-
3
-
-
0029736456
-
Object-oriented workflow technology in inconcert
-
S. K. Sarin, "Object-oriented workflow technology in inconcert," in COMPCON, pp. 446-450, 1996.
-
(1996)
COMPCON
, pp. 446-450
-
-
Sarin, S.K.1
-
4
-
-
0030408743
-
Generalized process structure grammars gpsg for flexible representations of work
-
D. S. Pagani and R. Pareschi, "Generalized process structure grammars gpsg for flexible representations of work," in Conference on Computer Supported Cooperative Work, pp. 180-189, 1996.
-
(1996)
Conference on Computer Supported Cooperative Work
, pp. 180-189
-
-
Pagani, D.S.1
Pareschi, R.2
-
5
-
-
0004159915
-
-
G. Alonso, M. Kamath, D. Agrawal, E. Abbadi, R. Gunter, and C. Mohan, "Failure handling in large scale workflow management systems," 1994.
-
(1994)
Failure handling in large scale workflow management systems
-
-
Alonso, G.1
Kamath, M.2
Agrawal, D.3
Abbadi, E.4
Gunter, R.5
Mohan, C.6
-
6
-
-
0033747806
-
Workflow interoperability standards for the internet
-
May
-
J. G. Hayes, E. Peyrovian, S. Sarin, M.-T. Schmidt, K. D. Swenson, and R. Weber, "Workflow interoperability standards for the internet," IEEE Internet Comput., vol. 4, pp. 37-45, May 2000.
-
(2000)
IEEE Internet Comput.
, vol.4
, pp. 37-45
-
-
Hayes, J.G.1
Peyrovian, E.2
Sarin, S.3
Schmidt, M.-T.4
Swenson, K.D.5
Weber, R.6
-
7
-
-
0003637204
-
-
Secaucus, NJ, USA: Springer-Verlag New York, Inc., 1st ed.
-
A. Dogac, T. Ozsu, and L. Kalinichenko, eds., Workflow Management Systems and Interoperability. Secaucus, NJ, USA: Springer-Verlag New York, Inc., 1st ed., 2001.
-
(2001)
Workflow Management Systems and Interoperability
-
-
Dogac, A.1
Ozsu, T.2
Kalinichenko, L.3
-
8
-
-
77953737783
-
A fuzzy model for calculating workflow trust using provenance data
-
ACM
-
S. Rajbhandari, O. F. Rana, and I. Wootten, "A fuzzy model for calculating workflow trust using provenance data," in Proc. 15th ACM Mardi Gras conference: From lightweight masH.-ups to lambda grids: Understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilities, MG '08, (New York, NY, USA), pp. 10:1-10:8, ACM, 2008.
-
(2008)
Proc. 15th ACM Mardi Gras conference: From lightweight masH.-ups to lambda grids: Understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilities, MG '08, (New York, NY, USA)
, vol.1-10
, Issue.8
, pp. 10
-
-
Rajbhandari, S.1
Rana, O.F.2
Wootten, I.3
-
9
-
-
33744965347
-
Trust-based secure workflow path construction
-
DOI 10.1007/11596141-29, Service-Oriented Computing, ICSOC 2005 - Third International Conference, Proceedings
-
M. Altunay, D. Brown, G. Byrd, and R. Dean, "Trust-based secure workflow path construction," in Service-Oriented Computing-ICSOC 2005 (B. Benatallah, F. Casati, and P. Traverso, eds.), vol. 3826 of Lecture Notes in Computer Science, pp. 382-395, Springer Berlin /Heidelberg, 2005. (Pubitemid 43856199)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3826
, pp. 382-395
-
-
Altunay, M.1
Brown, D.2
Byrd, G.3
Dean, R.4
-
10
-
-
4344669314
-
A computational trust model for multi-agent interactions based on confidence and reputation
-
S. Ramchurn, C. Sierra, L. Godo, and N. R. Jennings, "A computational trust model for multi-agent interactions based on confidence and reputation," in 6th International Workshop of Deception, Fraud and Trust in Agent Societies, pp. 69-75, 2003.
-
(2003)
6th International Workshop of Deception, Fraud and Trust in Agent Societies
, pp. 69-75
-
-
Ramchurn, S.1
Sierra, C.2
Godo, L.3
Jennings, N.R.4
-
11
-
-
0009481412
-
A survey of trust in internet applications
-
T. Grandison and M. Sloman, "A survey of trust in internet applications," IEEE Commun. Surveys Tutorials, vol. 3, no. 4, pp. 2-16, 2000.
-
(2000)
IEEE Commun. Surveys Tutorials
, vol.3
, Issue.4
, pp. 2-16
-
-
Grandison, T.1
Sloman, M.2
-
13
-
-
80054063079
-
A survey on distributed access control systems for web business processes
-
H. Koshutanski, "A survey on distributed access control systems for web business processes," I. J. Network Security, vol. 9, no. 1, pp. 61-69, 2009.
-
(2009)
I. J. Network Security
, vol.9
, Issue.1
, pp. 61-69
-
-
Koshutanski, H.1
-
15
-
-
34249811174
-
A survey of trust in computer science and the Semantic Web
-
DOI 10.1016/j.websem.2007.03.002, PII S1570826807000133, Software Engineering and the Semantic Web
-
D. Artz and Y. Gil, "A survey of trust in computer science and the semantic web," Web Semant., vol. 5, pp. 58-71, June 2007. (Pubitemid 46856280)
-
(2007)
Web Semantics
, vol.5
, Issue.2
, pp. 58-71
-
-
Artz, D.1
Gil, Y.2
-
16
-
-
0348155801
-
Comparing Petri Net and Activity Diagram Variants for Workflow Modelling - A Quest for Reactive Petri Nets
-
Petri Net Technology for Communication-Based Systems
-
R. Eshuis and R. Wieringa, "Comparing petri net and activity diagram variants for workflow modelling-a quest for reactive petri nets," in DFG Projects, pp. 321-351, 2003. (Pubitemid 37528818)
-
(2003)
Lecture Notes in Computer Science
, Issue.2472
, pp. 321-351
-
-
Eshuis, R.1
Wieringa, R.2
-
17
-
-
3042685974
-
A grid workflow management architecture
-
D. Marinescu, "A grid workflow management architecture," GGF White Paper, 2002.
-
(2002)
GGF White Paper
-
-
Marinescu, D.1
-
19
-
-
0345359315
-
Mygrid: Personalised bioinformatics on the information grid
-
R. D. Stevens, A. J. Robinson, and C. A. Goble, "myGrid: personalised bioinformatics on the information grid.," Bioinformatics, vol. 19 Suppl 1, 2003.
-
(2003)
Bioinformatics
, vol.19
, Issue.SUPPL. 1
-
-
Stevens, R.D.1
Robinson, A.J.2
Goble, C.A.3
-
20
-
-
0029201537
-
Dynamic change within workflow systems
-
ACM
-
C. Ellis, K. Keddara, and G. Rozenberg, "Dynamic change within workflow systems," in Proc. conference on Organizational computing systems, COCS '95, (New York, NY, USA), pp. 10-21, ACM, 1995.
-
(1995)
Proc. conference on Organizational computing systems, COCS '95, (New York, NY, USA)
, pp. 10-21
-
-
Ellis, C.1
Keddara, K.2
Rozenberg, G.3
-
21
-
-
79951788068
-
Formal trust specification in service workflows
-
IEEE Computer Society
-
W. Viriyasitavat and A. Martin, "Formal trust specification in service workflows," in Proc. 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC '10, (Washington, DC, USA), pp. 703-710, IEEE Computer Society, 2010.
-
(2010)
Proc. 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC '10, (Washington, DC, USA)
, pp. 703-710
-
-
Viriyasitavat, W.1
Martin, A.2
-
22
-
-
38149043562
-
Semantic constraints for trust transitivity
-
(Darlinghurst, Australia, Australia) Australian Computer Society, Inc.
-
A. Jøsang and S. Pope, "Semantic constraints for trust transitivity," in Proc. 2nd Asia-Pacific conference on Conceptual modelling-Volume 43, APCCM '05, (Darlinghurst, Australia, Australia), pp. 59-68, Australian Computer Society, Inc., 2005.
