메뉴 건너뛰기




Volumn 14, Issue 3, 2012, Pages 911-940

A survey of trust in workflows and relevant contexts

Author keywords

Security; Trust; Wowkflows

Indexed keywords

CONTENT PROVIDERS; DISTRIBUTED ENVIRONMENTS; EFFECTIVE MECHANISMS; HETEROGENEOUS DOMAINS; INTERNET TECHNOLOGY; PEER TO PEER; POOR PERFORMANCE; SECURITY; SECURITY POLICY; SECURITY SOLUTIONS; SERVICE LEVEL AGREEMENTS; SERVICE-BASED; SERVICE-WORKFLOW; STANDARD DEVELOPMENT; TRUST; VIRTUAL ORGANIZATION; WORK-FLOWS; WOWKFLOWS;

EID: 84864579042     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2011.072811.00081     Document Type: Review
Times cited : (49)

References (230)
  • 3
    • 0029736456 scopus 로고    scopus 로고
    • Object-oriented workflow technology in inconcert
    • S. K. Sarin, "Object-oriented workflow technology in inconcert," in COMPCON, pp. 446-450, 1996.
    • (1996) COMPCON , pp. 446-450
    • Sarin, S.K.1
  • 4
    • 0030408743 scopus 로고    scopus 로고
    • Generalized process structure grammars gpsg for flexible representations of work
    • D. S. Pagani and R. Pareschi, "Generalized process structure grammars gpsg for flexible representations of work," in Conference on Computer Supported Cooperative Work, pp. 180-189, 1996.
    • (1996) Conference on Computer Supported Cooperative Work , pp. 180-189
    • Pagani, D.S.1    Pareschi, R.2
  • 11
    • 0009481412 scopus 로고    scopus 로고
    • A survey of trust in internet applications
    • T. Grandison and M. Sloman, "A survey of trust in internet applications," IEEE Commun. Surveys Tutorials, vol. 3, no. 4, pp. 2-16, 2000.
    • (2000) IEEE Commun. Surveys Tutorials , vol.3 , Issue.4 , pp. 2-16
    • Grandison, T.1    Sloman, M.2
  • 13
    • 80054063079 scopus 로고    scopus 로고
    • A survey on distributed access control systems for web business processes
    • H. Koshutanski, "A survey on distributed access control systems for web business processes," I. J. Network Security, vol. 9, no. 1, pp. 61-69, 2009.
    • (2009) I. J. Network Security , vol.9 , Issue.1 , pp. 61-69
    • Koshutanski, H.1
  • 15
    • 34249811174 scopus 로고    scopus 로고
    • A survey of trust in computer science and the Semantic Web
    • DOI 10.1016/j.websem.2007.03.002, PII S1570826807000133, Software Engineering and the Semantic Web
    • D. Artz and Y. Gil, "A survey of trust in computer science and the semantic web," Web Semant., vol. 5, pp. 58-71, June 2007. (Pubitemid 46856280)
    • (2007) Web Semantics , vol.5 , Issue.2 , pp. 58-71
    • Artz, D.1    Gil, Y.2
  • 16
    • 0348155801 scopus 로고    scopus 로고
    • Comparing Petri Net and Activity Diagram Variants for Workflow Modelling - A Quest for Reactive Petri Nets
    • Petri Net Technology for Communication-Based Systems
    • R. Eshuis and R. Wieringa, "Comparing petri net and activity diagram variants for workflow modelling-a quest for reactive petri nets," in DFG Projects, pp. 321-351, 2003. (Pubitemid 37528818)
    • (2003) Lecture Notes in Computer Science , Issue.2472 , pp. 321-351
    • Eshuis, R.1    Wieringa, R.2
  • 17
    • 3042685974 scopus 로고    scopus 로고
    • A grid workflow management architecture
    • D. Marinescu, "A grid workflow management architecture," GGF White Paper, 2002.
    • (2002) GGF White Paper
    • Marinescu, D.1
  • 19
    • 0345359315 scopus 로고    scopus 로고
    • Mygrid: Personalised bioinformatics on the information grid
    • R. D. Stevens, A. J. Robinson, and C. A. Goble, "myGrid: personalised bioinformatics on the information grid.," Bioinformatics, vol. 19 Suppl 1, 2003.
    • (2003) Bioinformatics , vol.19 , Issue.SUPPL. 1
    • Stevens, R.D.1    Robinson, A.J.2    Goble, C.A.3
  • 22
  • 23
    • 36348939830 scopus 로고    scopus 로고
    • Provisioning heterogeneous and unreliable providers for service workflows
    • AAAI-07/IAAI-07 Proceedings: 22nd AAAI Conference on Artificial Intelligence and the 19th Innovative Applications of Artificial Intelligence Conference
    • S. Stein, N. R. Jennings, and T. R. Payne, "Provisioning heterogeneous and unreliable providers for service workflows," in National Conference on Artificial Intelligence, pp. 1452-1458, 2007. (Pubitemid 350149771)
    • (2007) Proceedings of the National Conference on Artificial Intelligence , vol.2 , pp. 1452-1458
    • Stein, S.1    Jennings, N.R.2    Payne, T.R.3
  • 24
    • 33747466065 scopus 로고    scopus 로고
    • A security interpretation of the workflow reference model
    • (R. v. Solms and J. H. Eloff, eds.) 2 of Information Security-from Small Systems to Management of Infrastructures, (Vienna, Austria) 2 Sep
    • R. A. Botha and J. H. Eloff, "A security interpretation of the workflow reference model," in Proceedings of WG 11.2 and WG 11.1 of IFIP TC11 (R. v. Solms and J. H. Eloff, eds.), vol. 2 of Information Security-from Small Systems to Management of Infrastructures, (Vienna, Austria), pp. 43-50, 2 Sep 1998.
