-
2
-
-
73149120473
-
Design, analysis, and deployment of omnipresent formal trust model (ftm) with trust bootstrapping for pervasive environments
-
S.I. Ahamed, M.M. Haque, M.E. Hoque, F. Rahman, and N. Talukder Design, analysis, and deployment of omnipresent formal trust model (ftm) with trust bootstrapping for pervasive environments Journal of Systems and Software 83 2 2010
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.2
-
-
Ahamed, S.I.1
Haque, M.M.2
Hoque, M.E.3
Rahman, F.4
Talukder, N.5
-
3
-
-
49149089227
-
A trust-based middleware for providing security to ad-hoc peer-to-peer applications
-
IEEE Computer Society Washington, DC, USA
-
F. Almenarez, A. Marin, D. Diaz-Sanchez, A. Cortes, C. Campo, and C. Garcia-Rubio A trust-based middleware for providing security to ad-hoc peer-to-peer applications PERCOM '08: Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications 2008 IEEE Computer Society Washington, DC, USA 531 536
-
(2008)
PERCOM '08: Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications
, pp. 531-536
-
-
Almenarez, F.1
Marin, A.2
Diaz-Sanchez, D.3
Cortes, A.4
Campo, C.5
Garcia-Rubio, C.6
-
4
-
-
24644486472
-
PTM: A Pervasive Trust Management Model for Dynamic Open Environments
-
Almenárez, F., Marín, A., Campo, C., García, C., 2004. PTM: A Pervasive Trust Management Model for Dynamic Open Environments. In: First Workshop on Pervasive Security, Privacy and Trust PSPT'04 in conjuntion with Mobiquitous 2004.
-
(2004)
First Workshop on Pervasive Security, Privacy and Trust PSPT'04 in Conjuntion with Mobiquitous 2004
-
-
Almenárez, F.1
-
7
-
-
44649114523
-
A self-certified and sybil-free framework for secure digital identity domain buildup
-
May 2008
-
Andersson, C., Kohlweiss, M., Martucci, L.A., Panchenko, A., May 2008. A self-certified and sybil-free framework for secure digital identity domain buildup. In: IFIP Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (WISTP). Vol. 5019/2008. pp. 64-77.
-
(2008)
IFIP Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (WISTP)
, vol.5019
, pp. 64-77
-
-
Andersson, C.1
Kohlweiss, M.2
Martucci, L.A.3
Panchenkoa, A.4
-
12
-
-
33748081445
-
TrustBAC - Integrating trust relationships into the RBAC model for access control in open systems
-
SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
-
S. Chakraborty, I. Ray June TrustBAC: integrating trust relationships into the rbac model for access control in open systems 11th ACM symposium on Access control models and technologies (SACMAT '06) 2006 ACM New York, NY, USA 49 58 (Pubitemid 44300741)
-
(2006)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, vol.2006
, pp. 49-58
-
-
Chakraborty, S.1
Ray, I.2
-
13
-
-
0010344835
-
Poblano: A distributed trust model for peer-to-peer networks
-
Sun Microsystems, Inc
-
Chen, R., Yeager, W., 2001. Poblano: A distributed trust model for peer-to-peer networks. Tech. rep., Sun Microsystems, Inc.
-
(2001)
Tech. Rep.
-
-
Chen, R.1
Yeager, W.2
-
14
-
-
51049122345
-
Internet X.509 public key infrastructure: Certificate and certificate revocation list (CRL) profile
-
RFC 5280, IETF Network Working Group
-
Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk., W., 2008. Internet X.509 public key infrastructure: Certificate and certificate revocation list (CRL) profile. Tech. Rep. RFC 5280, IETF Network Working Group.
-
(2008)
Tech. Rep.
