-
1
-
-
48549088586
-
Trust Management in Wireless Sensor Networks
-
Jing, Q.; Tang, L.Y.; Chen, Z. Trust Management in Wireless Sensor Networks. J. Softw. 2008, 19, 1716-1730.
-
(2008)
J. Softw.
, vol.19
, pp. 1716-1730
-
-
Jing, Q.1
Tang, L.Y.2
Chen, Z.3
-
2
-
-
0029700344
-
Decentralized Trust Management
-
In, Oakland, CA, USA, May
-
Blaze, M.; Feigenbaum, J.; Lacy, J. Decentralized Trust Management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2002; pp. 164-173.
-
(2002)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
3
-
-
0003593599
-
-
Available online:, (accessed on 9 December 2010)
-
Ellison, C.M.; Frantz, B.; Lampson, B.; Rivest, R.; Thomas, B.M.; Ylonen, T. Simple Public Key Infrastructure Certificate Theory; Available online: http://www.ietf.org/ietf/1id-abstracts.txt (accessed on 9 December 2010).
-
Simple Public Key Infrastructure Certificate Theory
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.M.5
Ylonen, T.6
-
4
-
-
62349090353
-
RT: A Role-Based Trust-management Framework
-
In, Washington, DC, USA, April
-
Li, N.H.; Mitchell, J.C. RT: A Role-Based Trust-management Framework. In Proceedings of the 3rd DARPA Information Survivability Conference and Exposition, Washington, DC, USA, April 2003; pp. 201-212.
-
(2003)
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition
, pp. 201-212
-
-
Li, N.H.1
Mitchell, J.C.2
-
5
-
-
30544438141
-
Beyond Proof-of-Compliance: Security Analysis in Trust Management
-
Li, N.H.; Mitchell, J.C.; Winsborough, W.H. Beyond Proof-of-Compliance: Security Analysis in Trust Management. J. ACM 2005, 52, 474-514.
-
(2005)
J. ACM
, vol.52
, pp. 474-514
-
-
Li, N.H.1
Mitchell, J.C.2
Winsborough, W.H.3
-
6
-
-
26844545857
-
Towards an Ontology of Trust
-
In, Copenhagen, Denmark, 22-26 August
-
Viljanen, L. Towards an Ontology of Trust. In Proceedings of the TrustBus 2005, LNCS 3592, Copenhagen, Denmark, 22-26 August 2005; pp. 175-184.
-
(2005)
Proceedings of the TrustBus 2005, LNCS 3592
, pp. 175-184
-
-
Viljanen, L.1
-
7
-
-
33751026432
-
A Framework for Trust-based Cluster Head Election in Wireless Sensor Networks
-
In, Columbia, MD, USA, April
-
Crosby, G.V.; Pissinou, N.; Gadze, J. A Framework for Trust-based Cluster Head Election in Wireless Sensor Networks. In Proceedings of Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems, Columbia, MD, USA, April 2006; pp. 13-22.
-
(2006)
Proceedings of Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems
, pp. 13-22
-
-
Crosby, G.V.1
Pissinou, N.2
Gadze, J.3
-
8
-
-
44849093503
-
Reputation-Based Framework for High Integrity Sensor Networks
-
Ganeriwal, S.; Balzano, L.K.; Srivastava, M.B. Reputation-Based Framework for High Integrity Sensor Networks. ACM Trans. Sens. Netw. 2008, 4, 1-37.
-
(2008)
ACM Trans. Sens. Netw.
, vol.4
, pp. 1-37
-
-
Ganeriwal, S.1
Balzano, L.K.2
Srivastava, M.B.3
-
9
-
-
27744464611
-
Research on a Fuzzy Logic-Based Subjective Trust Management Model
-
Tang, W.; Hu, J.B.; Chen, Z. Research on a Fuzzy Logic-Based Subjective Trust Management Model. J. Comput. Res. Develop. 2005, 42, 1654-1659.
-
(2005)
J. Comput. Res. Develop.
, vol.42
, pp. 1654-1659
-
-
Tang, W.1
Hu, J.B.2
Chen, Z.3
-
10
-
-
27544433189
-
TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks
-
In, Yokohama, Japan, June
-
Krasniewski, M.; Varadharajan, P.; Rabeler, B.; Bagchi, S.; Hu, Y.C. TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks. In Proceedings of the 2005 International Conference on Dependable Systems and Networks, Yokohama, Japan, June 2005; pp. 672-681.