-
(2005)
Proc. 2nd Asia-Pacific conference on Conceptual modelling-Volume 43, APCCM '05
, pp. 59-68
-
-
Jøsang, A.1
Pope, S.2
-
23
-
-
36348939830
-
Provisioning heterogeneous and unreliable providers for service workflows
-
AAAI-07/IAAI-07 Proceedings: 22nd AAAI Conference on Artificial Intelligence and the 19th Innovative Applications of Artificial Intelligence Conference
-
S. Stein, N. R. Jennings, and T. R. Payne, "Provisioning heterogeneous and unreliable providers for service workflows," in National Conference on Artificial Intelligence, pp. 1452-1458, 2007. (Pubitemid 350149771)
-
(2007)
Proceedings of the National Conference on Artificial Intelligence
, vol.2
, pp. 1452-1458
-
-
Stein, S.1
Jennings, N.R.2
Payne, T.R.3
-
24
-
-
33747466065
-
A security interpretation of the workflow reference model
-
(R. v. Solms and J. H. Eloff, eds.) 2 of Information Security-from Small Systems to Management of Infrastructures, (Vienna, Austria) 2 Sep
-
R. A. Botha and J. H. Eloff, "A security interpretation of the workflow reference model," in Proceedings of WG 11.2 and WG 11.1 of IFIP TC11 (R. v. Solms and J. H. Eloff, eds.), vol. 2 of Information Security-from Small Systems to Management of Infrastructures, (Vienna, Austria), pp. 43-50, 2 Sep 1998.
-
(1998)
Proceedings of WG 11.2 and WG 11.1 of IFIP TC11
, pp. 43-50
-
-
Botha, R.A.1
Eloff, J.H.2
-
25
-
-
46849102755
-
Quantifying trust through delegation in service oriented architecture
-
Z. Xie and C.-H. Chi, "Quantifying trust through delegation in service oriented architecture," in Proc. IEEE Congress Services, pp. 308-315, 2007.
-
(2007)
Proc. IEEE Congress Services
, pp. 308-315
-
-
Xie, Z.1
Chi, C.-H.2
-
26
-
-
31444436554
-
A taxonomy of scientific workflow systems for grid computing
-
DOI 10.1145/1084805.1084814
-
J. Yu and R. Buyya, "A taxonomy of scientific workflow systems for grid computing," SIGMOD Rec., vol. 34, pp. 44-49, September 2005. (Pubitemid 43152531)
-
(2005)
SIGMOD Record
, vol.34
, Issue.3
, pp. 44-49
-
-
Yu, J.1
Buyya, R.2
-
27
-
-
0031222505
-
Managing trust in an information-labeling system
-
M. Blaze, J. Feigenbaum, P. Resnick, and M. Strauss, "Managing trust in an information-labeling system," in SPECIAL ISSUE OF SELECTED PAPERS FROM THE 1996 AMALFI CONFERENCE ON SECURE COMMUNICATION IN NETWORKS, pp. 491-501, 1996.
-
Special Issue of Selected Papers from the 1996 Amalfi Conference on Secure Communication in Networks
, vol.1996
, pp. 491-501
-
-
Blaze, M.1
Feigenbaum, J.2
Resnick, P.3
Strauss, M.4
-
30
-
-
26844544709
-
On the problem of trust in mobile agent systems
-
Internet Society
-
U. G. Wilhelm, S. Staamann, and L. Butty̌n, "On the problem of trust in mobile agent systems," in IN SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY. INTERNET SOCIETY, pp. 114-124, Internet Society, 1998.
-
(1998)
Symposium on Network and Distributed System Security. Internet Society
, pp. 114-124
-
-
Wilhelm, U.G.1
Staamann, S.2
Butty̌n, L.3
-
33
-
-
0002135118
-
Consumer trust in an internet store: A cross.-cultural validation
-
S. L. Jarvenpaa, N. Tractinsky, and L. Saarinen, "Consumer trust in an internet store: A crosS.-cultural validation.," J. Computer-Mediated Communication, vol. 5, no. 2, 1999.
-
(1999)
J. Computer-Mediated Communication
, vol.5
, Issue.2
-
-
Jarvenpaa, S.L.1
Tractinsky, N.2
Saarinen, L.3
-
37
-
-
0031208615
-
An international collaboratory based on virtual patient records
-
August
-
D. G. Kilman and D. W. Forslund, "An international collaboratory based on virtual patient records," Commun. ACM, vol. 40, pp. 110-117, August 1997.
-
(1997)
Commun. ACM
, vol.40
, pp. 110-117
-
-
Kilman, D.G.1
Forslund, D.W.2
-
39
-
-
32844472422
-
Trust in recommender systems
-
ACM
-
J. O'Donovan and B. Smyth, "Trust in recommender systems," in Proc. 10th international conference on Intelligent user interfaces, IUI '05, (New York, NY, USA), pp. 167-174, ACM, 2005.
-
(2005)
Proc. 10th international conference on Intelligent user interfaces, IUI '05, (New York, NY, USA)
, pp. 167-174
-
-
O'Donovan, J.1
Smyth, B.2
-
40
-
-
84964150008
-
Trust and suspicion
-
M. Deutsch, "Trust and suspicion," Journal of Conflict Resolution, vol. 2(4), pp. 265-279, 1958.
-
(1958)
Journal of Conflict Resolution
, vol.2
, Issue.4
, pp. 265-279
-
-
Deutsch, M.1
-
42
-
-
79960061345
-
-
M. Adamski, A. Arenas, A. Bilas, P. Fragopoulou, V. Georgiev, A. Hevia, G. Jankowski, B. Matthews, N. Meyer, J. Platte, and M. Wilson, "Trust and security in grids: A state of the art," 2008.
-
(2008)
Trust and Security In Grids: A State of the Art
-
-
Adamski, M.1
Arenas, A.2
Bilas, A.3
Fragopoulou, P.4
Georgiev, V.5
Hevia, A.6
Jankowski, G.7
Matthews, B.8
Meyer, N.9
Platte, J.10
Wilson, M.11
-
43
-
-
0031606465
-
Trust in electronic commerce: Definition and theoretical considerations
-
(Washington, DC, USA) IEEE Computer Society
-
A. Kini, "Trust in electronic commerce: Definition and theoretical considerations," in Proc. Thirty-First Annual Hawaii International Conference on System ScienceS.-Volume 4-Volume 4, (Washington, DC, USA), pp. 51-, IEEE Computer Society, 1998.
-
(1998)
Proc. Thirty-First Annual Hawaii International Conference on System ScienceS.-Volume 4-Volume 4
, pp. 51
-
-
Kini, A.1
-
44
-
-
0042495505
-
An integrative model of organizational trust
-
R. C. Mayer, J. H. Davis, and F. D. Schoorman, "An Integrative Model of Organizational Trust," The Academy of Management Review, vol. 20, no. 3, pp. 709-734, 1995.
-
(1995)
The Academy of Management Review
, vol.20
, Issue.3
, pp. 709-734
-
-
Mayer, R.C.1
Davis, J.H.2
Schoorman, F.D.3
-
45
-
-
84864627724
-
-
tech. rep., School of Computer Studies, Research Report Series, Report 98.27, University of Leeds
-
L. Lau and B. Whyte, "Technological aspects of trust in virtual organisations," tech. rep., School of Computer Studies, Research Report Series, Report 98.27, University of Leeds, 1998.
-
(1998)
Technological aspects of trust in virtual organisations
-
-
Lau, L.1
Whyte, B.2
-
46
-
-
33846609555
-
A computational model of trust and reputation for e-businesses
-
(Washington, DC, USA) IEEE Computer Society
-
L. Mui, M. Mohtashemi, and A. Halberstadt, "A computational model of trust and reputation for e-businesses," in Proc. 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7-Volume 7, HICSS '02, (Washington, DC, USA), pp. 188-, IEEE Computer Society, 2002.
-
(2002)
Proc. 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7-Volume 7, HICSS '02
-
-
Mui, L.1
Mohtashemi, M.2
Halberstadt, A.3
-
49
-
-
84867177932
-
Security and trust issues in semantic grids
-
D. Olmedilla, O. F. Rana, B. Matthews, and W. Nejdl, "Security and trust issues in semantic grids," in Dagstuhl Seminars, 2005.
