메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1739-1745

A formal approach towards measuring trust in distributed systems

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL ENVIRONMENT; DISTRIBUTED SECURITY; DISTRIBUTED SERVICE; DISTRIBUTED SYSTEMS; FORMAL APPROACH; INFORMATION SHARING; NEW OPTIONS; PROPOSITIONAL LOGIC; RESOURCE UTILIZATIONS; SECURITY REQUIREMENTS; SERVICE PROVIDER; TRUST MEASUREMENT; TRUST METRICS; TRUST SERVICE;

EID: 79959305060     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1982185.1982548     Document Type: Conference Paper
Times cited : (30)

References (41)
  • 1
    • 84882651303 scopus 로고    scopus 로고
    • Why to adopt a security metric? A brief survey
    • 1st Workshop on Quality of Protection, Springer, September
    • A. Atzeni and A. Lioy. Why to adopt a security metric? A brief survey. In 1st Workshop on Quality of Protection, volume 23 of Advances in Information Security, pages 1-12. Springer, September 2005.
    • (2005) Advances in Information Security , vol.23 , pp. 1-12
    • Atzeni, A.1    Lioy, A.2
  • 8
    • 45449104627 scopus 로고    scopus 로고
    • On metrics and measurements
    • Springer
    • R. Böhme and F. Freiling. On metrics and measurements. In Dependability Metrics, pages 7-13. Springer, 2008.
    • (2008) Dependability Metrics , pp. 7-13
    • Böhme, R.1    Freiling, F.2
  • 9
    • 45449112776 scopus 로고    scopus 로고
    • Economic security metrics
    • I. Eusgeld, F. C. Freiling, and R. Reussner, editors
    • R. Böhme and T. Nowey. Economic security metrics. In I. Eusgeld, F. C. Freiling, and R. Reussner, editors, Dependability Metrics, pages 176-187, 2008.
    • (2008) Dependability Metrics , pp. 176-187
    • Böhme, R.1    Nowey, T.2
  • 10
    • 24744447668 scopus 로고    scopus 로고
    • A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks
    • S. Buchegger and J.-Y. Le Boudec. A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks. In P2PEcon 2004, 2004.
    • (2004) P2PEcon 2004
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 14
    • 0001387672 scopus 로고
    • Availability and reliability modeling for computer systems
    • D. Heimann and N. Mittal. Availability and reliability modeling for computer systems. Advances in Computers, 31:175-233, 1990.
    • (1990) Advances in Computers , vol.31 , pp. 175-233
    • Heimann, D.1    Mittal, N.2
  • 15
    • 0037600743 scopus 로고    scopus 로고
    • Optimal k out of n secret sharing schemes in visual cryptography
    • T. Hofmeister, M. Krause, and H. Simon. Optimal k out of n secret sharing schemes in visual cryptography. Theoretical Computer Science, 240:471-485, 2000.
    • (2000) Theoretical Computer Science , vol.240 , pp. 471-485
    • Hofmeister, T.1    Krause, M.2    Simon, H.3
  • 17
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • DOI 10.1016/j.dss.2005.05.019, PII S0167923605000849
    • A. Jøsang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2):618-644, 2007. (Pubitemid 46216533)
    • (2007) Decision Support Systems , vol.43 , Issue.2 , pp. 618-644
    • Josang, A.1    Ismail, R.2    Boyd, C.3
  • 22
    • 33947711207 scopus 로고    scopus 로고
    • Trust structures: Denotational and operational semantics
    • DOI 10.1007/s10207-007-0014-1
    • K. Krukow and M. Nielsen. Trust structures: Denotational and operational semantics. International Journal of Information Security, 6(2-3):153-181, 2007. (Pubitemid 46487968)
    • (2007) International Journal of Information Security , vol.6 , Issue.2-3 , pp. 153-181
    • Krukow, K.1    Nielsen, M.2
  • 23
    • 0000926365 scopus 로고    scopus 로고
    • Modelling a public-key infrastructure
    • Springer
    • U. Maurer. Modelling a public-key infrastructure. In Computer Security - ESORICS 96, pages 325-350. Springer, 1996.
