-
1
-
-
84882651303
-
Why to adopt a security metric? A brief survey
-
1st Workshop on Quality of Protection, Springer, September
-
A. Atzeni and A. Lioy. Why to adopt a security metric? A brief survey. In 1st Workshop on Quality of Protection, volume 23 of Advances in Information Security, pages 1-12. Springer, September 2005.
-
(2005)
Advances in Information Security
, vol.23
, pp. 1-12
-
-
Atzeni, A.1
Lioy, A.2
-
3
-
-
35248892017
-
Trust-based service provider selection in open environments
-
ACM Press
-
H. Billhardt, R. Hermoso, S. Ossowski, and R. Centeno. Trust-based service provider selection in open environments. In SAC '07: Proceedings of the 2007 ACM Symposium on Applied Computing, pages 1375-1380. ACM Press, 2007.
-
(2007)
SAC '07: Proceedings of the 2007 ACM Symposium on Applied Computing
, pp. 1375-1380
-
-
Billhardt, H.1
Hermoso, R.2
Ossowski, S.3
Centeno, R.4
-
8
-
-
45449104627
-
On metrics and measurements
-
Springer
-
R. Böhme and F. Freiling. On metrics and measurements. In Dependability Metrics, pages 7-13. Springer, 2008.
-
(2008)
Dependability Metrics
, pp. 7-13
-
-
Böhme, R.1
Freiling, F.2
-
9
-
-
45449112776
-
Economic security metrics
-
I. Eusgeld, F. C. Freiling, and R. Reussner, editors
-
R. Böhme and T. Nowey. Economic security metrics. In I. Eusgeld, F. C. Freiling, and R. Reussner, editors, Dependability Metrics, pages 176-187, 2008.
-
(2008)
Dependability Metrics
, pp. 176-187
-
-
Böhme, R.1
Nowey, T.2
-
10
-
-
24744447668
-
A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks
-
S. Buchegger and J.-Y. Le Boudec. A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks. In P2PEcon 2004, 2004.
-
(2004)
P2PEcon 2004
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
12
-
-
37149024045
-
Design patterns: Abstraction and reuse of object-oriented design
-
Springer
-
E. Gamma, R. Helm, R. E. Johnson, and J. M. Vlissides. Design patterns: Abstraction and reuse of object-oriented design. In ECOOP '93: Proceedings of the 7th European Conference on Object-Oriented Programming, pages 406-431. Springer, 1993.
-
(1993)
ECOOP '93: Proceedings of the 7th European Conference on Object-Oriented Programming
, pp. 406-431
-
-
Gamma, E.1
Helm, R.2
Johnson, R.E.3
Vlissides, J.M.4
-
14
-
-
0001387672
-
Availability and reliability modeling for computer systems
-
D. Heimann and N. Mittal. Availability and reliability modeling for computer systems. Advances in Computers, 31:175-233, 1990.
-
(1990)
Advances in Computers
, vol.31
, pp. 175-233
-
-
Heimann, D.1
Mittal, N.2
-
15
-
-
0037600743
-
Optimal k out of n secret sharing schemes in visual cryptography
-
T. Hofmeister, M. Krause, and H. Simon. Optimal k out of n secret sharing schemes in visual cryptography. Theoretical Computer Science, 240:471-485, 2000.
-
(2000)
Theoretical Computer Science
, vol.240
, pp. 471-485
-
-
Hofmeister, T.1
Krause, M.2
Simon, H.3
-
17
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
DOI 10.1016/j.dss.2005.05.019, PII S0167923605000849
-
A. Jøsang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2):618-644, 2007. (Pubitemid 46216533)
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
21
-
-
44049085117
-
A trust evaluation method based on logic and probability theory
-
R. Kohlas, J. Jonczy, and R. Haenni. A trust evaluation method based on logic and probability theory. In 2nd Joint iTrust and PST Conferences on Privacy, Trust Management and Security, volume II, pages 17-32, 2008.
-
(2008)
2nd Joint iTrust and PST Conferences on Privacy, Trust Management and Security
, vol.2
, pp. 17-32
-
-
Kohlas, R.1
Jonczy, J.2
Haenni, R.3
-
22
-
-
33947711207
-
Trust structures: Denotational and operational semantics
-
DOI 10.1007/s10207-007-0014-1
-
K. Krukow and M. Nielsen. Trust structures: Denotational and operational semantics. International Journal of Information Security, 6(2-3):153-181, 2007. (Pubitemid 46487968)
-
(2007)
International Journal of Information Security
, vol.6
, Issue.2-3
, pp. 153-181
-
-
Krukow, K.1
Nielsen, M.2
-
23
-
-
0000926365
-
Modelling a public-key infrastructure
-
Springer
-
U. Maurer. Modelling a public-key infrastructure. In Computer Security - ESORICS 96, pages 325-350. Springer, 1996.
-
(1996)
Computer Security - ESORICS
, vol.96
, pp. 325-350
-
-
Maurer, U.1
-
24
-
-
78650136374
-
Performance measurement guide for information security
-
NIST. May Revision 1
-
NIST. Performance measurement guide for information security, May 2008. NIST Special Publication 800-55 Revision 1.