-
(2005)
Dagstuhl Seminars
-
-
Olmedilla, D.1
Rana, O.F.2
Matthews, B.3
Nejdl, W.4
-
50
-
-
84949942881
-
The right type of trust for distributed systems
-
ACM
-
A. Jøsang, "The right type of trust for distributed systems," in Proc. 1996 workshop on New security paradigms, NSPW '96, (New York, NY, USA), pp. 119-131, ACM, 1996.
-
(1996)
Proc. 1996 workshop on New security paradigms, NSPW '96, (New York, NY, USA)
, pp. 119-131
-
-
Jøsang, A.1
-
51
-
-
84864575362
-
-
Department of defense trusted computer system evaluation criteria
-
"Department of defense trusted computer system evaluation criteria," 1985.
-
(1985)
-
-
-
52
-
-
33646562485
-
Why Trust is Bad for Security
-
DOI 10.1016/j.entcs.2005.09.044, PII S1571066106002891
-
D. Gollmann, "Why trust is bad for security," Electron. Notes Theor. Comput. Sci., vol. 157, pp. 3-9, May 2006. (Pubitemid 43728535)
-
(2006)
Electronic Notes in Theoretical Computer Science
, vol.157
, Issue.3
, pp. 3-9
-
-
Gollmann, D.1
-
55
-
-
0029216014
-
New thinking about information technology security
-
M. D. Abrams and M. V. Joyce, "New thinking about information technology security," Computers & Security, vol. 14, pp. 69-81, 1995.
-
(1995)
Computers & Security
, vol.14
, pp. 69-81
-
-
Abrams, M.D.1
Joyce, M.V.2
-
56
-
-
0032148235
-
-
F. Malamateniou, G. Vassilacopoulos, and P. Tsanakas, "A workflowbased approach to virtual patient record security," vol. 2, no. 3, pp. 139-145, 1998.
-
(1998)
A Workflowbased Approach to Virtual Patient Record Security
, vol.2
, Issue.3
, pp. 139-145
-
-
Malamateniou, F.1
Vassilacopoulos, G.2
Tsanakas, P.3
-
57
-
-
35048849058
-
A secure workflow model based on distributed constrained role and task assignment for the internet
-
I. Moodahi, E. Gudes, O. Lavee, and A. Meisels, "A secure workflow model based on distributed constrained role and task assignment for the internet," Information and Communications Security, pp. 171-186, 2004. (Pubitemid 39737138)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3269
, pp. 171-186
-
-
Moodahi, I.1
Gudes, E.2
Lavee, O.3
Meisels, A.4
-
58
-
-
9744280135
-
-
M. Addis, J. Ferris, M. Greenwood, D. Marvin, T. Oinn, and A. Wipat, "Experiences with e-science workflow specification and enactment in bioinformatics," 2003.
-
(2003)
Experiences with e-science workflow specification and enactment in bioinformatics
-
-
Addis, M.1
Ferris, J.2
Greenwood, M.3
Marvin, D.4
Oinn, T.5
Wipat, A.6
-
59
-
-
54949138430
-
Types for task-based access control in workflow systems
-
Y. Lu, L. Zhang, and J. Sun, "Types for task-based access control in workflow systems," IET Software, vol. 2, no. 5, pp. 461-473, 2008.
-
(2008)
IET Software
, vol.2
, Issue.5
, pp. 461-473
-
-
Lu, Y.1
Zhang, L.2
Sun, J.3
-
60
-
-
35248884516
-
Statistical trustability (conceptual work)
-
R. Kalcklšch and K. Herrmann, "Statistical trustability (conceptual work)," in iTrust, pp. 271-274, 2003.
-
(2003)
ITrust
, pp. 271-274
-
-
Kalcklšch, R.1
Herrmann, K.2
-
62
-
-
0029700344
-
Decentralized trust management
-
M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized trust management," in Proc. IEEE Symp Security and Privacy, pp. 164-173, 1996.
-
(1996)
Proc. IEEE Symp Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
63
-
-
84957800809
-
Keynote: Trust management for public-key infrastructures
-
M. Blaze, J. Feigenbaum, and A. D. Keromytis, "Keynote: Trust management for public-key infrastructures," in Infrastructures (Position Paper). Lecture Notes in Computer Science 1550, pp. 59-63, 1998.
-
(1998)
Infrastructures (Position Paper). Lecture Notes in Computer Science
, vol.1550
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
66
-
-
0001470602
-
Referee: Trust management for web applications
-
September
-
Y.-H. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, and M. Strauss, "Referee: trust management for web applications," Comput. Netw. ISDN Syst., vol. 29, pp. 953-964, September 1997.
-
(1997)
Comput. Netw. ISDN Syst.
, vol.29
, pp. 953-964
-
-
Chu, Y.-H.1
Feigenbaum, J.2
LaMacchia, B.3
Resnick, P.4
Strauss, M.5
-
68
-
-
47049091932
-
Trust and recommendations in mobile ad hoc networks
-
IEEE Computer Society
-
V. Balakrishnan, V. Varadharajan, U. K. Tupakula, and P. Lucs, "Trust and recommendations in mobile ad hoc networks," in Proc. Third International Conference on Networking and Services, (Washington, DC, USA), pp. 64-, IEEE Computer Society, 2007.
-
(2007)
Proc. Third International Conference on Networking and Services, (Washington, DC, USA)
-
-
Balakrishnan, V.1
Varadharajan, V.2
Tupakula, U.K.3
Lucs, P.4
-
69
-
-
33646146709
-
Trust by workflow in autonomic communication
-
M. I. Smirnov, "Trust by workflow in autonomic communication," in MMM-ACNS, pp. 136-150, 2005.
-
(2005)
MMM-ACNS
, pp. 136-150
-
-
Smirnov, M.I.1
-
70
-
-
34247126970
-
Dynamic workflow change in PDM systems
-
DOI 10.1016/j.compind.2006.09.014, PII S0166361506001631
-
Z. M. Qiu and Y. S. Wong, "Dynamic workflow change in pdm systems," Comput. Ind., vol. 58, pp. 453-463, June 2007. (Pubitemid 46590430)
-
(2007)
Computers in Industry
, vol.58
, Issue.5
, pp. 453-463
-
-
Qiu, Z.M.1
Wong, Y.S.2
-
71
-
-
4544375031
-
Trust in multi-agent systems
-
S. D. Ramchurn, D. Huynh, and N. R. Jennings, "Trust in multi-agent systems," THE KNOWLEDGE ENGINEERING REVIEW, vol. 19, p. 2004, 2004.
-
(2004)
The Knowledge Engineering Review
, vol.19
, pp. 2004
-
-
Ramchurn, S.D.1
Huynh, D.2
Jennings, N.R.3
-
72
-
-
84864613573
-
An extended petri net model for supporting workflows in a multilevel secure environment
-
in P. Samarati and R.S. Sandhu Hall
-
V. Atluri and W. kuang Huang, "An extended petri net model for supporting workflows in a multilevel secure environment," in in P. Samarati and R.S. Sandhu, Database Security X: Status and Prospects, Chapman, pp. 199-216, Hall, 1996.
-
(1996)
Database Security X: Status and Prospects, Chapman
, pp. 199-216
-
-
Atluri, V.1
Kuang Huang, W.2
-
73
-
-
3042519776
-
An execution model for multilevel secure work-flows
-
V. Atluri, W.-K. Huang, and E. Bertino, "An execution model for multilevel secure work-flows," in Proc. 11th IFIP Working Conference on Database Security, pp. 151-165, 1997.
-
(1997)
Proc. 11th IFIP Working Conference on Database Security
, pp. 151-165
-
-
Atluri, V.1
Huang, W.-K.2
Bertino, E.3
-
74
-
-
3042511452
-
An authorization and access control model for workflow
-
S. Chaari, F. Biennier, C. Ben Amar, and J. Favrel, "An authorization and access control model for workflow," in Proc. First Int Control, Communications and Signal Processing Symp, pp. 141-148, 2004.
