-
2
-
-
4243048792
-
Service-oriented computing
-
M. Papazoglou and D. Georgakopoulos, "Service-Oriented Computing," CACM, vol. 46, no. 10, pp. 25-65, 2003.
-
(2003)
CACM
, vol.46
, Issue.10
, pp. 25-65
-
-
Papazoglou, M.1
Georgakopoulos, D.2
-
4
-
-
4544359599
-
Beyond concern: A privacy-trust-behavioral intention model of electronic commerce
-
C. Liu, J. Marchewkaa, J. Lub, and C. Yub, "Beyond concern: a privacy-trust-behavioral intention model of electronic commerce," Information & Management, vol. 42, no. 1, pp. 127-142, 2004.
-
(2004)
Information & Management
, vol.42
, Issue.1
, pp. 127-142
-
-
Liu, C.1
Marchewkaa, J.2
Lub, J.3
Yub, C.4
-
6
-
-
26844503998
-
Experiments in building experiential trust in a society of objective-trust based agents
-
Springer- Verlag
-
M. Witkowski, A. Artikis, and J. Pitt, "Experiments in building experiential trust in a society of objective-trust based agents," in Proc. of "Deception, Fraud, and Trust in Agent Societies" workshop. Springer-Verlag, 2000, pp. 111-132.
-
(2000)
Proc. of "deception, Fraud, and Trust in Agent Societies" Workshop
, pp. 111-132
-
-
Witkowski, M.1
Artikis, A.2
Pitt, J.3
-
7
-
-
35948972837
-
A review on trust and reputation for web service selection
-
Washington, DC, USA: IEEE
-
Y. Wang and J. Vassileva, "A review on trust and reputation for web service selection," in Proc. of ICDCS. Washington, DC, USA: IEEE, 2007.
-
(2007)
Proc. of ICDCS
-
-
Wang, Y.1
Vassileva, J.2
-
8
-
-
70350525809
-
Reputation bootstrapping for trust establishment among web services
-
Z. Malik and A. Bouguettaya, "Reputation bootstrapping for trust establishment among web services," Internet Computing, vol. 13, no. 1, pp. 40-47, 2009.
-
(2009)
Internet Computing
, vol.13
, Issue.1
, pp. 40-47
-
-
Malik, Z.1
Bouguettaya, A.2
-
9
-
-
20844435854
-
Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions
-
G. Adomavicius and E. Tuzhilin, "Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions," IEEE TKDE, vol. 17, pp. 734-749, 2005.
-
(2005)
IEEE TKDE
, vol.17
, pp. 734-749
-
-
Adomavicius, G.1
Tuzhilin, E.2
-
10
-
-
80052126248
-
Trust based recommender system for the semantic web
-
P. Bedi, H. Kaur, and S. Marwaha, "Trust based recommender system for the semantic web," in Proc. of IJCAI, 2007, pp. 2677-2682.
-
(2007)
Proc. of IJCAI
, pp. 2677-2682
-
-
Bedi, P.1
Kaur, H.2
Marwaha, S.3
-
11
-
-
38649109809
-
A formal framework for trust management of service-oriented systems
-
IEEE
-
L. Zhengping, L. Xiaoli, W. Guoqing, Y. Min, and Z. Fan, "A formal framework for trust management of service-oriented systems," in Proc. of SOCA. IEEE, 2007, pp. 241-248.
-
(2007)
Proc. of SOCA
, pp. 241-248
-
-
Zhengping, L.1
Xiaoli, L.2
Guoqing, W.3
Min, Y.4
Fan, Z.5
-
12
-
-
0001812831
-
Community-based service location
-
M. Singh, B. Yu, and M. Venkatraman, "Community-based service location," CACM, vol. 44, no. 4, pp. 49-54, 2001.
-
(2001)
CACM
, vol.44
, Issue.4
, pp. 49-54
-
-
Singh, M.1
Yu, B.2
Venkatraman, M.3
-
13
-
-
18144381559
-
Engineering self-organizing referral networks for trustworthy service selection
-
P. Yolum and M. Singh, "Engineering Self-Organizing Referral Networks for Trustworthy Service Selection," IEEE Trans. on Sys., Man, and Cyb., vol. 35, no. 3, pp. 396-407, 2005.
