메뉴 건너뛰기




Volumn 9, Issue 4, 2011, Pages 687-697

Trust management for multimedia P2P applications in autonomic networking

Author keywords

Autonomic networking; Multimedia P2P applications; Trust attacks; Trust management

Indexed keywords

AUTONOMIC NETWORK; AUTONOMIC NETWORKING; DECENTRALISATION; EVOLUTIONARY MODELS; MULTIMEDIA APPLICATIONS; P2P APPLICATIONS; PEER TO PEER; PROTECTION MECHANISMS; TRUST ATTACK; TRUST MANAGEMENT; TRUST RELATIONSHIP;

EID: 79951680628     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2010.09.005     Document Type: Article
Times cited : (36)

References (37)
  • 2
    • 73149120473 scopus 로고    scopus 로고
    • Design, analysis, and deployment of omnipresent formal trust model (ftm) with trust bootstrapping for pervasive environments
    • S.I. Ahamed, M.M. Haque, M.E. Hoque, F. Rahman, and N. Talukder Design, analysis, and deployment of omnipresent formal trust model (ftm) with trust bootstrapping for pervasive environments Journal of Systems and Software 83 2 2010
    • (2010) Journal of Systems and Software , vol.83 , Issue.2
    • Ahamed, S.I.1    Haque, M.M.2    Hoque, M.E.3    Rahman, F.4    Talukder, N.5
  • 12
    • 33748081445 scopus 로고    scopus 로고
    • TrustBAC - Integrating trust relationships into the RBAC model for access control in open systems
    • SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
    • S. Chakraborty, I. Ray June TrustBAC: integrating trust relationships into the rbac model for access control in open systems 11th ACM symposium on Access control models and technologies (SACMAT '06) 2006 ACM New York, NY, USA 49 58 (Pubitemid 44300741)
    • (2006) Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT , vol.2006 , pp. 49-58
    • Chakraborty, S.1    Ray, I.2
  • 13
    • 0010344835 scopus 로고    scopus 로고
    • Poblano: A distributed trust model for peer-to-peer networks
    • Sun Microsystems, Inc
    • Chen, R., Yeager, W., 2001. Poblano: A distributed trust model for peer-to-peer networks. Tech. rep., Sun Microsystems, Inc.
    • (2001) Tech. Rep.
    • Chen, R.1    Yeager, W.2
  • 14
    • 51049122345 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure: Certificate and certificate revocation list (CRL) profile
    • RFC 5280, IETF Network Working Group
    • Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk., W., 2008. Internet X.509 public key infrastructure: Certificate and certificate revocation list (CRL) profile. Tech. Rep. RFC 5280, IETF Network Working Group.
    • (2008) Tech. Rep.
    • Cooper, D.1    Santesson, S.2    Farrell, S.3    Boeyen, S.4    Housley, R.5    Polk, W.6
  • 16
    • 2442549069 scopus 로고    scopus 로고
    • Uing trust for secure collaboration in uncertain environments
    • V. Cahill Uing trust for secure collaboration in uncertain environments IEEE Pervasive Computing 2 3 2003 52 61
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.3 , pp. 52-61
    • Cahill, V.1
  • 18
    • 37349052663 scopus 로고    scopus 로고
    • An omnipresent Formal Trust Model (FTM) for pervasive computing environment
    • DOI 10.1109/COMPSAC.2007.69, 4290983, Proceedings - 31st Annual International Computer Software and Applications Conference, COMPSAC 2007
    • Haque, M.M., Ahamed, S.I., 2007. An omnipresent formal trust model (ftm) for pervasive computing environment. In: 31st Annual International Computer Software and Applications Conference (COMPSAC 2007). Vol. 1. pp. 49-56. (Pubitemid 350301663)
    • (2007) Proceedings - International Computer Software and Applications Conference , vol.1 , pp. 49-56
    • Haque, M.M.1    Ahamed, S.I.2
  • 21
    • 42649129419 scopus 로고    scopus 로고
    • Future trust management framework for mobile ad hoc networks
    • DOI 10.1109/MCOM.2008.4481349