-
(2004)
Proc. First Int Control, Communications and Signal Processing Symp
, pp. 141-148
-
-
Chaari, S.1
Biennier, F.2
Ben Amar, C.3
Favrel, J.4
-
75
-
-
49049088760
-
Avoiding policy-based deadlocks in business processes
-
M. Kohler and A. Schaad, "Avoiding policy-based deadlocks in business processes," in Proc. Third Int. Conf. Availability, Reliability and Security ARES 08, pp. 709-716, 2008.
-
(2008)
Proc. Third Int. Conf. Availability, Reliability and Security ARES
, vol.8
, pp. 709-716
-
-
Kohler, M.1
Schaad, A.2
-
76
-
-
0036161253
-
Authorization and access control of application data in workflow systems
-
DOI 10.1023/A:1012972608697
-
S. Wu, A. Sheth, J. Miller, and Z. Luo, "Authorization and access control of application data in workflow systems," J. Intell. Inf. Syst., vol. 18, pp. 71-94, January 2002. (Pubitemid 34129948)
-
(2002)
Journal of Intelligent Information Systems
, vol.18
, Issue.1
, pp. 71-94
-
-
Wu, S.1
Sheth, A.2
Miller, J.3
Luo, Z.4
-
77
-
-
58349085744
-
Trust in business processes
-
(Hunan, China) IEEE Computer Society
-
N. Kuntze, A. U.Schmidt, Z. Velikova, and C. Rudolph, "Trust in business processes," in Proc. 9th International Conference for Young Computer Scientists, 2008. ICYCS 2008., (Hunan, China), pp. 1992-1997, IEEE Computer Society, 2008.
-
(2008)
Proc. 9th International Conference for Young Computer Scientists 2008. ICYCS 2008
, pp. 1992-1997
-
-
Kuntze, N.1
Schmidt, A.U.2
Velikova, Z.3
Rudolph, C.4
-
78
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
February
-
E. Bertino, E. Ferrari, and V. Atluri, "The specification and enforcement of authorization constraints in workflow management systems," ACM Trans. Inf. Syst. Secur., vol. 2, pp. 65-104, February 1999.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
79
-
-
33747074188
-
An overview of workflow management: From process modeling to workflow automation infrastructure
-
April
-
D. Georgakopoulos, M. Hornick, and A. Sheth, "An overview of workflow management: from process modeling to workflow automation infrastructure," Distrib. Parallel Databases, vol. 3, pp. 119-153, April 1995.
-
(1995)
Distrib. Parallel Databases
, vol.3
, pp. 119-153
-
-
Georgakopoulos, D.1
Hornick, M.2
Sheth, A.3
-
80
-
-
84864629049
-
-
B. Inc Salt Lake City, UT: Beezix Software Services
-
B. Inc, Lotus Notes 6 Calendar Quick Reference Guide. Salt Lake City, UT: Beezix Software Services, 2007.
-
(2007)
Lotus Notes 6 Calendar Quick Reference Guide
-
-
-
81
-
-
0008755940
-
Actionworkflow as the enterprise integration technology
-
R. Medina-mora, H. K. T. Wong, and P. Flores, "Actionworkflow as the enterprise integration technology," IEEE Data(base) Engineering Bulletin, vol. 16, pp. 49-52, 1993.
-
(1993)
IEEE Data(base) Engineering Bulletin
, vol.16
, pp. 49-52
-
-
Medina-Mora, R.1
Wong, H.K.T.2
Flores, P.3
-
82
-
-
0032223756
-
Is anybody out there?: Antecedents of trust in global virtual teams
-
March
-
S. L. Jarvenpaa, K. Knoll, and D. E. Leidner, "Is anybody out there?: antecedents of trust in global virtual teams," J. Manage. Inf. Syst., vol. 14, pp. 29-64, March 1998.
-
(1998)
J. Manage. Inf. Syst.
, vol.14
, pp. 29-64
-
-
Jarvenpaa, S.L.1
Knoll, K.2
Leidner, D.E.3
-
83
-
-
0033265783
-
Communication and trust in global virtual teams
-
June
-
S. L. Jarvenpaa and D. E. Leidner, "Communication and trust in global virtual teams," Organization Science, vol. 10, pp. 791-815, June 1999.
-
(1999)
Organization Science
, vol.10
, pp. 791-815
-
-
Jarvenpaa, S.L.1
Leidner, D.E.2
-
84
-
-
0142250285
-
Flexible regulation of distributed coalitions
-
Computer Security - ESORICS 2003
-
X. Ao and N. H. Minsky, "Flexible regulation of distributed coalitions," in European Symposium on Research in Computer Security, pp. 39-60, 2003. (Pubitemid 37311862)
-
(2003)
Lecture Notes in Computer Science
, Issue.2808
, pp. 39-60
-
-
Ao, X.1
Minsky, N.H.2
-
85
-
-
72849147121
-
Modeling delegation in requirements.-driven trust framework
-
W. Viriyasitavat, "Modeling delegation in requirementS.-driven trust framework," in Proc. World Conf. ServiceS.-I, pp. 522-529, 2009.
-
(2009)
Proc. World Conf. Services
, vol.1
, pp. 522-529
-
-
Viriyasitavat, W.1
-
86
-
-
0001078603
-
-
G. Alonso, C. Mohan, R. Gunthor, D. Agrawal, A. E. Abbadi, and K. Mohan, "Exotica/fmqm: A persistent message-based architecture for distributed workflow management," 1995.
-
(1995)
Exotica/fmqm: A persistent message-based architecture for distributed workflow management
-
-
Alonso, G.1
Mohan, C.2
Gunthor, R.3
Agrawal, D.4
Abbadi, A.E.5
Mohan, K.6
-
87
-
-
0003442571
-
-
S. Das, K. Kochut, J. Miller, A. Sheth, and D. Worah, "Orbwork: A reliable distributed corba-based workflow enactment system for meteor2," 1996.
-
(1996)
Orbwork: A reliable distributed corba-based workflow enactment system for meteor2
-
-
Das, S.1
Kochut, K.2
Miller, J.3
Sheth, A.4
Worah, D.5
-
88
-
-
0032024371
-
From centralized workflow specification to distributed workflow execution
-
P. Muth, D. Wodtke, J. Weǐenfels, A. K. Dittrich, and G. Weikum, "From centralized workflow specification to distributed workflow execution," Journal of Intelligent Information Systems, vol. 10, pp. 159-184, 1998.
-
(1998)
Journal of Intelligent Information Systems
, vol.10
, pp. 159-184
-
-
Muth, P.1
Wodtke, D.2
Weǐenfels, J.3
Weikum, G.4
-
89
-
-
84948960269
-
A formal foundation for distributed work flow execution based on state charts
-
Database Theory - ICDT '97
-
D. Wodtke and G. Weikum, "A formal foundation for distributed workflow execution based on state charts," in International Conference on Database Theory, pp. 230-246, 1997. (Pubitemid 127013756)
-
(1997)
Lecture Notes in Computer Science
, Issue.1186
, pp. 230-246
-
-
Wodtke, D.1
Weikum, G.2
-
91
-
-
17444404063
-
Experiments in building experiential trust in a society of objective-trust based agents
-
M. Witkowski, A. Artikis, and J. Pitt, "Experiments in building experiential trust in a society of objective-trust based agents," in Autonomous Agents & Multiagent Systems/International Conference on Autonomous Agents, pp. 111-132, 2000.
-
(2000)
Autonomous Agents & Multiagent Systems/International Conference on Autonomous Agents
, pp. 111-132
-
-
Witkowski, M.1
Artikis, A.2
Pitt, J.3
-
92
-
-
84880467894
-
The eigentrust algorithm for reputation management in p2p networks
-
(New York, NY, USA) ACM
-
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, "The eigentrust algorithm for reputation management in p2p networks," in Proc. 12th international conference on World Wide Web, WWW '03, (New York, NY, USA), pp. 640-651, ACM, 2003.