    • (1996) Computer Security - ESORICS , vol.96 , pp. 325-350
    • Maurer, U.1
  • 24
    • 78650136374 scopus 로고    scopus 로고
    • Performance measurement guide for information security
    • NIST. May Revision 1
    • NIST. Performance measurement guide for information security, May 2008. NIST Special Publication 800-55 Revision 1.
    • (2008) NIST Special Publication 800-55
  • 26
    • 72949119922 scopus 로고    scopus 로고
    • Extending bayesian trust models regarding context-dependence and user friendly representation
    • ACM Press
    • S. Ries. Extending bayesian trust models regarding context-dependence and user friendly representation. In Proceedings of the 2009 ACM Symposium on Applied Computing. ACM Press, 2009.
    • (2009) Proceedings of the 2009 ACM Symposium on Applied Computing
    • Ries, S.1
  • 27
    • 78651467453 scopus 로고    scopus 로고
    • PhD thesis, Technische Universität Darmstadt
    • S. Ries. Trust in Ubiquitous Computing. PhD thesis, Technische Universität Darmstadt, 2009.
    • (2009) Trust in Ubiquitous Computing
    • Ries, S.1
  • 30
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • B. Schneier. Attack trees: Modeling security threats. Dr. Dobb's journal, 24:21-29, 1999.
    • (1999) Dr. Dobb's Journal , vol.24 , pp. 21-29
    • Schneier, B.1
  • 31
    • 70450263767 scopus 로고    scopus 로고
    • Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, the Netherlands, and Switzerland
    • G. Schryen and E. Rich. Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland. IEEE Transactions on Information Forensics & Security, 4(4):729-744, 2009.
    • (2009) IEEE Transactions on Information Forensics & Security , vol.4 , Issue.4 , pp. 729-744
    • Schryen, G.1    Rich, E.2
  • 32
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 34
    • 33645023169 scopus 로고    scopus 로고
    • TRAVOS: Trust and reputation in the context of inaccurate information sources
    • DOI 10.1007/s10458-006-5952-x
    • W. T. L. Teacy, J. Patel, N. R. Jennings, and M. Luck. TRAVOS: Trust and reputation in the context of inaccurate information sources. Autonomous Agents and Multi-Agent Systems, 12(2):183-198, 2006. (Pubitemid 43417510)
    • (2006) Autonomous Agents and Multi-Agent Systems , vol.12 , Issue.2 , pp. 183-198
    • Teacy, W.T.L.1    Patel, J.2    Jennings, N.R.3    Luck, M.4
  • 35
    • 58149465927 scopus 로고    scopus 로고
    • Multi-Criteria Decision Making Methods: A comparative Study
    • Springer
    • E. Triantaphyllou. Multi-Criteria Decision Making Methods: A comparative Study, volume 44 of Applied Optimization. Springer, 2000.
    • (2000) Applied Optimization , vol.44
    • Triantaphyllou, E.1
  • 37
    • 0000049121 scopus 로고    scopus 로고
    • Constructions and properties of k out of n visual secret sharing schemes
    • E. Verheul and H. van Tilborg. Constructions and properties of k out of n visual secret sharing schemes. Designs, Codes and Cryptography, 11(2):179-196, 1997.
    • (1997) Designs, Codes and Cryptography , vol.11 , Issue.2 , pp. 179-196
    • Verheul, E.1    Van Tilborg, H.2
  • 38
    • 77953008208 scopus 로고    scopus 로고
    • Determine the Resilience of Evaluated Internet Voting Systems
    • M. Volkamer and R. Grimm. Determine the Resilience of Evaluated Internet Voting Systems. In Proceedings of 1st RE-VOTE conference, pages 47-54, 2009.
    • (2009) Proceedings of 1st RE-VOTE Conference , pp. 47-54
    • Volkamer, M.1    Grimm, R.2
  • 40
    • 34250406938 scopus 로고
    • Fuzzy logic and approximate reasoning
    • L. A. Zadeh. Fuzzy logic and approximate reasoning. Synthese, 30:407-428, 1975.
    • (1975) Synthese , vol.30 , pp. 407-428
    • Zadeh, L.A.1
  • 41


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.