    • (1998) Proceedings of WG 11.2 and WG 11.1 of IFIP TC11 , pp. 43-50
    • Botha, R.A.1    Eloff, J.H.2
  • 25
    • 46849102755 scopus 로고    scopus 로고
    • Quantifying trust through delegation in service oriented architecture
    • Z. Xie and C.-H. Chi, "Quantifying trust through delegation in service oriented architecture," in Proc. IEEE Congress Services, pp. 308-315, 2007.
    • (2007) Proc. IEEE Congress Services , pp. 308-315
    • Xie, Z.1    Chi, C.-H.2
  • 26
    • 31444436554 scopus 로고    scopus 로고
    • A taxonomy of scientific workflow systems for grid computing
    • DOI 10.1145/1084805.1084814
    • J. Yu and R. Buyya, "A taxonomy of scientific workflow systems for grid computing," SIGMOD Rec., vol. 34, pp. 44-49, September 2005. (Pubitemid 43152531)
    • (2005) SIGMOD Record , vol.34 , Issue.3 , pp. 44-49
    • Yu, J.1    Buyya, R.2
  • 28
    • 58249141782 scopus 로고    scopus 로고
    • Managing trust in medical information systems
    • M. Blaze, J. Feigenbaum, and J. Lacy, "Managing trust in medical information systems," tech. rep., 1996.
    • (1996) Tech. rep.
    • Blaze, M.1    Feigenbaum, J.2    Lacy, J.3
  • 37
    • 0031208615 scopus 로고    scopus 로고
    • An international collaboratory based on virtual patient records
    • August
    • D. G. Kilman and D. W. Forslund, "An international collaboratory based on virtual patient records," Commun. ACM, vol. 40, pp. 110-117, August 1997.
    • (1997) Commun. ACM , vol.40 , pp. 110-117
    • Kilman, D.G.1    Forslund, D.W.2
  • 40
  • 45
    • 84864627724 scopus 로고    scopus 로고
    • tech. rep., School of Computer Studies, Research Report Series, Report 98.27, University of Leeds
    • L. Lau and B. Whyte, "Technological aspects of trust in virtual organisations," tech. rep., School of Computer Studies, Research Report Series, Report 98.27, University of Leeds, 1998.
    • (1998) Technological aspects of trust in virtual organisations
    • Lau, L.1    Whyte, B.2
  • 51
    • 84864575362 scopus 로고
    • Department of defense trusted computer system evaluation criteria
    • "Department of defense trusted computer system evaluation criteria," 1985.
    • (1985)
  • 52
    • 33646562485 scopus 로고    scopus 로고
    • Why Trust is Bad for Security
    • DOI 10.1016/j.entcs.2005.09.044, PII S1571066106002891
    • D. Gollmann, "Why trust is bad for security," Electron. Notes Theor. Comput. Sci., vol. 157, pp. 3-9, May 2006. (Pubitemid 43728535)
    • (2006) Electronic Notes in Theoretical Computer Science , vol.157 , Issue.3 , pp. 3-9
    • Gollmann, D.1
  • 55
    • 0029216014 scopus 로고
    • New thinking about information technology security
    • M. D. Abrams and M. V. Joyce, "New thinking about information technology security," Computers & Security, vol. 14, pp. 69-81, 1995.
    • (1995) Computers & Security , vol.14 , pp. 69-81
    • Abrams, M.D.1    Joyce, M.V.2
  • 59
    • 54949138430 scopus 로고    scopus 로고
    • Types for task-based access control in workflow systems
    • Y. Lu, L. Zhang, and J. Sun, "Types for task-based access control in workflow systems," IET Software, vol. 2, no. 5, pp. 461-473, 2008.
    • (2008) IET Software , vol.2 , Issue.5 , pp. 461-473
    • Lu, Y.1    Zhang, L.2    Sun, J.3
  • 60
    • 35248884516 scopus 로고    scopus 로고
    • Statistical trustability (conceptual work)
    • R. Kalcklšch and K. Herrmann, "Statistical trustability (conceptual work)," in iTrust, pp. 271-274, 2003.
    • (2003) ITrust , pp. 271-274
    • Kalcklšch, R.1    Herrmann, K.2
  • 69
    • 33646146709 scopus 로고    scopus 로고
    • Trust by workflow in autonomic communication
    • M. I. Smirnov, "Trust by workflow in autonomic communication," in MMM-ACNS, pp. 136-150, 2005.