-
-
Cooper, D.1
Santesson, S.2
Farrell, S.3
Boeyen, S.4
Housley, R.5
Polk, W.6
-
16
-
-
2442549069
-
Uing trust for secure collaboration in uncertain environments
-
V. Cahill Uing trust for secure collaboration in uncertain environments IEEE Pervasive Computing 2 3 2003 52 61
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.3
, pp. 52-61
-
-
Cahill, V.1
-
17
-
-
79951674419
-
-
Computer & Security
-
J. Forné, F. Hinarejos, A. Marín, F. Almenárez, J. Lopez, J. Montenegro, M. Lacoste, and D. Díaz Pervasive authentication and authorization infrastructures for mobile users 2009 Computer & Security
-
(2009)
Pervasive Authentication and Authorization Infrastructures for Mobile Users
-
-
Forné, J.1
Hinarejos, F.2
Marín, A.3
Almenárez, F.4
Lopez, J.5
Montenegro, J.6
Lacoste, M.7
Díaz, D.8
-
18
-
-
37349052663
-
An omnipresent Formal Trust Model (FTM) for pervasive computing environment
-
DOI 10.1109/COMPSAC.2007.69, 4290983, Proceedings - 31st Annual International Computer Software and Applications Conference, COMPSAC 2007
-
Haque, M.M., Ahamed, S.I., 2007. An omnipresent formal trust model (ftm) for pervasive computing environment. In: 31st Annual International Computer Software and Applications Conference (COMPSAC 2007). Vol. 1. pp. 49-56. (Pubitemid 350301663)
-
(2007)
Proceedings - International Computer Software and Applications Conference
, vol.1
, pp. 49-56
-
-
Haque, M.M.1
Ahamed, S.I.2
-
21
-
-
42649129419
-
Future trust management framework for mobile ad hoc networks
-
DOI 10.1109/MCOM.2008.4481349
-
J. Li, R. Li, and J. Kato Future trust management framework for mobile ad hoc networks IEEE Communications Magazine 46 4 2008 108 114 (Pubitemid 351593416)
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.4
, pp. 108-114
-
-
Li, J.1
Li, R.2
Kato, J.3
-
22
-
-
79951676097
-
An autonomic multimedia and information service gateway for mobile devices
-
Y. Li, S. Pan, N. He, Y. Zhao, H. Su, K. Yu, and J. Ma An autonomic multimedia and information service gateway for mobile devices International Journal of Distributed Sensor Networks 5 1 2009 97
-
(2009)
International Journal of Distributed Sensor Networks
, vol.5
, Issue.1
, pp. 97
-
-
Li, Y.1
Pan, S.2
He, N.3
Zhao, Y.4
Su, H.5
Yu, K.6
Ma, J.7
-
23
-
-
2142692582
-
-
John Wiley & Son
-
N. Luhmman Trust 1979 John Wiley & Son
-
(1979)
Trust
-
-
Luhmman, N.1
-
24
-
-
0003839495
-
-
April Ph.D. thesis, Dept. of Mathematics and Computer Science, University of Stirling
-
Marsh, S., April 1994. Formalising trust as a computational concept. Ph.D. thesis, Dept. of Mathematics and Computer Science, University of Stirling.
-
(1994)
Formalising Trust As A Computational Concept
-
-
Marsh, S.1
-
25
-
-
84947294004
-
Modelling a Public-Key Infrastructure
-
U. Maurer Modelling a public-key infrastructure E. Bertino, European Symposium on Research in Computer Security (ESORICS' 96). Vol. 1146 of Lecture Notes in Computer Science 1996 Springer-Verlag 325 350 (Pubitemid 126128909)
-
(1996)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1146
, pp. 325-350
-
-
Maurer, U.1
-
26
-
-
0004143670
-
Trust or bust: Communicating trustworthiness in web design
-
March
-
Nielsen, J., March 1999. Trust or bust: Communicating trustworthiness in web design. Alertbox. URL http://www.useit.com/alertbox/990307.html.
-
(1999)
Alertbox
-
-
Nielsen, J.1
-
27
-
-
79951682092
-
TEAM in AE: Trust establishment and assessment mechanisms in autonomic environments
-
Papavassiliou, S., Karyotis, V., Pouli, V., Merekoulias, V., 2009. TEAM in AE: trust establishment and assessment mechanisms in autonomic environments. ICT Mobile Summit 2009.
