메뉴 건너뛰기




Volumn 9, Issue 3, 2010, Pages 153-178

MobileTrust: A trust enhanced security architecture for mobile agent systems

Author keywords

Mobile code security; Security performance verification; System integration and implementation; Trust architecture; Trust enhanced security; Trust management; Trust model

Indexed keywords

MOBILE CODE SECURITY; PERFORMANCE VERIFICATION; SECURITY PERFORMANCE VERIFICATION; TRUST MANAGEMENT; TRUST MODELS;

EID: 77953082250     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-009-0098-x     Document Type: Article
Times cited : (11)

References (44)
  • 5
    • 0002380598 scopus 로고    scopus 로고
    • Security issues in mobile code systems
    • Editor Vigna, volume LNCS1419. Springer-Verlag
    • Chess, D. M.: Security issues in mobile code systems. In: Mobile agents and security, Editor Vigna, volume LNCS1419. Springer-Verlag (1998).
    • (1998) Mobile agents and security
    • Chess, D.M.1
  • 11
    • 77953082737 scopus 로고    scopus 로고
    • IEEE. (ed.): IEEE Security and Privacy, volume 3 of economics of information security. IEEE Computer Society (2005)
    • IEEE. (ed.): IEEE Security and Privacy, volume 3 of economics of information security. IEEE Computer Society (2005).
  • 12
    • 27944456637 scopus 로고    scopus 로고
    • Mobile agents and security
    • Jansen, W.: Mobile agents and security. NIST (1999).
    • (1999) NIST
    • Jansen, W.1
  • 14
    • 0013238897 scopus 로고    scopus 로고
    • A subjective metric of authentication
    • In: Quisquater, J. et al. (eds.), Louvain-la-Neuve, Belgium
    • Jøsang, A.: A subjective metric of authentication. In: Quisquater, J. et al. (eds.) Proceedings of ESORICS'98, Louvain-la-Neuve, Belgium (1998).
    • (1998) Proceedings of ESORICS'98
    • Jøsang, A.1
  • 20
    • 84976834054 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • Lampson B., Abadi M., Burrows M., Wobber E.: Authentication in distributed systems: theory and practice. ACM Trans. Comput. Syst. 10(4), 265-310 (1992).
    • (1992) ACM Trans. Comput. Syst. , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 22
    • 85014167243 scopus 로고    scopus 로고
    • Seven good reasons for mobile agents
    • Lange D. B., Oshima M.: Seven good reasons for mobile agents. Commun ACM 42(3), 88-89 (1999).
    • (1999) Commun ACM , vol.42 , Issue.3 , pp. 88-89
    • Lange, D.B.1    Oshima, M.2
  • 23
    • 77953083088 scopus 로고    scopus 로고
    • Phd thesis, Information and Communication Sciences Division, Macquarie University, Sydney, Australia, May
    • Lin, C.: Trust Enhanced Security for Mobile Agent. Phd thesis, Information and Communication Sciences Division, Macquarie University, Sydney, Australia, May (2007).
    • (2007) Trust Enhanced Security for Mobile Agent
    • Lin, C.1
  • 24
    • 34548189299 scopus 로고    scopus 로고
    • A hybrid trust model for enhancing security in distributed systems
    • Vienna, Austria, April, 10-13, IEEE Computer Society Press. ISBN 0-7695-2775-2
    • Lin, C., Varadharajan, V.: A hybrid trust model for enhancing security in distributed systems. In: The second international conference on availability, reliability and security (AReS 2007), pp. 35-42, Vienna, Austria, April, 10-13, 2007. IEEE Computer Society Press. ISBN 0-7695-2775-2.
    • (2007) The second international conference on availability, reliability and security (AReS 2007) , pp. 35-42
    • Lin, C.1    Varadharajan, V.2
  • 26
    • 26844463547 scopus 로고    scopus 로고
    • Maximizing utility of mobile agents based e-commerce applications with trust enhanced security
    • in conjunction with the 16th international conference on database and expert systems applications (DEXA 2005), volume LNCS 3592, Copenhagen, Denmark, August 22-26, Springer-Verlag
    • Lin, C., Varadharajan, V., Wang, Y.: Maximizing utility of mobile agents based e-commerce applications with trust enhanced security. In: 2nd international conference on trust, privacy, and security in digital business (TrustBus05), in conjunction with the 16th international conference on database and expert systems applications (DEXA 2005), volume LNCS 3592, pp. 151-160, Copenhagen, Denmark, August 22-26, Springer-Verlag (2005).
    • (2005) 2nd international conference on trust, privacy, and security in digital business (TrustBus05) , pp. 151-160
    • Lin, C.1    Varadharajan, V.2    Wang, Y.3
  • 28
    • 50249122595 scopus 로고    scopus 로고
    • Trust enhanced security-a new philosophy for secure collaboration of mobile agents
    • In conjunction with the 2nd international conference on collaborative computing: networking, applications and worksharing (CollaborateCom-2006), Atlanta, Georgia, USA, November 17-20, IEEE Computer Society
    • Lin, C., Varadharajan, V.: Trust enhanced security-a new philosophy for secure collaboration of mobile agents. In: International workshop on trusted collaboration (TrustCol-2006). In conjunction with the 2nd international conference on collaborative computing: networking, applications and worksharing (CollaborateCom-2006), Atlanta, Georgia, USA, November 17-20, IEEE Computer Society (2006).
    • (2006) International workshop on trusted collaboration (TrustCol-2006)
    • Lin, C.1    Varadharajan, V.2
  • 34
    • 0002101577 scopus 로고    scopus 로고
    • Reputation systems: Facilitating trust in internet interactions
    • Resnick P., Zeckhauser R., Friedman E., Kuwabara K.: Reputation systems: facilitating trust in internet interactions. Commun ACM 43(12), 45-48 (2000).
    • (2000) Commun ACM , vol.43 , Issue.12 , pp. 45-48
    • Resnick, P.1    Zeckhauser, R.2    Friedman, E.3    Kuwabara, K.4
  • 42
    • 0028675688 scopus 로고
    • Trust-based navigation in distributed systems
    • Yahalom R., Klein B., Beth T.: Trust-based navigation in distributed systems. Comput Syst 7(1), 45-73 (1994).
    • (1994) Comput Syst , vol.7 , Issue.1 , pp. 45-73
    • Yahalom, R.1    Klein, B.2    Beth, T.3
  • 43
    • 84974678544 scopus 로고    scopus 로고
    • A social mechanism of reputation management in electronic communities
    • In: Klusch, M., Kerschberg, L. (eds.), 1860 of LNAI, Springer
    • Yu, B., Singh, M. P.: A social mechanism of reputation management in electronic communities. In: Klusch, M., Kerschberg, L. (eds.) CIA-2000 workshop on cooperative information agents, 1860 of LNAI, Springer (2000).
    • (2000) CIA-2000 workshop on cooperative information agents
    • Yu, B.1    Singh, M.P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.