    • (2005) MMM-ACNS , pp. 136-150
    • Smirnov, M.I.1
  • 70
    • 34247126970 scopus 로고    scopus 로고
    • Dynamic workflow change in PDM systems
    • DOI 10.1016/j.compind.2006.09.014, PII S0166361506001631
    • Z. M. Qiu and Y. S. Wong, "Dynamic workflow change in pdm systems," Comput. Ind., vol. 58, pp. 453-463, June 2007. (Pubitemid 46590430)
    • (2007) Computers in Industry , vol.58 , Issue.5 , pp. 453-463
    • Qiu, Z.M.1    Wong, Y.S.2
  • 72
    • 84864613573 scopus 로고    scopus 로고
    • An extended petri net model for supporting workflows in a multilevel secure environment
    • in P. Samarati and R.S. Sandhu Hall
    • V. Atluri and W. kuang Huang, "An extended petri net model for supporting workflows in a multilevel secure environment," in in P. Samarati and R.S. Sandhu, Database Security X: Status and Prospects, Chapman, pp. 199-216, Hall, 1996.
    • (1996) Database Security X: Status and Prospects, Chapman , pp. 199-216
    • Atluri, V.1    Kuang Huang, W.2
  • 76
    • 0036161253 scopus 로고    scopus 로고
    • Authorization and access control of application data in workflow systems
    • DOI 10.1023/A:1012972608697
    • S. Wu, A. Sheth, J. Miller, and Z. Luo, "Authorization and access control of application data in workflow systems," J. Intell. Inf. Syst., vol. 18, pp. 71-94, January 2002. (Pubitemid 34129948)
    • (2002) Journal of Intelligent Information Systems , vol.18 , Issue.1 , pp. 71-94
    • Wu, S.1    Sheth, A.2    Miller, J.3    Luo, Z.4
  • 78
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • February
    • E. Bertino, E. Ferrari, and V. Atluri, "The specification and enforcement of authorization constraints in workflow management systems," ACM Trans. Inf. Syst. Secur., vol. 2, pp. 65-104, February 1999.
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 79
    • 33747074188 scopus 로고
    • An overview of workflow management: From process modeling to workflow automation infrastructure
    • April
    • D. Georgakopoulos, M. Hornick, and A. Sheth, "An overview of workflow management: from process modeling to workflow automation infrastructure," Distrib. Parallel Databases, vol. 3, pp. 119-153, April 1995.
    • (1995) Distrib. Parallel Databases , vol.3 , pp. 119-153
    • Georgakopoulos, D.1    Hornick, M.2    Sheth, A.3
  • 80
  • 82
    • 0032223756 scopus 로고    scopus 로고
    • Is anybody out there?: Antecedents of trust in global virtual teams
    • March
    • S. L. Jarvenpaa, K. Knoll, and D. E. Leidner, "Is anybody out there?: antecedents of trust in global virtual teams," J. Manage. Inf. Syst., vol. 14, pp. 29-64, March 1998.
    • (1998) J. Manage. Inf. Syst. , vol.14 , pp. 29-64
    • Jarvenpaa, S.L.1    Knoll, K.2    Leidner, D.E.3
  • 83
    • 0033265783 scopus 로고    scopus 로고
    • Communication and trust in global virtual teams
    • June
    • S. L. Jarvenpaa and D. E. Leidner, "Communication and trust in global virtual teams," Organization Science, vol. 10, pp. 791-815, June 1999.
    • (1999) Organization Science , vol.10 , pp. 791-815
    • Jarvenpaa, S.L.1    Leidner, D.E.2
  • 84
    • 0142250285 scopus 로고    scopus 로고
    • Flexible regulation of distributed coalitions
    • Computer Security - ESORICS 2003
    • X. Ao and N. H. Minsky, "Flexible regulation of distributed coalitions," in European Symposium on Research in Computer Security, pp. 39-60, 2003. (Pubitemid 37311862)
    • (2003) Lecture Notes in Computer Science , Issue.2808 , pp. 39-60
    • Ao, X.1    Minsky, N.H.2
  • 85
    • 72849147121 scopus 로고    scopus 로고
    • Modeling delegation in requirements.-driven trust framework
    • W. Viriyasitavat, "Modeling delegation in requirementS.-driven trust framework," in Proc. World Conf. ServiceS.-I, pp. 522-529, 2009.
