for Mobile Agent
-
-
Lin, C.1
-
24
-
-
34548189299
-
A hybrid trust model for enhancing security in distributed systems
-
Vienna, Austria, April, 10-13, IEEE Computer Society Press. ISBN 0-7695-2775-2
-
Lin, C., Varadharajan, V.: A hybrid trust model for enhancing security in distributed systems. In: The second international conference on availability, reliability and security (AReS 2007), pp. 35-42, Vienna, Austria, April, 10-13, 2007. IEEE Computer Society Press. ISBN 0-7695-2775-2.
-
(2007)
The second international conference on availability, reliability and security (AReS 2007)
, pp. 35-42
-
-
Lin, C.1
Varadharajan, V.2
-
25
-
-
0242340728
-
Modeling and evaluating trust relationships in mobile agent based systems
-
Kunming, China, Springer-Verlag
-
Lin, C., Varadharajan, V.: Modeling and evaluating trust relationships in mobile agent based systems. In: Proceedings of first international Conference on applied cryptography and network security (ACNS03), volume LNCS 2846, pp. 176-190, Kunming, China, Springer-Verlag (2003).
-
(2003)
Proceedings of first international Conference on applied cryptography and network security (ACNS03), volume LNCS 2846
, pp. 176-190
-
-
Lin, C.1
Varadharajan, V.2
-
26
-
-
26844463547
-
Maximizing utility of mobile agents based e-commerce applications with trust enhanced security
-
in conjunction with the 16th international conference on database and expert systems applications (DEXA 2005), volume LNCS 3592, Copenhagen, Denmark, August 22-26, Springer-Verlag
-
Lin, C., Varadharajan, V., Wang, Y.: Maximizing utility of mobile agents based e-commerce applications with trust enhanced security. In: 2nd international conference on trust, privacy, and security in digital business (TrustBus05), in conjunction with the 16th international conference on database and expert systems applications (DEXA 2005), volume LNCS 3592, pp. 151-160, Copenhagen, Denmark, August 22-26, Springer-Verlag (2005).
-
(2005)
2nd international conference on trust, privacy, and security in digital business (TrustBus05)
, pp. 151-160
-
-
Lin, C.1
Varadharajan, V.2
Wang, Y.3
-
27
-
-
33646827201
-
Trust enhanced security for mobile agents
-
Technische Universitt Mnchen, Germany, July 19-22, IEEE Computer Society Press
-
Lin, C., Varadharajan, V., Wang, Y., Pruthi, V.: Trust enhanced security for mobile agents. In: 7th international IEEE conference on E-commerce technology 2005, Technische Universitt Mnchen, Germany, July 19-22, IEEE Computer Society Press (2005).
-
(2005)
7th international IEEE conference on E-commerce technology 2005
-
-
Lin, C.1
Varadharajan, V.2
Wang, Y.3
Pruthi, V.4
-
28
-
-
50249122595
-
Trust enhanced security-a new philosophy for secure collaboration of mobile agents
-
In conjunction with the 2nd international conference on collaborative computing: networking, applications and worksharing (CollaborateCom-2006), Atlanta, Georgia, USA, November 17-20, IEEE Computer Society
-
Lin, C., Varadharajan, V.: Trust enhanced security-a new philosophy for secure collaboration of mobile agents. In: International workshop on trusted collaboration (TrustCol-2006). In conjunction with the 2nd international conference on collaborative computing: networking, applications and worksharing (CollaborateCom-2006), Atlanta, Georgia, USA, November 17-20, IEEE Computer Society (2006).
-
(2006)
International workshop on trusted collaboration (TrustCol-2006)
-
-
Lin, C.1
Varadharajan, V.2
-
34
-
-
0002101577
-
Reputation systems: Facilitating trust in internet interactions
-
Resnick P., Zeckhauser R., Friedman E., Kuwabara K.: Reputation systems: facilitating trust in internet interactions. Commun ACM 43(12), 45-48 (2000).
-
(2000)
Commun ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Zeckhauser, R.2
Friedman, E.3
Kuwabara, K.4
-
35
-
-
18944405663
-
Mobile agent security-issues and directions
-
Barcelona, Spain, April
-
Schelderup, K., Olnes, J.: Mobile agent security-issues and directions. In: Proceedings of the 6th international conference on intelligence and services in networks, Barcelona, Spain, April (1999).
-
(1999)
Proceedings of the 6th international conference on intelligence and services in networks
-
-
Schelderup, K.1
Olnes, J.2
-
37
-
-
84948187986
-
Trust relationships in a mobile agent system
-
In: Picco, G. P. (ed.), Atlanta, Georgia, December, Springer-Verlag
-
Tan, H. K., Moreau, L.: Trust relationships in a mobile agent system. In: Picco, G. P. (ed.) Fifth IEEE international conference on mobile agents, volume LNCS2240, Atlanta, Georgia, December, Springer-Verlag (2001).
-
(2001)
Fifth IEEE international conference on mobile agents, volume LNCS2240
-
-
Tan, H.K.1
Moreau, L.2
-
40
-
-
26844544709
-
On the problem of trust in mobile agent systems
-
San Diego, California, Internet Society, March 11-13
-
Wilhelm, U. G., Staamann, S., Buttyn, L.: On the problem of trust in mobile agent systems. In: Proceedings of 1998 network and distributed security symposium, San Diego, California, Internet Society, March 11-13 (1998).
-
(1998)
Proceedings of 1998 network and distributed security symposium
-
-
Wilhelm, U.G.1
Staamann, S.2
Buttyn, L.3
-
42
-
-
0028675688
-
Trust-based navigation in distributed systems
-
Yahalom R., Klein B., Beth T.: Trust-based navigation in distributed systems. Comput Syst 7(1), 45-73 (1994).
-
(1994)
Comput Syst
, vol.7
, Issue.1
, pp. 45-73
-
-
Yahalom, R.1
Klein, B.2
Beth, T.3
-
43
-
-
84974678544
-
A social mechanism of reputation management in electronic communities
-
In: Klusch, M., Kerschberg, L. (eds.), 1860 of LNAI, Springer
-
Yu, B., Singh, M. P.: A social mechanism of reputation management in electronic communities. In: Klusch, M., Kerschberg, L. (eds.) CIA-2000 workshop on cooperative information agents, 1860 of LNAI, Springer (2000).
-
(2000)
CIA-2000 workshop on cooperative information agents
-
-
Yu, B.1
Singh, M.P.2
|