-
(2003)
Proc. 12th international conference on World Wide Web, WWW '03
, pp. 640-651
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
95
-
-
0041524661
-
Delegation logic: A logicbased approach to distributed authorization
-
N. Li, B. N. Grosof, and J. Feigenbaum, "Delegation logic: A logicbased approach to distributed authorization," ACM Transactions on Information and System Security, vol. 6, pp. 128-171, 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
96
-
-
19944395899
-
Propagation of trust and distrust
-
Thirteenth International World Wide Web Conference Proceedings, WWW2004
-
R. V. Guha, R. Kumar, P. Raghavan, and A. Tomkins, "Propagation of trust and distrust," in World Wide Web Conference Series, pp. 403-412, 2004. (Pubitemid 40752775)
-
(2004)
Thirteenth International World Wide Web Conference Proceedings, WWW2004
, pp. 403-412
-
-
Guha, R.1
Raghavan, P.2
Kumar, R.3
Tomkins, A.4
-
97
-
-
29844444091
-
Propagation models for trust and distrust in social networks
-
DOI 10.1007/s10796-005-4807-3
-
C. nicolas Ziegler and G. Lausen, "Propagation models for trust and distrust in social networks," Information Systems Frontiers, vol. 7, pp. 337-358, 2005. (Pubitemid 43037076)
-
(2005)
Information Systems Frontiers
, vol.7
, Issue.4-5
, pp. 337-358
-
-
Ziegler, C.-N.1
Lausen, G.2
-
98
-
-
33745877934
-
Exploring different types of trust propagation
-
Trust Management - 4th International Conference, iTrust 2006, Proceedings
-
A. Jšang, S. Marsh, and S. Pope, "Exploring different types of trust propagation," in iTrust, pp. 179-192, 2006. (Pubitemid 44045025)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3986
, pp. 179-192
-
-
Josang, A.1
Marsh, S.2
Pope, S.3
-
100
-
-
70450214119
-
An ontology of trust - Formal semantics and transitivity
-
DOI 10.1145/1151454.1151499, Proc. of the 8th Int. Conf. on Electronic Commerce 2006 - The New E-Commerce: Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet
-
J. Huang and M. S. Fox, "An ontology of trust: formal semantics and transitivity," in International Conference on Electronic Commerce, pp. 259-270, 2006. (Pubitemid 47140666)
-
(2006)
Proceedings of the ACM Conference on Electronic Commerce
, pp. 259-270
-
-
Huang, J.1
Fox, M.S.2
-
101
-
-
77950239995
-
A review on computational trust models for multi-agent systems
-
G. Lu, J. Lu, S. Yao, and J. Yip, "A review on computational trust models for multi-agent systems," in International Conference on Internet Computing, pp. 325-331, 2007.
-
(2007)
International Conference on Internet Computing
, pp. 325-331
-
-
Lu, G.1
Lu, J.2
Yao, S.3
Yip, J.4
-
102
-
-
31444456909
-
A survey of data provenance in e-science
-
DOI 10.1145/1084805.1084812
-
Y. L. Simmhan, B. Plale, and D. Gannon, "A survey of data provenance in e-science," Sigmod Record, vol. 34, pp. 31-36, 2005. (Pubitemid 43152529)
-
(2005)
SIGMOD Record
, vol.34
, Issue.3
, pp. 31-36
-
-
Simmhan, Y.L.1
Plale, B.2
Gannon, D.3
-
103
-
-
44149113078
-
Trust type based semantic Web services assessment and selection
-
DOI 10.1109/ICACT.2008.4494190, 4494190, 10th International Conference on Advanced Communication Technology, ICACT 2008 - Proceedings
-
Y. Kim and K.-G. Doh, "Trust type based semantic web services assessment and selection," in Proc. 10th Int. Conf. Advanced Communication Technology ICACT 2008, vol. 3, pp. 2048-2053, 2008. (Pubitemid 351714918)
-
(2008)
International Conference on Advanced Communication Technology, ICACT
, vol.3
, pp. 2048-2053
-
-
Kim, Y.1
Doh, K.-G.2
-
104
-
-
35248900514
-
Composition and evaluation of trustworthy web services
-
IEEE Press
-
S. J. H. Yang, J. S. F. Hsieh, B. C. W. Lan, and J.-Y. Chung, "Composition and evaluation of trustworthy web services," in Proc. IEEE EEE05 international workshop on Business services networks, BSN '05, (Piscataway, NJ, USA), pp. 5-5, IEEE Press, 2005.
-
(2005)
Proc. IEEE EEE05 international workshop on Business services networks, BSN '05, (Piscataway, NJ, USA)
, pp. 5-5
-
-
Yang, S.J.H.1
Hsieh, J.S.F.2
Lan, B.C.W.3
Chung, J.-Y.4
-
105
-
-
79951870161
-
Trustworthy service selection and composition
-
17 February 2011
-
C.-W. Hang and M. P. Singh, "Trustworthy service selection and composition," ACM Trans. Auton. Adapt. Syst., vol. 6, pp. 5:1-5:17, February 2011.
-
ACM Trans. Auton. Adapt. Syst
, vol.6
, Issue.5
, pp. 1-5
-
-
Hang, C.-W.1
Singh, M.P.2
-
106
-
-
0032218229
-
A security architecture for computational grids
-
ACM
-
I. Foster, C. Kesselman, G. Tsudik, and S. Tuecke, "A security architecture for computational grids," in Proc. 5th ACM conference on Computer and communications security, CCS '98, (New York, NY, USA), pp. 83-92, ACM, 1998.
-
(1998)
Proc. 5th ACM conference on Computer and communications security, CCS '98, (New York, NY, USA)
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
107
-
-
0142187797
-
A novel two-level trust model for grid
-
T. Li, H. Zhu, and K. yan Lam, "A novel two-level trust model for grid," in International Conference on Information and Communication Security, pp. 214-225, 2003.
-
(2003)
International Conference on Information and Communication Security
, pp. 214-225
-
-
Li, T.1
Zhu, H.2
Yan Lam, K.3
-
108
-
-
84887853842
-
A community authorization service for group collaboration
-
IEEE Computer Society
-
L. Pearlman, V. Welch, I. Foster, C. Kesselman, and S. Tuecke, "A community authorization service for group collaboration," in Proc. 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02), POLICY '02, (Washington, DC, USA), pp. 50-, IEEE Computer Society, 2002.
-
(2002)
Proc. 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02), POLICY '02, (Washington, DC, USA)
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
-
109
-
-
84944456655
-
The prima system for privilege management, authorization and enforcement in grid environments
-
(Washington, DC, USA) IEEE Computer Society
-
M. Lorch, D. B. Adams, D. Kafura, M. S. R. Koneni, A. Rathi, and S. Shah, "The prima system for privilege management, authorization and enforcement in grid environments," in Proc. 4th International Workshop on Grid Computing, GRID '03, (Washington, DC, USA), pp. 109-, IEEE Computer Society, 2003.
-
(2003)
Proc. 4th International Workshop on Grid Computing, GRID '03
-
-
Lorch, M.1
Adams, D.B.2
Kafura, D.3
Koneni, M.S.R.4
Rathi, A.5
Shah, S.6
-
110
-
-
3142653204
-
An authorization system for virtual organizations
-
Santiago de Compostela
-
R. Alfieri, R. Cecchini, V. Ciaschini, . Frohner, A. Gianoli, K. Lřentey, F. Spataro, and I. Firenze, "an authorization system for virtual organizations," in In Proc. 1st European Across Grids Conference, Santiago de Compostela, pp. 13-14, 2003.
-
(2003)
Proc. 1st European Across Grids Conference
, pp. 13-14
-
-
Alfieri, R.1
Cecchini, R.2
Ciaschini Frohner, V.3
Gianoli, A.4
Lřentey, K.5
Spataro, F.6
Firenze, I.7
-
111
-
-
84885800481
-
Enabling the provisioning and management of a federated grid trust fabric
-
S. Langella, S. Oster, S. Hastings, F. Siebenlist, T. Kurc, and J. Saltz, "Enabling the provisioning and management of a federated grid trust fabric." Gaithersburg 6th Annual PKI R&D Workshop, 2007.