    • (2009) Proc. World Conf. Services , vol.1 , pp. 522-529
    • Viriyasitavat, W.1
  • 89
    • 84948960269 scopus 로고    scopus 로고
    • A formal foundation for distributed work flow execution based on state charts
    • Database Theory - ICDT '97
    • D. Wodtke and G. Weikum, "A formal foundation for distributed workflow execution based on state charts," in International Conference on Database Theory, pp. 230-246, 1997. (Pubitemid 127013756)
    • (1997) Lecture Notes in Computer Science , Issue.1186 , pp. 230-246
    • Wodtke, D.1    Weikum, G.2
  • 97
    • 29844444091 scopus 로고    scopus 로고
    • Propagation models for trust and distrust in social networks
    • DOI 10.1007/s10796-005-4807-3
    • C. nicolas Ziegler and G. Lausen, "Propagation models for trust and distrust in social networks," Information Systems Frontiers, vol. 7, pp. 337-358, 2005. (Pubitemid 43037076)
    • (2005) Information Systems Frontiers , vol.7 , Issue.4-5 , pp. 337-358
    • Ziegler, C.-N.1    Lausen, G.2
  • 100
    • 70450214119 scopus 로고    scopus 로고
    • An ontology of trust - Formal semantics and transitivity
    • DOI 10.1145/1151454.1151499, Proc. of the 8th Int. Conf. on Electronic Commerce 2006 - The New E-Commerce: Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet
    • J. Huang and M. S. Fox, "An ontology of trust: formal semantics and transitivity," in International Conference on Electronic Commerce, pp. 259-270, 2006. (Pubitemid 47140666)
    • (2006) Proceedings of the ACM Conference on Electronic Commerce , pp. 259-270
    • Huang, J.1    Fox, M.S.2
  • 102
    • 31444456909 scopus 로고    scopus 로고
    • A survey of data provenance in e-science
    • DOI 10.1145/1084805.1084812
    • Y. L. Simmhan, B. Plale, and D. Gannon, "A survey of data provenance in e-science," Sigmod Record, vol. 34, pp. 31-36, 2005. (Pubitemid 43152529)
    • (2005) SIGMOD Record , vol.34 , Issue.3 , pp. 31-36
    • Simmhan, Y.L.1    Plale, B.2    Gannon, D.3
  • 103
    • 44149113078 scopus 로고    scopus 로고
    • Trust type based semantic Web services assessment and selection
    • DOI 10.1109/ICACT.2008.4494190, 4494190, 10th International Conference on Advanced Communication Technology, ICACT 2008 - Proceedings
    • Y. Kim and K.-G. Doh, "Trust type based semantic web services assessment and selection," in Proc. 10th Int. Conf. Advanced Communication Technology ICACT 2008, vol. 3, pp. 2048-2053, 2008. (Pubitemid 351714918)
    • (2008) International Conference on Advanced Communication Technology, ICACT , vol.3 , pp. 2048-2053
    • Kim, Y.1    Doh, K.-G.2
  • 105
    • 79951870161 scopus 로고    scopus 로고
    • Trustworthy service selection and composition
    • 17 February 2011
    • C.-W. Hang and M. P. Singh, "Trustworthy service selection and composition," ACM Trans. Auton. Adapt. Syst., vol. 6, pp. 5:1-5:17, February 2011.
    • ACM Trans. Auton. Adapt. Syst , vol.6 , Issue.5 , pp. 1-5
    • Hang, C.-W.1    Singh, M.P.2
  • 112
    • 33748043984 scopus 로고    scopus 로고
    • Semantic access control for information interoperation
    • SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
    • C.-C. Pan, P. Mitra, and P. Liu, "Semantic access control for information interoperation," in Proc. eleventh ACM symposium on Access control models and technologies, SACMAT '06, (New York, NY, USA), pp. 237-246, ACM, 2006. (Pubitemid 44300761)
    • (2006) Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT , vol.2006 , pp. 237-246
    • Pan, C.-C.1    Mitra, P.2    Liu, P.3
  • 113
    • 34548016797 scopus 로고    scopus 로고
    • Using semantics for automatic enforcement of access control policies among dynamic coalitions
    • DOI 10.1145/1266840.1266877, SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
    • J. Warner, V. Atluri, R. Mukkamala, and J. Vaidya, "Using semantics for automatic enforcement of access control policies among dynamic coalitions," in Proc. 12th ACM symposium on Access control models and technologies, SACMAT '07, (New York, NY, USA), pp. 235-244, ACM, 2007. (Pubitemid 47281558)
    • (2007) Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT , pp. 235-244
    • Warner, J.1    Atluri, V.2    Mukkamala, R.3    Vaidya, J.4
  • 114
    • 84864578039 scopus 로고    scopus 로고
    • Interoperable semantic access control for highly dynamic coalitions
    • H. Koshutanski and A. Maǎ, "Interoperable semantic access control for highly dynamic coalitions," Security and Communication Networks, vol. 3, pp. 565-594, 2010.
    • (2010) Security and Communication Networks , vol.3 , pp. 565-594
    • Koshutanski, H.1    Maǎ, A.2
  • 115
    • 77958087461 scopus 로고    scopus 로고
    • Security policies in distributed cscw and workflow systems
    • T. Ahmed and A. R. Tripathi, "Security policies in distributed cscw and workflow systems," IEEE Trans. Syst. Man Cybern. A, Syst. Hum., vol. 40, no. 6, pp. 1220-1231, 2010.
    • (2010) IEEE Trans. Syst. Man Cybern. A, Syst. Hum. , vol.40 , Issue.6 , pp. 1220-1231
    • Ahmed, T.1    Tripathi, A.R.2
  • 119
    • 19644386039 scopus 로고    scopus 로고
    • Gridadmin: Decentralising grid administration using trust management
    • T. B. Quillinan, B. C. Clayton, and S. N. Foley, "Gridadmin: Decentralising grid administration using trust management," in in Proc. ISPDC/HeteroPar 04, p. 184, 2004.
