메뉴 건너뛰기




Volumn 61, Issue 3, 2011, Pages 495-510

Reflections on trust in devices: An informal survey of human trust in an Internet-of-Things context

Author keywords

Hardware; Internet of things; Software; Subjective logic; Trust

Indexed keywords

ESSENTIAL COMPONENT; INTERNET-OF-THINGS; RISK AVERSE; SUBJECTIVE LOGIC; TRUST;

EID: 83555166001     PISSN: 09296212     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11277-011-0386-4     Document Type: Conference Paper
Times cited : (49)

References (24)
  • 1
    • 84976781807 scopus 로고
    • Refelctions on trusting trust. Turing award lecture
    • 10.1145/358198.358210
    • K. Thompson 1984 Refelctions on trusting trust. Turing award lecture Communications of the ACM 27 8 761 763 10.1145/358198.358210
    • (1984) Communications of the ACM , vol.27 , Issue.8 , pp. 761-763
    • Thompson, K.1
  • 3
    • 67650336988 scopus 로고    scopus 로고
    • Open and closed systems are equivalent (that is, in an ideal world)
    • J. Feller Feller B. Fitzgerald S. A. Hissam K. R. Lakhani (eds). MIT Press Cambridge
    • Anderson R. (2005) Open and closed systems are equivalent (that is, in an ideal world). In: Feller Feller J., Fitzgerald B., Hissam S. A., Lakhani K. R. (eds) Perspectives on free and open source software. MIT Press, Cambridge
    • (2005) Perspectives on Free and Open Source Software
    • Anderson, R.1
  • 8
    • 76949093207 scopus 로고    scopus 로고
    • A survey of hardware Trojan taxonomy and detection
    • IEEE Computer Society
    • Tehranipoor, M. & Koushanfar, F. (2010). A survey of hardware Trojan taxonomy and detection. In Design & Test of Computers, 27(1), 10-25, IEEE Computer Society.
    • (2010) Design & Test of Computers , vol.27 , Issue.1 , pp. 10-25
    • Tehranipoor, M.1    Koushanfar, F.2
  • 13
    • 0009481412 scopus 로고    scopus 로고
    • A survey of trust in internet applications
    • IEEE Communications Society
    • Grandison, T. & Sloman, M. (2000). A survey of trust in internet applications. Communications Surveys & Tutorials, 3(4), 2-16. IEEE Communications Society.
    • (2000) Communications Surveys & Tutorials , vol.3 , Issue.4 , pp. 2-16
    • Grandison, T.1    Sloman, M.2
  • 14
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • IEEE Information Theory Society, March, 1983
    • Dolev, D. & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198-208. IEEE Information Theory Society, March, 1983.
    • (1983) IEEE Transactions on Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 15
    • 42149161709 scopus 로고    scopus 로고
    • The psychology of security
    • DOI 10.1145/1330311.1330320
    • R. West 2008 The psychology of security: Why do good users make bad decisions? Communications of the ACM 51 4 34 40 10.1145/1330311.1330320 (Pubitemid 351530776)
    • (2008) Communications of the ACM , vol.51 , Issue.4 , pp. 34-40
    • West, R.1
  • 18
    • 0004149207 scopus 로고    scopus 로고
    • Oxford University Press, England. 30th aniversary edition
    • Dawkins, R. (2006). The selfish gene. Oxford University Press, England. 30th aniversary edition.
    • (2006) The Selfish Gene
    • Dawkins, R.1
  • 19
    • 0003721795 scopus 로고    scopus 로고
    • Oxford University Press, England. Revised and corrected edition
    • Dawkins, R. (2008). The extended phenotype. Oxford University Press, England. Revised and corrected edition.
    • (2008) The Extended Phenotype
    • Dawkins, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.