-
(2005)
IEEE Trans. on Sys., Man, and Cyb.
, vol.35
, Issue.3
, pp. 396-407
-
-
Yolum, P.1
Singh, M.2
-
14
-
-
47749105669
-
A trust based methodology for web service selection
-
IEEE
-
S. Galizia, A. Gugliotta, and J. Dominque, "A trust based methodology for web service selection," in Proc. of ICSC. IEEE, 2007, pp. 193-200.
-
(2007)
Proc. of ICSC
, pp. 193-200
-
-
Galizia, S.1
Gugliotta, A.2
Dominque, J.3
-
15
-
-
33845382265
-
IRS-III: A broker for semantic web services based applications
-
ser. LNCS. Springer- Verlag
-
L. Cabral, J. Domingue, S. Galizia, A. Gugliotta, V. Tanasescu, C. Pedrinaci, and B. Norton, "IRS-III: A Broker for Semantic Web Services based Applications," in Proc. of ISWC, ser. LNCS. Springer-Verlag, 2006, pp. 201-214.
-
(2006)
Proc. of ISWC
, pp. 201-214
-
-
Cabral, L.1
Domingue, J.2
Galizia, S.3
Gugliotta, A.4
Tanasescu, V.5
Pedrinaci, C.6
Norton, B.7
-
16
-
-
24144437747
-
Trust negotiation for semantic web services
-
ser. LNCS. Springer- Verlag
-
D. Olmedilla, R. Lara, A. Polleres, and H. Lausen, "Trust negotiation for semantic web services," in Proc. of Intern. Workshop on Semantic Web Services and Web Process Composition, ser. LNCS. Springer-Verlag, 2004, pp. 81-95.
-
(2004)
Proc. of Intern. Workshop on Semantic Web Services and Web Process Composition
, pp. 81-95
-
-
Olmedilla, D.1
Lara, R.2
Polleres, A.3
Lausen, H.4
-
17
-
-
4344669314
-
A computational trust model for multi-agent interactions based on confidence and reputation
-
S. Ramchurn, C. Sierra, L. Godo, and N. Jennings, "A computational trust model for multi-agent interactions based on confidence and reputation," in Proc. of "Deception, Fraud and Trust in Agent Societies" Workshop, 2003, pp. 69-75.
-
(2003)
Proc. of "deception, Fraud and Trust in Agent Societies" Workshop
, pp. 69-75
-
-
Ramchurn, S.1
Sierra, C.2
Godo, L.3
Jennings, N.4
-
18
-
-
35248892017
-
Trust-based service provider selection in open environments
-
ACM Press
-
H. Billhardt, R. Hermoso, S. Ossowski, and R. Centeno, "Trust-based service provider selection in open environments," in Proc. of SAC. ACM Press, 2007, pp. 1375-1380.
-
(2007)
Proc. of SAC
, pp. 1375-1380
-
-
Billhardt, H.1
Hermoso, R.2
Ossowski, S.3
Centeno, R.4
-
19
-
-
33748707875
-
QoS-based service selection and ranking with trust and reputation management
-
ser. LNCS. Springer- Verlag
-
L.-H. Vu, M. Hauswirth, and K. Aberer, "QoS-based Service Selection and Ranking with Trust and Reputation Management," in Proc. of CIS, ser. LNCS. Springer-Verlag, 2005.
-
(2005)
Proc. of CIS
-
-
Vu, L.-H.1
Hauswirth, M.2
Aberer, K.3
-
20
-
-
33846966283
-
An integrated trust and reputation model for open multi-agent systems
-
T. Huynh, N. Jennings, and N. Shadbolt, "An integrated trust and reputation model for open multi-agent systems," JAAMAS, vol. 13, no. 2, pp. 119-154, 2006.