    • (2004) Proc. ISPDC/HeteroPar , vol.4 , pp. 184
    • Quillinan, T.B.1    Clayton, B.C.2    Foley, S.N.3
  • 120
    • 68449090010 scopus 로고    scopus 로고
    • Enhancing grid security by fine-grained behavioral control and negotiation-based authorization
    • August
    • H. Koshutanski, A. Lazouski, F. Martinelli, and P. Mori, "Enhancing grid security by fine-grained behavioral control and negotiation-based authorization," Int. J. Inf. Secur., vol. 8, pp. 291-314, August 2009.
    • (2009) Int. J. Inf. Secur. , vol.8 , pp. 291-314
    • Koshutanski, H.1    Lazouski, A.2    Martinelli, F.3    Mori, P.4
  • 125
    • 62349132763 scopus 로고    scopus 로고
    • Collaboration through computation: Incorporating trust model into service-based software systems
    • M. G. Uddin, M. Zulkernine, and S. I. Ahamed, "Collaboration through computation: incorporating trust model into service-based software systems," Service Oriented Computing and Applications, vol. 3, pp. 47-63, 2009.
    • (2009) Service Oriented Computing and Applications , vol.3 , pp. 47-63
    • Uddin, M.G.1    Zulkernine, M.2    Ahamed, S.I.3
  • 126
    • 84864622779 scopus 로고    scopus 로고
    • Towards a flexible trust model for grid environments
    • (M. Jeckle, R. Kowalczyk, and P. Braun, eds.) 3270 of Lecture Notes in Computer Science Springer Berlin /Heidelberg
    • E. Papalilo and B. Freisleben, "Towards a flexible trust model for grid environments," in Grid Services Engineering and Management (M. Jeckle, R. Kowalczyk, and P. Braun, eds.), vol. 3270 of Lecture Notes in Computer Science, pp. 35-65, Springer Berlin /Heidelberg, 2004.
    • (2004) Grid Services Engineering and Management , pp. 35-65
    • Papalilo, E.1    Freisleben, B.2
  • 128
    • 33845370375 scopus 로고    scopus 로고
    • Result verification and trust-based scheduling in peer-to-peer Grids
    • DOI 10.1109/P2P.2005.32, 1551018, Proceedings - Fifth IEEE International Conference on Peer-to-Peer Computing, P2P 2005
    • S. Zhao, V. Lo, and C. GauthierDickey, "Result verification and trust-based scheduling in peer-to-peer grids," in Proc. Fifth IEEE International Conference on Peer-to-Peer Computing, (Washington, DC, USA), pp. 31-38, IEEE Computer Society, 2005. (Pubitemid 44883087)
    • (2005) Proceedings - Fifth IEEE International Conference on Peer-to-Peer Computing, P2P 2005 , vol.2005 , pp. 31-38
    • Zhao, S.1    Lo, V.2    GauthierDickey, C.3
  • 130
    • 34248579323 scopus 로고    scopus 로고
    • Sabotage-tolerance and trust management in desktop grid computing
    • DOI 10.1016/j.future.2006.12.001, PII S0167739X06002147
    • P. Domingues, B. Sousa, and L. M. Silva, "Sabotage-tolerance and trust management in desktop grid computing," Future Generation Computer Systems, vol. 23, pp. 904-912, 2007. (Pubitemid 46755400)
    • (2007) Future Generation Computer Systems , vol.23 , Issue.7 , pp. 904-912
    • Domingues, P.1    Sousa, B.2    Moura Silva, L.3
  • 132
    • 84887937075 scopus 로고    scopus 로고
    • Towards trust-aware resource management in grid computing systems
    • F. Azzedin and M. Maheswaran, "Towards trust-aware resource management in grid computing systems," in Cluster Computing and the Grid, pp. 452-457, 2002.
    • (2002) Cluster Computing and the Grid , pp. 452-457
    • Azzedin, F.1    Maheswaran, M.2
  • 137
    • 28844464697 scopus 로고    scopus 로고
    • Trusted Grid computing with security binding and trust integration
    • DOI 10.1007/s10723-005-5465-x
    • S. Song, K. Hwang, and Y. kwong Kwok, "Trusted grid computing with security binding and trust integration," Journal of Grid Computing, vol. 3, pp. 53-73, 2005. (Pubitemid 41762485)
    • (2005) Journal of Grid Computing , vol.3 , Issue.1-2 , pp. 53-73
    • Song, S.1    Hwang, K.2    Kwok, Y.-K.3
  • 138
    • 24944495031 scopus 로고    scopus 로고
    • Experience-based trust: Enabling effective resource selection in a grid environment
    • Trust Management: Third International Conference, iTrust 2005, Proceedings
    • N. Griffiths and K. ming Chao, "Experience-based trust: Enabling effective resource selection in a grid environment," in iTrust, pp. 240-255, 2005. (Pubitemid 41313132)
    • (2005) Lecture Notes in Computer Science , vol.3477 , pp. 240-255
    • Griffiths, N.1    Chao, K.-M.2
  • 142
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • February
    • T. Yu, M. Winslett, and K. E. Seamons, "Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation," ACM Trans. Inf. Syst. Secur., vol. 6, pp. 1-42, February 2003.