    • J. Li, R. Li, and J. Kato Future trust management framework for mobile ad hoc networks IEEE Communications Magazine 46 4 2008 108 114 (Pubitemid 351593416)
    • (2008) IEEE Communications Magazine , vol.46 , Issue.4 , pp. 108-114
    • Li, J.1    Li, R.2    Kato, J.3
  • 23
    • 2142692582 scopus 로고
    • John Wiley & Son
    • N. Luhmman Trust 1979 John Wiley & Son
    • (1979) Trust
    • Luhmman, N.1
  • 24
    • 0003839495 scopus 로고
    • April Ph.D. thesis, Dept. of Mathematics and Computer Science, University of Stirling
    • Marsh, S., April 1994. Formalising trust as a computational concept. Ph.D. thesis, Dept. of Mathematics and Computer Science, University of Stirling.
    • (1994) Formalising Trust As A Computational Concept
    • Marsh, S.1
  • 25
    • 84947294004 scopus 로고    scopus 로고
    • Modelling a Public-Key Infrastructure
    • U. Maurer Modelling a public-key infrastructure E. Bertino, European Symposium on Research in Computer Security (ESORICS' 96). Vol. 1146 of Lecture Notes in Computer Science 1996 Springer-Verlag 325 350 (Pubitemid 126128909)
    • (1996) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1146 , pp. 325-350
    • Maurer, U.1
  • 26
    • 0004143670 scopus 로고    scopus 로고
    • Trust or bust: Communicating trustworthiness in web design
    • March
    • Nielsen, J., March 1999. Trust or bust: Communicating trustworthiness in web design. Alertbox. URL http://www.useit.com/alertbox/990307.html.
    • (1999) Alertbox
    • Nielsen, J.1
  • 31
    • 71049117263 scopus 로고    scopus 로고
    • Trust and reputation policy-based mechanisms for self-protection in autonomic communications
    • June 2009
    • Serrano, M., van der Meer, S., Strassner, J., Paoli, S.D., Kerr, A., Storni, C., June 2009. Trust and reputation policy-based mechanisms for self-protection in autonomic communications. In: Autonomic and Trusted Computing. Vol. 5586/2009. pp. 249-267.
    • (2009) Autonomic and Trusted Computing , vol.5586 , pp. 249-267
    • Serrano, M.1    Van Der Meer, S.2    Strassner, J.3    Paoli, S.D.4    Kerr, A.5    Storni, C.6
  • 33
    • 57749085346 scopus 로고    scopus 로고
    • Simulations in wireless sensor and ad hoc networks: Matching and advancing models, metrics, and solutions
    • I. Stojmenovic Simulations in wireless sensor and ad hoc networks: matching and advancing models, metrics, and solutions IEEE Communications Magazine 46 12 2008 102 107
    • (2008) IEEE Communications Magazine , vol.46 , Issue.12 , pp. 102-107
    • Stojmenovic, I.1
  • 34
    • 56749140937 scopus 로고    scopus 로고
    • Defense of trust management vulnerabilities in distributed networks
    • Y. Sun, Z. Han, and K. Liu Defense of trust management vulnerabilities in distributed networks IEEE Communications Magazine 46 2 2008 112 119
    • (2008) IEEE Communications Magazine , vol.46 , Issue.2 , pp. 112-119
    • Sun, Y.1    Han, Z.2    Liu, K.3
  • 35
    • 33144465377 scopus 로고    scopus 로고
    • On trust models and trust evaluation metrics for ad hoc networks
    • DOI 10.1109/JSAC.2005.861390
    • G. Theodorakopoulos, and J.S. Baras On Trust Models and Trust Evaluation Metrics for Ad-Hoc Networks IEEE Journal on Selected Areas in Communications 24 2 2006 318 328 (Pubitemid 43269752)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 318-328
    • Theodorakopoulos, G.1    Baras, J.S.2
  • 36
    • 35048861563 scopus 로고    scopus 로고
    • Interaction trust evaluation in decentralized environments
    • Wang, Y., Varadharajan, V., 2004. Interaction trust evaluation in decentralized environments. In: EC-Web. pp. 144-153.
    • (2004) EC-Web , pp. 144-153
    • Wang, Y.1    Varadharajan, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.