-
(2007)
Gaithersburg 6th Annual PKI R&D Workshop
-
-
Langella, S.1
Oster, S.2
Hastings, S.3
Siebenlist, F.4
Kurc, T.5
Saltz, J.6
-
112
-
-
33748043984
-
Semantic access control for information interoperation
-
SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
-
C.-C. Pan, P. Mitra, and P. Liu, "Semantic access control for information interoperation," in Proc. eleventh ACM symposium on Access control models and technologies, SACMAT '06, (New York, NY, USA), pp. 237-246, ACM, 2006. (Pubitemid 44300761)
-
(2006)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, vol.2006
, pp. 237-246
-
-
Pan, C.-C.1
Mitra, P.2
Liu, P.3
-
113
-
-
34548016797
-
Using semantics for automatic enforcement of access control policies among dynamic coalitions
-
DOI 10.1145/1266840.1266877, SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
-
J. Warner, V. Atluri, R. Mukkamala, and J. Vaidya, "Using semantics for automatic enforcement of access control policies among dynamic coalitions," in Proc. 12th ACM symposium on Access control models and technologies, SACMAT '07, (New York, NY, USA), pp. 235-244, ACM, 2007. (Pubitemid 47281558)
-
(2007)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, pp. 235-244
-
-
Warner, J.1
Atluri, V.2
Mukkamala, R.3
Vaidya, J.4
-
114
-
-
84864578039
-
Interoperable semantic access control for highly dynamic coalitions
-
H. Koshutanski and A. Maǎ, "Interoperable semantic access control for highly dynamic coalitions," Security and Communication Networks, vol. 3, pp. 565-594, 2010.
-
(2010)
Security and Communication Networks
, vol.3
, pp. 565-594
-
-
Koshutanski, H.1
Maǎ, A.2
-
115
-
-
77958087461
-
Security policies in distributed cscw and workflow systems
-
T. Ahmed and A. R. Tripathi, "Security policies in distributed cscw and workflow systems," IEEE Trans. Syst. Man Cybern. A, Syst. Hum., vol. 40, no. 6, pp. 1220-1231, 2010.
-
(2010)
IEEE Trans. Syst. Man Cybern. A, Syst. Hum.
, vol.40
, Issue.6
, pp. 1220-1231
-
-
Ahmed, T.1
Tripathi, A.R.2
-
117
-
-
84864575364
-
Deriving policies from grid security requirements model
-
Springer US
-
S. Naqvi, A. E. Arenas, and P. Massonet, "Deriving policies from grid security requirements model," in Achievements in European Research on Grid Systems (S. Gorlatch, M. Bubak, and T. Priol, eds.), pp. 151-163, Springer US, 2008.
-
(2008)
Achievements in European Research on Grid Systems (S. Gorlatch, M. Bubak, and T. Priol, eds.)
, pp. 151-163
-
-
Naqvi, S.1
Arenas, A.E.2
Massonet, P.3
-
118
-
-
84864577450
-
Security requirements elaborations for grid data management systems
-
S. Naqvi, C. Ponsard, P. Massonet, and A. Arenas, "Security requirements elaborations for grid data management systems," International Journal of System of Systems Engineering, 2008.
-
(2008)
International Journal of System of Systems Engineering
-
-
Naqvi, S.1
Ponsard, C.2
Massonet, P.3
Arenas, A.4
-
119
-
-
19644386039
-
Gridadmin: Decentralising grid administration using trust management
-
T. B. Quillinan, B. C. Clayton, and S. N. Foley, "Gridadmin: Decentralising grid administration using trust management," in in Proc. ISPDC/HeteroPar 04, p. 184, 2004.
-
(2004)
Proc. ISPDC/HeteroPar
, vol.4
, pp. 184
-
-
Quillinan, T.B.1
Clayton, B.C.2
Foley, S.N.3
-
120
-
-
68449090010
-
Enhancing grid security by fine-grained behavioral control and negotiation-based authorization
-
August
-
H. Koshutanski, A. Lazouski, F. Martinelli, and P. Mori, "Enhancing grid security by fine-grained behavioral control and negotiation-based authorization," Int. J. Inf. Secur., vol. 8, pp. 291-314, August 2009.
-
(2009)
Int. J. Inf. Secur.
, vol.8
, pp. 291-314
-
-
Koshutanski, H.1
Lazouski, A.2
Martinelli, F.3
Mori, P.4
-
123
-
-
33947636343
-
Reputation-based grid resource selection
-
B. K. Alunkal, I. Veljkovic, G. V. Laszewski, and K. Amin, "Reputation-based grid resource selection," in In Workshop on Adaptive Grid Middleware, p. 28, 2003.
-
(2003)
Workshop on Adaptive Grid Middleware
, pp. 28
-
-
Alunkal, B.K.1
Veljkovic, I.2
Laszewski, G.V.3
Amin, K.4
-
124
-
-
33846973728
-
Fire: An integrated trust and reputation model for open multi-agent systems
-
T. D. Huynh, N. R. Jennings, and N. R. Shadbolt, "Fire: An integrated trust and reputation model for open multi-agent systems," in European Conference on Artificial Intelligence, pp. 18-22, 2004.
-
(2004)
European Conference on Artificial Intelligence
, pp. 18-22
-
-
Huynh, T.D.1
Jennings, N.R.2
Shadbolt, N.R.3
-
125
-
-
62349132763
-
Collaboration through computation: Incorporating trust model into service-based software systems
-
M. G. Uddin, M. Zulkernine, and S. I. Ahamed, "Collaboration through computation: incorporating trust model into service-based software systems," Service Oriented Computing and Applications, vol. 3, pp. 47-63, 2009.
-
(2009)
Service Oriented Computing and Applications
, vol.3
, pp. 47-63
-
-
Uddin, M.G.1
Zulkernine, M.2
Ahamed, S.I.3
-
126
-
-
84864622779
-
Towards a flexible trust model for grid environments
-
(M. Jeckle, R. Kowalczyk, and P. Braun, eds.) 3270 of Lecture Notes in Computer Science Springer Berlin /Heidelberg
-
E. Papalilo and B. Freisleben, "Towards a flexible trust model for grid environments," in Grid Services Engineering and Management (M. Jeckle, R. Kowalczyk, and P. Braun, eds.), vol. 3270 of Lecture Notes in Computer Science, pp. 35-65, Springer Berlin /Heidelberg, 2004.
-
(2004)
Grid Services Engineering and Management
, pp. 35-65
-
-
Papalilo, E.1
Freisleben, B.2
-
128
-
-
33845370375
-
Result verification and trust-based scheduling in peer-to-peer Grids
-
DOI 10.1109/P2P.2005.32, 1551018, Proceedings - Fifth IEEE International Conference on Peer-to-Peer Computing, P2P 2005
-
S. Zhao, V. Lo, and C. GauthierDickey, "Result verification and trust-based scheduling in peer-to-peer grids," in Proc. Fifth IEEE International Conference on Peer-to-Peer Computing, (Washington, DC, USA), pp. 31-38, IEEE Computer Society, 2005. (Pubitemid 44883087)
-
(2005)
Proceedings - Fifth IEEE International Conference on Peer-to-Peer Computing, P2P 2005
, vol.2005
, pp. 31-38
-
-
Zhao, S.1
Lo, V.2
GauthierDickey, C.3
-
130
-
-
34248579323
-
Sabotage-tolerance and trust management in desktop grid computing
-
DOI 10.1016/j.future.2006.12.001, PII S0167739X06002147
-
P. Domingues, B. Sousa, and L. M. Silva, "Sabotage-tolerance and trust management in desktop grid computing," Future Generation Computer Systems, vol. 23, pp. 904-912, 2007. (Pubitemid 46755400)
-
(2007)
Future Generation Computer Systems
, vol.23
, Issue.7
, pp. 904-912
-
-
Domingues, P.1
Sousa, B.2
Moura Silva, L.3
-
132
-
-
84887937075
-
Towards trust-aware resource management in grid computing systems
-
F. Azzedin and M. Maheswaran, "Towards trust-aware resource management in grid computing systems," in Cluster Computing and the Grid, pp. 452-457, 2002.