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3
  • 144
    • 0038148412 scopus 로고    scopus 로고
    • A unified scheme for resource protection in automated trust negotiation
    • (Washington, DC, USA) IEEE Computer Society
    • T. Yu and M. Winslett, "A unified scheme for resource protection in automated trust negotiation," in Proc. 2003 IEEE Symposium on Security and Privacy, SP '03, (Washington, DC, USA), pp. 110-, IEEE Computer Society, 2003.
    • (2003) Proc. 2003 IEEE Symposium on Security and Privacy, SP '03 , vol.110
    • Yu, T.1    Winslett, M.2
  • 146
    • 33749080579 scopus 로고    scopus 로고
    • Automated discovery, interaction and composition of Semantic Web services
    • DOI 10.1016/j.websem.2003.07.002
    • K. P. Sycara, M. Paolucci, A. Ankolekar, and N. Srinivasan, "Automated discovery, interaction and composition of semantic web services," Journal of Web Semantics, vol. 1, pp. 27-46, 2003. (Pubitemid 44914725)
    • (2003) Web Semantics , vol.1 , Issue.1 , pp. 27-46
    • Sycara, K.1    Paolucci, M.2    Ankolekar, A.3    Srinivasan, N.4
  • 148
    • 70449630325 scopus 로고    scopus 로고
    • An enforcement architecture for security and trust policies in federated web-service-based systems
    • Z. Wu and L. Wang, "An enforcement architecture for security and trust policies in federated web-service-based systems," in International Computer Software and Applications Conference, pp. 329-334, 2009.
    • (2009) International Computer Software and Applications Conference , pp. 329-334
    • Wu, Z.1    Wang, L.2
  • 155
  • 156
    • 72849133166 scopus 로고    scopus 로고
    • Towards a trust and contract management framework for dynamic virtual organisations
    • Kluwer Academic
    • T. Dimitrakos, D. Golby, and P. Kearney, "Towards a trust and contract management framework for dynamic virtual organisations," in In eAdoption and the Knowledge Economy: eChallenges 2004, pp. 27-29, Kluwer Academic, 2004.
    • (2004) EAdoption and the Knowledge Economy: eChallenges , vol.2004 , pp. 27-29
    • Dimitrakos, T.1    Golby, D.2    Kearney, P.3
  • 158
    • 7044221923 scopus 로고    scopus 로고
    • A service-oriented trust management framework
    • Trust, Reputation, and Security: Theories and Practice
    • T. Dimitrakos, "A service-oriented trust management framework," in Proc. 2002 international conference on Trust, reputation, and security: theories and practice, AAMAS'02, (Berlin, Heidelberg), pp. 53-72, Springer-Verlag, 2003. (Pubitemid 36550611)
    • (2003) Lecture Notes in Computer Science , Issue.2631 , pp. 53-72
    • Dimitrakos, T.1
  • 162
    • 70349683196 scopus 로고    scopus 로고
    • Security requirements specification in service-oriented business process management
    • M. Menzel, I. Thomas, and C. Meinel, "Security requirements specification in service-oriented business process management," in Availability, Reliability and Security, pp. 41-48, 2009.
    • (2009) Availability, Reliability and Security , pp. 41-48
    • Menzel, M.1    Thomas, I.2    Meinel, C.3
  • 163
  • 164
  • 166
    • 33845310313 scopus 로고    scopus 로고
    • Trustworthy service selection and composition - Reducing the entropy of service-oriented web
    • DOI 10.1109/INDIN.2005.1560360, 1560360, Proceedings - Thirteenth International Symposium on Temporal Representation and Reasoning, TIME 2006
    • W. Liu, "Trustworthy service selection and composition-reducing the entropy of service-oriented web," in Proc. 3rd IEEE Int. Conf. Industrial Informatics INDIN '05, pp. 104-109, 2005. (Pubitemid 44868848)
    • (2005) 2005 3rd IEEE International Conference on Industrial Informatics, INDIN , vol.2005 , pp. 104-109
    • Liu, W.1
  • 168
    • 3543075807 scopus 로고    scopus 로고
    • An access control framework for business processes for web services
    • (New York, NY, USA) ACM
    • H. Koshutanski and F. Massacci, "An access control framework for business processes for web services," in Proc. 2003 ACM workshop on XML security, XMLSEC '03, (New York, NY, USA), pp. 15-24, ACM, 2003.
    • (2003) Proc. 2003 ACM workshop on XML security, XMLSEC '03 , pp. 15-24
    • Koshutanski, H.1    Massacci, F.2
  • 170
    • 38349102077 scopus 로고    scopus 로고
    • Balancing trust and incentive in peerto-peer collaborative system
    • Y. Zhang, L. Lin, and J. Huai, "Balancing trust and incentive in peerto-peer collaborative system," in Network Security, vol. 5, pp. 73-81, 2007.