-
(2008)
NIST Special Publication 800-55
-
-
-
26
-
-
72949119922
-
Extending bayesian trust models regarding context-dependence and user friendly representation
-
ACM Press
-
S. Ries. Extending bayesian trust models regarding context-dependence and user friendly representation. In Proceedings of the 2009 ACM Symposium on Applied Computing. ACM Press, 2009.
-
(2009)
Proceedings of the 2009 ACM Symposium on Applied Computing
-
-
Ries, S.1
-
27
-
-
78651467453
-
-
PhD thesis, Technische Universität Darmstadt
-
S. Ries. Trust in Ubiquitous Computing. PhD thesis, Technische Universität Darmstadt, 2009.
-
(2009)
Trust in Ubiquitous Computing
-
-
Ries, S.1
-
30
-
-
0002670359
-
Attack trees: Modeling security threats
-
B. Schneier. Attack trees: Modeling security threats. Dr. Dobb's journal, 24:21-29, 1999.
-
(1999)
Dr. Dobb's Journal
, vol.24
, pp. 21-29
-
-
Schneier, B.1
-
31
-
-
70450263767
-
Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, the Netherlands, and Switzerland
-
G. Schryen and E. Rich. Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. IEEE Transactions on Information Forensics & Security, 4(4):729-744, 2009.
-
(2009)
IEEE Transactions on Information Forensics & Security
, vol.4
, Issue.4
, pp. 729-744
-
-
Schryen, G.1
Rich, E.2
-
32
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
34
-
-
33645023169
-
TRAVOS: Trust and reputation in the context of inaccurate information sources
-
DOI 10.1007/s10458-006-5952-x
-
W. T. L. Teacy, J. Patel, N. R. Jennings, and M. Luck. TRAVOS: Trust and reputation in the context of inaccurate information sources. Autonomous Agents and Multi-Agent Systems, 12(2):183-198, 2006. (Pubitemid 43417510)
-
(2006)
Autonomous Agents and Multi-Agent Systems
, vol.12
, Issue.2
, pp. 183-198
-
-
Teacy, W.T.L.1
Patel, J.2
Jennings, N.R.3
Luck, M.4
-
35
-
-
58149465927
-
Multi-Criteria Decision Making Methods: A comparative Study
-
Springer
-
E. Triantaphyllou. Multi-Criteria Decision Making Methods: A comparative Study, volume 44 of Applied Optimization. Springer, 2000.
-
(2000)
Applied Optimization
, vol.44
-
-
Triantaphyllou, E.1
-
37
-
-
0000049121
-
Constructions and properties of k out of n visual secret sharing schemes
-
E. Verheul and H. van Tilborg. Constructions and properties of k out of n visual secret sharing schemes. Designs, Codes and Cryptography, 11(2):179-196, 1997.
-
(1997)
Designs, Codes and Cryptography
, vol.11
, Issue.2
, pp. 179-196
-
-
Verheul, E.1
Van Tilborg, H.2
-
38
-
-
77953008208
-
Determine the Resilience of Evaluated Internet Voting Systems
-
M. Volkamer and R. Grimm. Determine the Resilience of Evaluated Internet Voting Systems. In Proceedings of 1st RE-VOTE conference, pages 47-54, 2009.
-
(2009)
Proceedings of 1st RE-VOTE Conference
, pp. 47-54
-
-
Volkamer, M.1
Grimm, R.2
-
39
-
-
28444463801
-
Filtering out unfair ratings in bayesian reputation systems
-
A. Whitby, A. Jøsang, and J. Indulska. Filtering out unfair ratings in bayesian reputation systems. The ICFAIN Journal of Management Research, 4(2):48-64, 2005.
-
(2005)
The ICFAIN Journal of Management Research
, vol.4
, Issue.2
, pp. 48-64
-
-
Whitby, A.1
Jøsang, A.2
Indulska, J.3
-
40
-
-
34250406938
-
Fuzzy logic and approximate reasoning
-
L. A. Zadeh. Fuzzy logic and approximate reasoning. Synthese, 30:407-428, 1975.
-
(1975)
Synthese
, vol.30
, pp. 407-428
-
-
Zadeh, L.A.1
|