-
(2005)
Proceedings of the 2005 International Conference on Dependable Systems and Networks
, pp. 672-681
-
-
Krasniewski, M.1
Varadharajan, P.2
Rabeler, B.3
Bagchi, S.4
Hu, Y.C.5
-
11
-
-
62349135780
-
Trust-Based LEACH Protocol for Wireless Sensor Networks
-
In, Yokohama, Japan, 13-15 December
-
Song, F.; Zhao, B.H. Trust-Based LEACH Protocol for Wireless Sensor Networks. In Proceedings of the Second International Conference on Future Generation Communication and Networking, Yokohama, Japan, 13-15 December 2008; pp. 202-207.
-
(2008)
Proceedings of the Second International Conference on Future Generation Communication and Networking
, pp. 202-207
-
-
Song, F.1
Zhao, B.H.2
-
12
-
-
18844362199
-
Secure Locations: Routing on Trust and Isolating Compromised Sensors in Location-aware Sensor Networks
-
In, Los Angeles, CA, USA, November
-
Tanachaiwiwat, S.; Dave, P.; Bhindwale, R.; Helmy, A. Secure Locations: Routing on Trust and Isolating Compromised Sensors in Location-aware Sensor Networks. In Proceedings of the SenSys, Los Angeles, CA, USA, November 2003; pp. 324-325.
-
(2003)
Proceedings of the SenSys
, pp. 324-325
-
-
Tanachaiwiwat, S.1
Dave, P.2
Bhindwale, R.3
Helmy, A.4
-
13
-
-
2442519150
-
Location-Centric Isolation of Misbehavior and Trust Routing in Energy-Constrained Sensor Networks
-
In, Phoenix, AZ, USA, 15-17 April
-
Tanachaiwiwat, S.; Dave, P.; Bhindwale, R.; Helmy, A. Location-Centric Isolation of Misbehavior and Trust Routing in Energy-Constrained Sensor Networks. In Proceedings of the 23rd IEEE International Performance, Computing, and Communications Conference, Phoenix, AZ, USA, 15-17 April 2004; pp. 463-469.
-
(2004)
Proceedings of the 23rd IEEE International Performance, Computing, and Communications Conference
, pp. 463-469
-
-
Tanachaiwiwat, S.1
Dave, P.2
Bhindwale, R.3
Helmy, A.4
-
14
-
-
33745820773
-
Trust Management for Resilient Wireless Sensor Networks
-
In, Seoul, Korea, December
-
Hur, J.; Lee, Y.; Hong, S.M.; Yoon, H. Trust Management for Resilient Wireless Sensor Networks. In Proceedings of the 8th International Conference on Information Security an Cryptology, Seoul, Korea, December 2005; pp. 56-68.
-
(2005)
Proceedings of the 8th International Conference on Information Security an Cryptology
, pp. 56-68
-
-
Hur, J.1
Lee, Y.2
Hong, S.M.3
Yoon, H.4
-
15
-
-
33744987127
-
Trust Evaluation Model for Wireless Sensor Networks
-
In, Phoenix Park, Korea, 21-23 February
-
Hur, J.; Lee, Y.; Yoon, H.; Choi, D.; Jun, S.; Trust Evaluation Model for Wireless Sensor Networks. In Proceedings of the 7th International Conference on Advanced Communication Technology, Phoenix Park, Korea, 21-23 February 2005; pp. 491-496.
-
(2005)
Proceedings of the 7th International Conference on Advanced Communication Technology
, pp. 491-496
-
-
Hur, J.1
Lee, Y.2
Yoon, H.3
Choi, D.4
Jun, S.5
-
16
-
-
33750328371
-
Developing a Model for Trust Management in Pervasive Devices
-
In, Pisa, Italy, March
-
Almenarez, F.; Marin, A.; Diaz, D.; Sanchez, J. Developing a Model for Trust Management in Pervasive Devices. In Proceedings of 4th IEEE Annual International Conference on Pervasive Computing and Communications, Pisa, Italy, March 2006; pp. 267-271.
-
(2006)
Proceedings of 4th IEEE Annual International Conference on Pervasive Computing and Communications
, pp. 267-271
-
-
Almenarez, F.1
Marin, A.2
Diaz, D.3
Sanchez, J.4
-
17
-
-
34447127497
-
PTM: A Pervasive Trust Management Model for Dynamic Open Environments
-
In, Boston, MA, USA, August
-
Almenarez, F.; Marin, A.; Campo, C.; Garcia, R.C. PTM: A Pervasive Trust Management Model for Dynamic Open Environments. In Proceedings of the 1st Workshop on Pervasive Security, Privacy and Trust, Boston, MA, USA, August 2004.