    • (2007) Network Security , vol.5 , pp. 73-81
    • Zhang, Y.1    Lin, L.2    Huai, J.3
  • 176
    • 54249141830 scopus 로고    scopus 로고
    • Information security and cryptology ch. Building
    • Berlin, Heidelberg: Springer-Verlag
    • J. Zhan, H. Zhang, and F. Yan, "Information security and cryptology," ch. Building Trusted Sub-domain for the Grid with Trusted Computing, pp. 463-471, Berlin, Heidelberg: Springer-Verlag, 2008.
    • (2008) Trusted Sub-domain for the Grid with Trusted Computing , pp. 463-471
    • Zhan, J.1    Zhang, H.2    Yan, F.3
  • 177
    • 47749140456 scopus 로고    scopus 로고
    • Securing grid workflows with trusted computing
    • (M. Bubak, G. van Albada, J. Dongarra, and P. Sloot, eds.) 5103 of Lecture Notes in Computer Science Springer Berlin Heidelberg
    • P.-W. Yau, A. Tomlinson, S. Balfe, and E. Gallery, "Securing grid workflows with trusted computing," in Computational Science ICCS 2008 (M. Bubak, G. van Albada, J. Dongarra, and P. Sloot, eds.), vol. 5103 of Lecture Notes in Computer Science, pp. 510-519, Springer Berlin Heidelberg, 2008.
    • (2008) Computational Science ICCS 2008 , pp. 510-519
    • Yau, P.-W.1    Tomlinson, A.2    Balfe, S.3    Gallery, E.4
  • 179
    • 71549130410 scopus 로고    scopus 로고
    • Innovations for grid security from trusted computing
    • (B. Christianson, B. Crispo, J. Malcolm, and M. Roe, eds.) 5087 of Lecture Notes in Computer Science Springer Berlin /Heidelberg
    • W. Mao, A. Martin, H. Jin, and H. Zhang, "Innovations for grid security from trusted computing," in Security Protocols (B. Christianson, B. Crispo, J. Malcolm, and M. Roe, eds.), vol. 5087 of Lecture Notes in Computer Science, pp. 132-149, Springer Berlin /Heidelberg, 2009.
    • (2009) Security Protocols , pp. 132-149
    • Mao, W.1    Martin, A.2    Jin, H.3    Zhang, H.4
  • 181
    • 84864577448 scopus 로고    scopus 로고
    • Sealed grid with downloadable services
    • (T. Priol and M. Vanneschi, eds.) Springer US
    • M. Kuba, D. Kouǐl, and M. Prochžka, "Sealed grid with downloadable services," in Towards Next Generation Grids (T. Priol and M. Vanneschi, eds.), pp. 83-91, Springer US, 2007.
    • (2007) Towards Next Generation Grids , pp. 83-91
    • Kuba, M.1    Kouǐl, D.2    Prochžka, M.3
  • 183
    • 47749138230 scopus 로고    scopus 로고
    • Using trusted computing in commercial grids
    • (B. Akhgar, ed.) Springer London
    • P.-W. Yau and A. Tomlinson, "Using trusted computing in commercial grids," in ICCS 2007 (B. Akhgar, ed.), pp. 31-36, Springer London, 2007.
    • (2007) ICCS , vol.2007 , pp. 31-36
    • Yau, P.-W.1    Tomlinson, A.2
  • 188
    • 0035124553 scopus 로고    scopus 로고
    • When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web
    • DOI 10.1002/1532-2890(2000)52:1<12::AID-ASI1062>3.0.CO;2-V
    • C. A. Lynch, "When documents deceive: trust and provenance as new factors for information retrieval in a tangled web," J. Am. Soc. Inf. Sci. Technol., vol. 52, pp. 12-17, January 2001. (Pubitemid 32133545)
    • (2001) Journal of the American Society for Information Science and Technology , vol.52 , Issue.1 , pp. 12-17
    • Lynch, C.A.1
  • 191
    • 52149096452 scopus 로고    scopus 로고
    • Quantifying trust based on service level agreement for software as a service
    • L. Tan, C. hung Chi, and J. Deng, "Quantifying trust based on service level agreement for software as a service," in International Computer Software and Applications Conference, pp. 116-119, 2008.
    • (2008) International Computer Software and Applications Conference , pp. 116-119
    • Tan, L.1    Deng, J.2
  • 200
    • 84949747356 scopus 로고    scopus 로고
    • An authorization model for workflows
    • V. Atluri and W. kuang Huang, "An authorization model for workflows," in European Symposium on Research in Computer Security, pp. 44-64, 1996. (Pubitemid 126128893)
    • (1996) Lecture Notes in Computer Science , Issue.1146 , pp. 44-64
    • Atluri, V.1    Huang, W.-K.2
  • 201
    • 33751436350 scopus 로고    scopus 로고
    • DW-RBAC: A formal security model of delegation and revocation in workflow systems
    • DOI 10.1016/j.is.2005.11.008, PII S0306437905001122
    • J. Wainer, A. Kumar, and P. Barthelmess, "DW.-rbac: A formal security model of delegation and revocation in workflow systems," Inf. Syst., vol. 32, pp. 365-384, May 2007. (Pubitemid 44821542)
    • (2007) Information Systems , vol.32 , Issue.3 , pp. 365-384
    • Wainer, J.1    Kumar, A.2    Barthelmess, P.3
  • 203
    • 35048841167 scopus 로고    scopus 로고
    • Requirements engineering meets trust management model, methodology, and reasoning
    • Springer Verlag
    • P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone, "Requirements engineering meets trust management model, methodology, and reasoning," in In Proc. iTrust 04, LNCS 2995, pp. 176-190, Springer Verlag, 2004.