-
(2006)
JAAMAS
, vol.13
, Issue.2
, pp. 119-154
-
-
Huynh, T.1
Jennings, N.2
Shadbolt, N.3
-
21
-
-
52149092491
-
Combining trust and reputation management for web-based services
-
Springer-Verlag
-
A. Josang, T. Bhuiyan, Y. Xu, and C. Cox, "Combining Trust and Reputation Management for Web-Based Services," in Proc. of TrustBus. Springer-Verlag, 2008, pp. 90-99.
-
(2008)
Proc. of TrustBus
, pp. 90-99
-
-
Josang, A.1
Bhuiyan, T.2
Xu, Y.3
Cox, C.4
-
22
-
-
85041439566
-
Principles of trust for mas: Cognitive anatomy, social importance,and quantification
-
IEEE
-
R. Falcone and C. Castelfranchi, "Principles of trust for mas: cognitive anatomy, social importance,and quantification," in Proc. of ICMAS. IEEE, 1998, pp. 72-79.
-
(1998)
Proc. of ICMAS
, pp. 72-79
-
-
Falcone, R.1
Castelfranchi, C.2
-
23
-
-
7044245599
-
Trust, reputation and security: Theories and practice
-
Special Issue on. Springer- Verlag, ch. A fuzzy approach to a belief-based trust computation
-
R. Falcone, G. Pezzulo, and C. Castelfranchi, Special Issue on "Trust, Reputation and Security: Theories and Practice", ser. LNAI. Springer-Verlag, 2003, ch. A fuzzy approach to a belief-based trust computation, pp. 73-86.
-
(2003)
LNAI
, pp. 73-86
-
-
Falcone, R.1
Pezzulo, G.2
Castelfranchi, C.3
-
24
-
-
3042777385
-
Trust negotiations: Concepts, systems, and languages
-
E. Bertino, E. Ferrari, and A. Squicciarini, "Trust Negotiations: Concepts, Systems, and Languages," Computing in Science and Engineering, vol. 6, no. 4, pp. 27-34, 2004.
-
(2004)
Computing in Science and Engineering
, vol.6
, Issue.4
, pp. 27-34
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.3
-
25
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
T. Yu, M. Winslett, and K. E. Seamons, "Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation," ACM TISSEC, vol. 6, no. 1, pp. 1-42, 2003.
-
(2003)
ACM TISSEC
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
26
-
-
13244299177
-
Collaborative automated trust negotiation in peer-to-peer systems
-
IEEE
-
S. Ye, F. Makedon, and J. Ford, "Collaborative automated trust negotiation in peer-to-peer systems," in Proc. of P2P. IEEE, 2004, pp. 108-115.
-
(2004)
Proc. of P2P
, pp. 108-115
-
-
Ye, S.1
Makedon, F.2
Ford, J.3
-
27
-
-
35048841281
-
Peertrust: Automated trust negotiation for peers on the semantic web
-
Springer
-
W. Nejdl, D. Olmedilla, and M. Winslett, "Peertrust: Automated trust negotiation for peers on the semantic web," in Proc. of SDM, vol. 3178. Springer, 2004, pp. 118-132.
-
(2004)
Proc. of SDM
, vol.3178
, pp. 118-132
-
-
Nejdl, W.1
Olmedilla, D.2
Winslett, M.3
-
28
-
-
0036871183
-
Negotiating trust on the web
-
M. Winslett, T. Yu, K. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu, "Negotiating Trust on the Web," IEEE Int. Comp., vol. 6, no. 6, pp. 30-37, 2002.
-
(2002)
IEEE Int. Comp.
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
29
-
-
3142676730
-
Trust-x: A peer-to-peer framework for trust establishment
-
E. Bertino, E. Ferrari, and A. C. Squicciarini, "Trust-x: A peer-to-peer framework for trust establishment," TKDE, vol. 16, no. 7, pp. 827-842, 2004.