-
(2004)
Proceedings of the 1st Workshop on Pervasive Security, Privacy and Trust
-
-
Almenarez, F.1
Marin, A.2
Campo, C.3
Garcia, R.C.4
-
18
-
-
24644518659
-
TrustAC: Trust-based Access Control for Pervasive Devices
-
In, Boppard, Germany, April
-
Almenarez, F.; Marin, A.; Campo, C.; Garcia, R.C. TrustAC: Trust-based Access Control for Pervasive Devices. In Proceedings of the 2nd International Conference on Security in Pervasive Computing, Boppard, Germany, April 2005; pp. 225-238.
-
(2005)
Proceedings of the 2nd International Conference on Security in Pervasive Computing
, pp. 225-238
-
-
Almenarez, F.1
Marin, A.2
Campo, C.3
Garcia, R.C.4
-
19
-
-
34548020232
-
Adaptive Security Design with Malicious Node Detection in Cluster-Based Sensor Networks
-
Hsieh, M.Y.; Huang, Y.M.; Chao, H.C. Adaptive Security Design with Malicious Node Detection in Cluster-Based Sensor Networks. Comput. Commun. 2007, 30, 2385-2400.
-
(2007)
Comput. Commun.
, vol.30
, pp. 2385-2400
-
-
Hsieh, M.Y.1
Huang, Y.M.2
Chao, H.C.3
-
20
-
-
77950627981
-
Towards Pre-standardization of Trust and Reputation Models for Distributed and Heterogeneous Systems
-
Marmol, F.G.; Perez, G.M. Towards Pre-standardization of Trust and Reputation Models for Distributed and Heterogeneous Systems. Comput. Stand. Interfaces 2010, 32, 185-196.
-
(2010)
Comput. Stand. Interfaces
, vol.32
, pp. 185-196
-
-
Marmol, F.G.1
Perez, G.M.2
-
21
-
-
77950866308
-
Trust Management Systems for Wireless Sensor Networks: Best Practices
-
Lopez, J.; Roman, R.; Agudo, I.; Fernandez, C.G. Trust Management Systems for Wireless Sensor Networks: Best Practices. Comput. Commun. 2010, 33, 1086-1093.
-
(2010)
Comput. Commun.
, vol.33
, pp. 1086-1093
-
-
Lopez, J.1
Roman, R.2
Agudo, I.3
Fernandez, C.G.4
-
22
-
-
65549131141
-
A New Trust Management Model for P2P Networks
-
Li, J.L.; Gu, L.Z.; Yang, Y.X. A New Trust Management Model for P2P Networks. J. Beijing Univ. Posts Telecommun. 2009, 32, 71-74.
-
(2009)
J. Beijing Univ. Posts Telecommun.
, vol.32
, pp. 71-74
-
-
Li, J.L.1
Gu, L.Z.2
Yang, Y.X.3
-
23
-
-
71949099223
-
A New Trust Management Model for P2P Networks with Time Self-Decay and Subjective Expect
-
Li, J.L.; Gu, L.Z.; Yang, Y.X. A New Trust Management Model for P2P Networks with Time Self-Decay and Subjective Expect. J. Electron. Inf. Technol. 2009, 31, 2786-2790.
-
(2009)
J. Electron. Inf. Technol.
, vol.31
, pp. 2786-2790
-
-
Li, J.L.1
Gu, L.Z.2
Yang, Y.X.3
-
24
-
-
70349257589
-
Behavior-Driven Role-Based Trust Management
-
Li, L.; Fan, L.; Hui, H. Behavior-Driven Role-Based Trust Management. J. Softw. 2009, 20, 2298-2306.
-
(2009)
J. Softw.
, vol.20
, pp. 2298-2306
-
-
Li, L.1
Fan, L.2
Hui, H.3
-
25
-
-
0000516376
-
Upper and Lower Probabilities Induced by Multivalued Mapping
-
Dempster, A. Upper and Lower Probabilities Induced by Multivalued Mapping. Ann. Math. Stat. 1967, 38, 325-339.
-
(1967)
Ann. Math. Stat.
, vol.38
, pp. 325-339
-
-
Dempster, A.1
-
26
-
-
62549090256
-
A Pipeline Leakage Diagnosis for Fusing Neural Network and Evidence Theory
-
Chen, B.; Wan, J.W.; Wu, Y.F. A Pipeline Leakage Diagnosis for Fusing Neural Network and Evidence Theory. J. Beijing Univ. Posts Telecommun. 2009, 32, 5-9.
-
(2009)
J. Beijing Univ. Posts Telecommun.
, vol.32
, pp. 5-9
-
-
Chen, B.1
Wan, J.W.2
Wu, Y.F.3
|