-
(2002)
Cluster Computing and the Grid
, pp. 452-457
-
-
Azzedin, F.1
Maheswaran, M.2
-
133
-
-
15744392932
-
Trusting agents for grid computing
-
2004 IEEE International Conference on Systems, Man and Cybernetics, SMC 2004
-
J. R. D. Dyson, N. E. Griffiths, H. N. L. C. Keung, S. A. Jarvis, and G. R. Nudd, "Trusting agents for grid computing," in IEEE International Conference on Systems, Man, and Cybernetics, pp. 3187-3192, 2004. (Pubitemid 40408323)
-
(2004)
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics
, vol.4
, pp. 3187-3192
-
-
Dyson, J.R.D.1
Griffiths, N.E.2
Keung, H.N.L.C.3
Jarvis, S.A.4
Nudd, G.R.5
-
134
-
-
84864607603
-
-
CoreGRID Technical Report, TR-0069
-
A. Sedrakian, R. M. Badia, J. M. Přez, R. Sirvent, T. Kielmann, and A. Merzky, "Reliability and trust based workflows job mapping on the grid," tech. rep., Institute on Grid Systems, Tools and Environments, CoreGRID Technical Report, TR-0069, 2007.
-
(2007)
Reliability and trust based workflows job mapping on the grid," tech. rep., Institute on Grid Systems, Tools and Environments
-
-
Sedrakian, A.1
Badia, R.M.2
Přez, J.M.3
Sirvent, R.4
Kielmann, T.5
Merzky, A.6
-
135
-
-
77954100714
-
-
tech. rep., Internet and Grid Computing Laboratory, University of Southern California, Los Angeles
-
S. Song and K. Hwang, "Dynamic grid security with trust integration and optimized resource allocation," tech. rep., Internet and Grid Computing Laboratory, University of Southern California, Los Angeles, 2004.
-
(2004)
Dynamic grid security with trust integration and optimized resource allocation
-
-
Song, S.1
Hwang, K.2
-
136
-
-
35048858013
-
Fuzzy trust integration for security enforcement in grid computing
-
S. Song, K. Hwang, and M. Macwan, "Fuzzy trust integration for security enforcement in grid computing," in in Proc. IFIP International Conf. on Network and Parallel Computing, (NPC-2004, pp. 9-21, Springer-Verlag, 2004. (Pubitemid 39746614)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3222
, pp. 9-21
-
-
Song, S.1
Hwang, K.2
Macwan, M.3
-
137
-
-
28844464697
-
Trusted Grid computing with security binding and trust integration
-
DOI 10.1007/s10723-005-5465-x
-
S. Song, K. Hwang, and Y. kwong Kwok, "Trusted grid computing with security binding and trust integration," Journal of Grid Computing, vol. 3, pp. 53-73, 2005. (Pubitemid 41762485)
-
(2005)
Journal of Grid Computing
, vol.3
, Issue.1-2
, pp. 53-73
-
-
Song, S.1
Hwang, K.2
Kwok, Y.-K.3
-
138
-
-
24944495031
-
Experience-based trust: Enabling effective resource selection in a grid environment
-
Trust Management: Third International Conference, iTrust 2005, Proceedings
-
N. Griffiths and K. ming Chao, "Experience-based trust: Enabling effective resource selection in a grid environment," in iTrust, pp. 240-255, 2005. (Pubitemid 41313132)
-
(2005)
Lecture Notes in Computer Science
, vol.3477
, pp. 240-255
-
-
Griffiths, N.1
Chao, K.-M.2
-
139
-
-
33750028604
-
Negotiating trust on the grid
-
J. Basney, W. Nejdl, D. Olmedilla, V. Welch, and M. Winslett, "Negotiating trust on the grid," in In 2nd WWW Workshop on Semantics in P2P and Grid Computing, 2004.
-
(2004)
2nd WWW Workshop on Semantics in P2P and Grid Computing
-
-
Basney, J.1
Nejdl, W.2
Olmedilla, D.3
Welch, V.4
Winslett, M.5
-
140
-
-
34748865949
-
Policy-driven negotiation for authorization in the grid
-
DOI 10.1109/POLICY.2007.36, 4262590, Proceedings - Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2007
-
I. Constandache, D. Olmedilla, and F. Siebenlist, "Policy-driven negotiation for authorization in the grid," in Policies for Distributed Systems and Networks, pp. 211-220, 2007. (Pubitemid 47469564)
-
(2007)
Proceedings - Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2007
, pp. 211-220
-
-
Constandache, I.1
Olmedilla, D.2
Siebenlist, F.3
-
142
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
February
-
T. Yu, M. Winslett, and K. E. Seamons, "Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation," ACM Trans. Inf. Syst. Secur., vol. 6, pp. 1-42, February 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
143
-
-
11244281946
-
Responding to policies at runtime in trustbuilder
-
Proceedings - Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2004
-
B. Smith, K. E. Seamons, and M. D. Jones, "Responding to policies at runtime in trustbuilder," in Proc. Fifth IEEE Int. Workshop Policies for Distributed Systems and Networks POLICY 2004, pp. 149-158, 2004. (Pubitemid 40061194)
-
(2004)
Proceedings - Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2004
, pp. 149-158
-
-
Smith, B.1
Seamons, K.E.2
Jones, M.D.3
-
144
-
-
0038148412
-
A unified scheme for resource protection in automated trust negotiation
-
(Washington, DC, USA) IEEE Computer Society
-
T. Yu and M. Winslett, "A unified scheme for resource protection in automated trust negotiation," in Proc. 2003 IEEE Symposium on Security and Privacy, SP '03, (Washington, DC, USA), pp. 110-, IEEE Computer Society, 2003.
-
(2003)
Proc. 2003 IEEE Symposium on Security and Privacy, SP '03
, vol.110
-
-
Yu, T.1
Winslett, M.2
-
145
-
-
4344696700
-
-
A. Uszok, J. M. Bradshaw, M. Johnson, R. Jeffers, A. Tate, J. Dalton, and S. Aitken, "Kaos policy management for semantic web services," vol. 19, no. 4, pp. 32-41, 2004.
-
(2004)
Kaos Policy Management for Semantic Web Services
, vol.19
, Issue.4
, pp. 32-41
-
-
Uszok, A.1
Bradshaw, J.M.2
Johnson, M.3
Jeffers, R.4
Tate, A.5
Dalton, J.6
Aitken, S.7
-
146
-
-
33749080579
-
Automated discovery, interaction and composition of Semantic Web services
-
DOI 10.1016/j.websem.2003.07.002
-
K. P. Sycara, M. Paolucci, A. Ankolekar, and N. Srinivasan, "Automated discovery, interaction and composition of semantic web services," Journal of Web Semantics, vol. 1, pp. 27-46, 2003. (Pubitemid 44914725)
-
(2003)
Web Semantics
, vol.1
, Issue.1
, pp. 27-46
-
-
Sycara, K.1
Paolucci, M.2
Ankolekar, A.3
Srinivasan, N.4
-
147
-
-
33646851522
-
How to exploit ontologies for trust negotiation
-
T. Leithead, W. Nejdl, D. Olmedilla, K. E. Seamons, M. Winslett, T. Yu, and C. C. Zhang, "How to exploit ontologies for trust negotiation," in International Semantic Web Conference, 2004.
-
(2004)
International Semantic Web Conference
-
-
Leithead, T.1
Nejdl, W.2
Olmedilla, D.3
Seamons, K.E.4
Winslett, M.5
Yu, T.6
Zhang, C.C.7
-
148
-
-
70449630325
-
An enforcement architecture for security and trust policies in federated web-service-based systems
-
Z. Wu and L. Wang, "An enforcement architecture for security and trust policies in federated web-service-based systems," in International Computer Software and Applications Conference, pp. 329-334, 2009.
