-
1
-
-
59349105865
-
Rater credibility assessment in web services interactions
-
Z. Malik and A. Bouguettaya, "Rater credibility assessment in web services interactions," World Wide Web, vol. 12, pp. 3-25, 2009.
-
(2009)
World Wide Web
, vol.12
, pp. 3-25
-
-
Malik, Z.1
Bouguettaya, A.2
-
2
-
-
34250647985
-
Security and systems engineering
-
University of York and Heslington and York and UK
-
H. Chivers, "Security and systems engineering," Department of Computer Engineering and University of York and Heslington and York and UK, Tech. Rep., 1994.
-
(1994)
Department of Computer Engineering, Tech. Rep.
-
-
Chivers, H.1
-
4
-
-
0009481412
-
A survey of trust in internet applications
-
T. Grandison and M. Sloman, "A survey of trust in internet applications," IEEE Communications Survey, vol. 3, pp. 2-16, 2000.
-
(2000)
IEEE Communications Survey
, vol.3
, pp. 2-16
-
-
Grandison, T.1
Sloman, M.2
-
5
-
-
78249270193
-
-
Idea Group Inc., ch. A Survey of Trust Use and Modeling in Real Online Systems
-
P. Massa, Trust in E-services: Technologies, Practices and Challenges. Idea Group Inc., 2007, ch. A Survey of Trust Use and Modeling in Real Online Systems, pp. 51-83.
-
(2007)
Trust in E-services: Technologies, Practices and Challenges
, pp. 51-83
-
-
Massa, P.1
-
6
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
A. Jøsang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Systems, vol. 43, pp. 618-644, 2007.
-
(2007)
Decision Support Systems
, vol.43
, pp. 618-644
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
8
-
-
70350695620
-
Trust modeling for security architecture development
-
D. Andert, R. Wakefield, and J. Weise, "Trust modeling for security architecture development," Sun Microsystems, Inc., Tech. Rep., 2002.
-
(2002)
Sun Microsystems, Inc., Tech. Rep.
-
-
Andert, D.1
Wakefield, R.2
Weise, J.3
-
9
-
-
56749140937
-
Defense of trust management vulnerabilities in distributed networks
-
Z. Sun, Y. L. Han and K. J. R. Liu, "Defense of trust management vulnerabilities in distributed networks," IEEE Communications Magazine, vol. 46, pp. 112-119, 2008.
-
(2008)
IEEE Communications Magazine
, vol.46
, pp. 112-119
-
-
Sun, Z.1
Han, Y.L.2
Liu, K.J.R.3
-
10
-
-
33947632776
-
-
Ph.D. dissertation, Department of Computer Science, University of Aarhus, Denmark
-
K. Krukow, "Towards a theory of trust for the global ubiquitous computer," Ph.D. dissertation, Department of Computer Science, University of Aarhus, Denmark, 2006.
-
(2006)
Towards a Theory of Trust for the Global Ubiquitous Computer
-
-
Krukow, K.1
-
11
-
-
70350690952
-
-
Ph.D. Dissertation, Department of Electrical and Communication Engineering, Helsinki University of Technology, Network Laboratory
-
Z. Yan, "Trust management for mobile computing platforms," Ph.D. Dissertation, Department of Electrical and Communication Engineering, Helsinki University of Technology, Network Laboratory, 2007.
-
(2007)
Trust Management for Mobile Computing Platforms
-
-
Yan, Z.1
-
12
-
-
19944395899
-
Propagation of trust and distrust
-
ACM
-
R. Guha, R. Kumar, P. Raghavan, and A. Tomkins, "Propagation of trust and distrust," in Proceedings of the 13th International Conference on World Wide Web. ACM, 2004, pp. 403 - 412.
-
(2004)
Proceedings of the 13th International Conference on World Wide Web
, pp. 403-412
-
-
Guha, R.1
Kumar, R.2
Raghavan, P.3
Tomkins, A.4
-
13
-
-
71049158665
-
Research on propagation of trust and distrust by means of co-citation
-
June
-
Y. Zhu, Y. Li, and Y. Ren, "Research on propagation of trust and distrust by means of co-citation," in 6th International Conference on Service Systems and Service Management, 2009. ICSSSM '09, June 2009, pp. 943-948.
-
(2009)
6th International Conference on Service Systems and Service Management, 2009. ICSSSM '09
, pp. 943-948
-
-
Zhu, Y.1
Li, Y.2
Ren, Y.3
-
14
-
-
78249254973
-
Semantics based information trust computation and propagation algorithm for semantic web
-
24-26 September
-
B. Zhang, Y. Xiang, and Q. Xu, "Semantics based information trust computation and propagation algorithm for semantic web," in 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009. WiCom '09, 24-26 September 2009, pp. 1 - 4.
-
(2009)
5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009. WiCom '09
, pp. 1-4
-
-
Zhang, B.1
Xiang, Y.2
Xu, Q.3
-
15
-
-
70350634081
-
An architectural approach for assessing system trust based on security policy specifications and security mechanisms
-
ACM
-
Ş . Bahtiyar, M. Cihan, and M. U. Çaǧlayan, "An architectural approach for assessing system trust based on security policy specifications and security mechanisms," in SIN '09: Proceedings of the 2nd International Conference on Security of Information and Networks. ACM, 2009, pp. 71-74.
-
(2009)
SIN '09: Proceedings of the 2nd International Conference on Security of Information and Networks
, pp. 71-74
-
-
Bahtiyar, Ş.1
Cihan, M.2
Çaǧlayan, M.U.3
|