-
(2009)
ICT Mobile Summit 2009
-
-
Papavassiliou, S.1
Karyotis, V.2
Pouli, V.3
Merekoulias, V.4
-
28
-
-
33750373147
-
Active collaborations for trustworthy data management in ad hoc networks
-
Nov
-
Patwardhan, A., Perich, F., Joshi, A., Finin, T., Yesha, Y., Nov 2005. Active collaborations for trustworthy data management in ad hoc networks. In: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference.
-
(2005)
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference
-
-
Patwardhan, A.1
Perich, F.2
Joshi, A.3
Finin, T.4
Yesha, Y.5
-
29
-
-
33750377426
-
-
Elsevier Preprint
-
Ren, K., Li, T., Wan, Z., Bao, F., Deng, R., Kim, K., 2004. Highly reliable trust establishment scheme in ad hoc networks. Elsevier Preprint.
-
(2004)
Highly Reliable Trust Establishment Scheme in Ad Hoc Networks
-
-
Ren, K.1
Li, T.2
Wan, Z.3
Bao, F.4
Deng, R.5
Kim, K.6
-
31
-
-
71049117263
-
Trust and reputation policy-based mechanisms for self-protection in autonomic communications
-
June 2009
-
Serrano, M., van der Meer, S., Strassner, J., Paoli, S.D., Kerr, A., Storni, C., June 2009. Trust and reputation policy-based mechanisms for self-protection in autonomic communications. In: Autonomic and Trusted Computing. Vol. 5586/2009. pp. 249-267.
-
(2009)
Autonomic and Trusted Computing
, vol.5586
, pp. 249-267
-
-
Serrano, M.1
Van Der Meer, S.2
Strassner, J.3
Paoli, S.D.4
Kerr, A.5
Storni, C.6
-
32
-
-
34547237823
-
Beyond the future internet - Requirements of autonomic networking architectures to address long term future networking challenges
-
DOI 10.1109/FTDCS.2007.14, 4144618, Proceedings - FTDCS 2007: 11th IEEE International Workshop on Future Trends of Distributed Computing Systems
-
Siekkinen, M., Goebel, V., Plagemann, T., Skevik, K.-A., Banfield, M., Brusic, I., March 2007. Beyond the future internet-requirements of autonomic networking architectures to address long term future networking challenges. In: IEEE International on Future Trends of Distributed Computing Systems (FTDCS'07). pp. 89 - 98. (Pubitemid 47133874)
-
(2007)
Proceedings of the IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems
, pp. 89-98
-
-
Siekkinen, M.1
Goebel, V.2
Plagemann, T.3
Skevik, K.-A.4
Banfield, M.5
Brusic, I.6
-
33
-
-
57749085346
-
Simulations in wireless sensor and ad hoc networks: Matching and advancing models, metrics, and solutions
-
I. Stojmenovic Simulations in wireless sensor and ad hoc networks: matching and advancing models, metrics, and solutions IEEE Communications Magazine 46 12 2008 102 107
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.12
, pp. 102-107
-
-
Stojmenovic, I.1
-
34
-
-
56749140937
-
Defense of trust management vulnerabilities in distributed networks
-
Y. Sun, Z. Han, and K. Liu Defense of trust management vulnerabilities in distributed networks IEEE Communications Magazine 46 2 2008 112 119
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.2
, pp. 112-119
-
-
Sun, Y.1
Han, Z.2
Liu, K.3
-
35
-
-
33144465377
-
On trust models and trust evaluation metrics for ad hoc networks
-
DOI 10.1109/JSAC.2005.861390
-
G. Theodorakopoulos, and J.S. Baras On Trust Models and Trust Evaluation Metrics for Ad-Hoc Networks IEEE Journal on Selected Areas in Communications 24 2 2006 318 328 (Pubitemid 43269752)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 318-328
-
-
Theodorakopoulos, G.1
Baras, J.S.2
-
36
-
-
35048861563
-
Interaction trust evaluation in decentralized environments
-
Wang, Y., Varadharajan, V., 2004. Interaction trust evaluation in decentralized environments. In: EC-Web. pp. 144-153.
-
(2004)
EC-Web
, pp. 144-153
-
-
Wang, Y.1
Varadharajan, V.2
|