-
(2004)
TKDE
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
30
-
-
84902459113
-
Interactive access control for web services
-
Kluwer Press
-
H. Koshutanski and F. Massacci, "Interactive access control for web services," in Proc. of IFIP ISC. Kluwer Press, 2004, pp. 151-166.
-
(2004)
Proc. of IFIP ISC
, pp. 151-166
-
-
Koshutanski, H.1
Massacci, F.2
-
31
-
-
34250616363
-
Access control enforcement for conversation-based web services
-
ACM Press
-
M. Mecella, M. Ouzzani, F. Paci, and E. Bertino, "Access control enforcement for conversation-based web services." in Proc. of WWW. ACM Press, 2006, pp. 257-266.
-
(2006)
Proc. of WWW
, pp. 257-266
-
-
Mecella, M.1
Ouzzani, M.2
Paci, F.3
Bertino, E.4
-
32
-
-
85029609685
-
Simulated social control for secure internet commerce
-
ACM Press
-
L. Rasmusson and S. Jansson, "Simulated social control for secure internet commerce," in Proc. of NSPW. ACM Press, 1996, pp. 18-25.
-
(1996)
Proc. of NSPW
, pp. 18-25
-
-
Rasmusson, L.1
Jansson, S.2
-
33
-
-
15744379239
-
Towards contract-based testing of web services
-
R. Heckel and M. Lohmann, "Towards contract-based testing of web services," Electr. Notes Theor. Comput. Sci., vol. 116, pp. 145-156, 2005.
-
(2005)
Electr. Notes Theor. Comput. Sci.
, vol.116
, pp. 145-156
-
-
Heckel, R.1
Lohmann, M.2
-
34
-
-
84856869310
-
A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems
-
To appear in
-
N. Dragoni, F. Massacci, and A. Saidane, "A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems," To appear in Computer Networks Journal.
-
Computer Networks Journal
-
-
Dragoni, N.1
Massacci, F.2
Saidane, A.3
-
35
-
-
0002817535
-
The PERMIS X.509 role-based privilege management infrastructure
-
ACM Press
-
D. W. Chadwick and A. Otenko, "The PERMIS X.509 role-based privilege management infrastructure," in Proc. of SACMAT. ACM Press, 2002, pp. 135-140.
-
(2002)
Proc. of SACMAT
, pp. 135-140
-
-
Chadwick, D.W.1
Otenko, A.2
-
36
-
-
33947544647
-
A negotiation scheme for access rights establishment in autonomic communication
-
H. Koshutanski and F. Massacci, "A negotiation scheme for access rights establishment in autonomic communication," Journal of Network and System Management, vol. 15, no. 1, pp. 117-136, 2007.
-
(2007)
Journal of Network and System Management
, vol.15
, Issue.1
, pp. 117-136
-
-
Koshutanski, H.1
Massacci, F.2
-
38
-
-
37849002157
-
Security-by-contract: Toward a semantics for digital signatures on mobile code
-
Springer- Verlag
-
N. Dragoni, F. Massacci, K. Naliuka, and I. Siahaan, "Security-by- contract: Toward a semantics for digital signatures on mobile code," in Proc. of EUROPKI. Springer-Verlag, 2007, pp. 297-312.
-
(2007)
Proc. of EUROPKI
, pp. 297-312
-
-
Dragoni, N.1
Massacci, F.2
Naliuka, K.3
Siahaan, I.4
-
39
-
-
49049117172
-
Matching policies with security claims of mobile applications
-
IEEE
-
N. Bielova, M. D. Torre, N. Dragoni, and I. Siahaan, "Matching policies with security claims of mobile applications," in Proc. of ARES. IEEE, 2008.
-
(2008)
Proc. of ARES
-
-
Bielova, N.1
Torre, M.D.2
Dragoni, N.3
Siahaan, I.4
|