    • (2004) Proc. iTrust 04, LNCS , vol.2995 , pp. 176-190
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 206
    • 33747510016 scopus 로고    scopus 로고
    • Refactoring service-based systems: How to avoid trusting a workflow service
    • DOI 10.1002/cpe.997
    • H. Chivers and J. A. Mcdermid, "Refactoring service-based systems: how to avoid trusting a workflow service," Concurrency and Computation: Practice and Experience, vol. 18, pp. 1255-1275, 2006. (Pubitemid 44258509)
    • (2006) Concurrency Computation Practice and Experience , vol.18 , Issue.10 , pp. 1255-1275
    • Chivers, H.1    McDermid, J.2
  • 207
    • 0000206310 scopus 로고    scopus 로고
    • Security models for web-based applications
    • DOI 10.1145/359205.359224
    • J. B. D. Joshi, W. G. Aref, A. Ghafoor, and E. H. Spafford, "Security models for web-based applications," Commun. ACM, vol. 44, pp. 38-44, February 2001. (Pubitemid 33631852)
    • (2001) Communications of the ACM , vol.44 , Issue.2 , pp. 38-44
    • Joshi, J.B.D.1    Aref, W.G.2    Ghafoor, A.3    Spafford, E.H.4
  • 208
    • 84864619557 scopus 로고    scopus 로고
    • Globus security policy and implementation
    • "Globus security policy and implementation," 1997.
    • (1997)
  • 210
    • 18744365186 scopus 로고    scopus 로고
    • SOWAC: A service-oriented workflow access control model
    • Proceedings of the 28th Annual International Computer Software and Applications Conference, COMPSAC 2004
    • W. Xu, J. Wei, Y. Liu, and J. Li, "Sowac: A service-oriented workflow access control model," in Proc. 28th Annual International Computer Software and Applications Conference-Volume 01, COMPSAC '04, (Washington, DC, USA), pp. 128-134, IEEE Computer Society, 2004. (Pubitemid 40673840)
    • (2004) Proceedings - International Computer Software and Applications Conference , vol.1 , pp. 128-134
    • Xu, W.1    Wei, J.2    Liu, Y.3    Li, J.4
  • 212
    • 84864619559 scopus 로고    scopus 로고
    • Xamcl and oasis security services technical committee
    • "Xamcl and oasis security services technical committee," 2005.
    • (2005)
  • 217
    • 0242276201 scopus 로고    scopus 로고
    • A policy based approach to security for the semantic web
    • (D. Fensel, K. Sycara, and J. Mylopoulos, eds.) 2870 of Lecture Notes in Computer Science Springer Berlin /Heidelberg
    • L. Kagal, T. Finin, and A. Joshi, "A policy based approach to security for the semantic web," in The Semantic Web-ISWC 2003 (D. Fensel, K. Sycara, and J. Mylopoulos, eds.), vol. 2870 of Lecture Notes in Computer Science, pp. 402-418, Springer Berlin /Heidelberg, 2003.
    • (2003) The Semantic Web-ISWC , vol.2003 , pp. 402-418
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 223
    • 77954114693 scopus 로고    scopus 로고
    • Sectet-an extensible framework for the realization of secure inter-organizational workflows
    • (E. F. Medina, Mariemma, E. F. Medina, and Mariemma, eds.) INSTICC Press
    • M. Hafner, R. Breu, B. Agreiter, and A. Nowak, "Sectet-an extensible framework for the realization of secure inter-organizational workflows," in WOSIS (E. F. Medina, Mariemma, E. F. Medina, and Mariemma, eds.), pp. 47-57, INSTICC Press, 2006.
    • (2006) WOSIS , pp. 47-57
    • Hafner, M.1    Breu, R.2    Agreiter, B.3    Nowak, A.4
  • 228
    • 84858835658 scopus 로고    scopus 로고
    • Trio: A system for integrated management of data, accuracy, and lineage
    • J. Widom, "Trio: A system for integrated management of data, accuracy, and lineage.," In Conference on Innovative Data Systems Research, pp. 262-276, 2005.
    • (2005) Conference on Innovative Data Systems Research , pp. 262-276
    • Widom, J.1
  • 229
    • 0024984237 scopus 로고
    • An architecture for practical delegation in a distributed system
    • 1990 IEEE Comput Soc Symp Res Secur Privacy
    • M. Gasser and E. McDermott, "An architecture for practical delegation in a distributed system," in Proc. IEEE Computer Society Symp Research in Security and Privacy, pp. 20-30, 1990. (Pubitemid 20739272)
    • (1990) Proceedings of the Symposium on Security and Privacy , pp. 20-30
    • Gasser Morrie1    McDermott Ellen2
  • 230


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.