-
(2009)
International Computer Software and Applications Conference
, pp. 329-334
-
-
Wu, Z.1
Wang, L.2
-
149
-
-
33745004626
-
Driving and monitoring provisional trust negotiation with metapolicies
-
DOI 10.1109/POLICY.2005.13, 1454299, Proceedings - Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2005
-
P. A. Bonatti and D. Olmedilla, "Driving and monitoring provisional trust negotiation with metapolicies," in Policies for Distributed Systems and Networks, pp. 14-23, 2005. (Pubitemid 43861244)
-
(2005)
Proceedings - Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2005
, vol.2005
, pp. 14-23
-
-
Bonatti, P.1
Olmedilla, D.2
-
151
-
-
35348960438
-
Monitoring, policing and trust for grid-based virtual organisations
-
(S. J. Cox and D. W. Walker, eds.), (Nottingham, UK) September
-
J. Patel, W. T. L. Teacy, N. R. Jennings, M. Luck, S. Chalmers, N. Oren, T. J. Norman, A. Preece, P. M. D. Gray, G. Shercliff, P. J. Stockreisser, J. Shao, W. A. Gray, N. J. Fiddian, and S. Thompson, "Monitoring, policing and trust for grid-based virtual organisations," in Proc. UK e-Science All Hands Meeting 2005 (S. J. Cox and D. W. Walker, eds.), (Nottingham, UK), pp. 891-898, September 2005.
-
(2005)
Proc. UK e-Science All Hands Meeting
, vol.2005
, pp. 891-898
-
-
Patel, J.1
Teacy, W.T.L.2
Jennings, N.R.3
Luck, M.4
Chalmers, S.5
Oren, N.6
Norman, T.J.7
Preece, A.8
Gray, P.M.D.9
Shercliff, G.10
Stockreisser, P.J.11
Shao, J.12
Gray, W.A.13
Fiddian, N.J.14
Thompson, S.15
-
152
-
-
34250776507
-
Security and Trust in IT Business Outsourcing: A Manifesto
-
DOI 10.1016/j.entcs.2006.08.030, PII S1571066107003015
-
Y. Karabulut, F. Kerschbaum, F. Massacci, P. Robinson, and A. Yautsiukhin, "Security and trust in it business outsourcing: a manifesto," Electronic Notes in Theoretical Computer Science, vol. 179, pp. 47-58, 2007. (Pubitemid 46963712)
-
(2007)
Electronic Notes in Theoretical Computer Science
, vol.179
, pp. 47-58
-
-
Karabulut, Y.1
Kerschbaum, F.2
Massacci, F.3
Robinson, P.4
Yautsiukhin, A.5
-
153
-
-
34250717227
-
Trusted virtual domains: Toward secure distributed services
-
J. L. Griffin, T. Jaeger, R. Perez, R. Sailer, L. V. Doorn, and R. Cčeres, "Trusted virtual domains: Toward secure distributed services," in In Proc. First Workshop on Hot Topics in System Dependability (Hotdep05, IEEE Press, 2005.
-
(2005)
Proc. First Workshop on Hot Topics in System Dependability (Hotdep05 IEEE Press
-
-
Griffin, J.L.1
Jaeger, T.2
Perez, R.3
Sailer, R.4
Doorn, L.V.5
Cčeres, R.6
-
154
-
-
0034264831
-
Crossflow: Crossorganizational workflow management in dynamic virtual enterprises
-
P. Grefen, K. Aberer, H. Ludwig, and Y. Hoffner, "Crossflow: Crossorganizational workflow management in dynamic virtual enterprises," International Journal of Computer Systems Science & Engineering, vol. 15, pp. 277-290, 2000.
-
(2000)
International Journal of Computer Systems Science & Engineering
, vol.15
, pp. 277-290
-
-
Grefen, P.1
Aberer, K.2
Ludwig, H.3
Hoffner, Y.4
-
155
-
-
35048873188
-
Trust, security, and contract management challenges for grid-based application service provision
-
M. Gaeta, G. Laria, P. Ritrovato, N. Romano, B. Serhan, S. Wesner, T. Dimitrakos, and D. M. Randal, "Trust, security, and contract management challenges for grid-based application service provision," in iTrust, pp. 362-368, 2004.
-
(2004)
ITrust
, pp. 362-368
-
-
Gaeta, M.1
Laria, G.2
Ritrovato, P.3
Romano, N.4
Serhan, B.5
Wesner, S.6
Dimitrakos, T.7
Randal, D.M.8
-
156
-
-
72849133166
-
Towards a trust and contract management framework for dynamic virtual organisations
-
Kluwer Academic
-
T. Dimitrakos, D. Golby, and P. Kearney, "Towards a trust and contract management framework for dynamic virtual organisations," in In eAdoption and the Knowledge Economy: eChallenges 2004, pp. 27-29, Kluwer Academic, 2004.
-
(2004)
EAdoption and the Knowledge Economy: eChallenges
, vol.2004
, pp. 27-29
-
-
Dimitrakos, T.1
Golby, D.2
Kearney, P.3
-
157
-
-
33749065610
-
Aspects of trusted and secure business-oriented VO management in service oriented architectures
-
DOI 10.1109/CECW.2005.5, 1521004, Proceedings - Seventh IEEE International Conference on E-Commerce Technology Workshops, CEC 2005 Workshops
-
A. Svirskas, M. D. Wilson, A. E. Arenas, E. C. Lupu, N. Tuptuk, D. Chadwick, P. Giambiagi, T. Dimitrakos, and B. Roberts, "Aspects of trusted and secure businesS.-oriented vo management in service oriented architectures.," in CEC Workshops, pp. 3-11, IEEE Computer Society, 2005. (Pubitemid 44459635)
-
(2005)
Proceedings - Seventh IEEE International Conference on E-Commerce Technology Workshops, CEC 2005 Workshops
, vol.2005
, pp. 3-11
-
-
Svirskas, A.1
Wilson, M.D.2
Arenas, A.E.3
Lupu, E.C.4
Tuptuk, N.5
Chadwick, D.6
Giambiagi, P.7
Dimitrakos, T.8
Roberts, B.9
-
158
-
-
7044221923
-
A service-oriented trust management framework
-
Trust, Reputation, and Security: Theories and Practice
-
T. Dimitrakos, "A service-oriented trust management framework," in Proc. 2002 international conference on Trust, reputation, and security: theories and practice, AAMAS'02, (Berlin, Heidelberg), pp. 53-72, Springer-Verlag, 2003. (Pubitemid 36550611)
-
(2003)
Lecture Notes in Computer Science
, Issue.2631
, pp. 53-72
-
-
Dimitrakos, T.1
-
159
-
-
17144369692
-
-
N. Nagaratnam, P. Janson, J. Dayka, A. Nadalin, F. Siebenlist, V. Welch, I. Foster, and S. Tuecke, "The security architecture for open grid services," 2003.
-
(2003)
The Security Architecture for Open Grid Services
-
-
Nagaratnam, N.1
Janson, P.2
Dayka, J.3
Nadalin, A.4
Siebenlist, F.5
Welch, V.6
Foster, I.7
Tuecke, S.8
-
160
-
-
84942318236
-
Security for grid services
-
cs.CR/0306
-
V. Welch, F. Siebenlist, I. T. Foster, J. Bresnahan, K. Czajkowski, J. Gawor, C. Kesselman, S. Meder, L. Pearlman, and S. Tuecke, "Security for grid services," Computing Research Repository, vol. cs.CR/0306, pp. 48-57, 2003.
-
(2003)
Computing Research Repository
, pp. 48-57
-
-
Welch, V.1
Siebenlist, F.2
Foster, I.T.3
Bresnahan, J.4
Czajkowski, K.5
Gawor, J.6
Kesselman, C.7
Meder, S.8
Pearlman, L.9
Tuecke, S.10
-
161
-
-
26844470176
-
Model driven security for inter-organizational workflows in e-government
-
E-Government: Towards Electronic Democracy: International Conference, TCGOV 2005. Proceedings
-
R. Breu, M. Hafner, B. Weber, and A. Nowak, "Model driven security for inter-organizational workflows in e-government," in TCGOV, pp. 122-133, 2005. (Pubitemid 41451179)
-
(2005)
Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science)
, vol.3416
, pp. 122-133
-
-
Breu, R.1
Hafner, M.2
Weber, B.3
Novak, A.4
-
162
-
-
70349683196
-
Security requirements specification in service-oriented business process management
-
M. Menzel, I. Thomas, and C. Meinel, "Security requirements specification in service-oriented business process management," in Availability, Reliability and Security, pp. 41-48, 2009.
-
(2009)
Availability, Reliability and Security
, pp. 41-48
-
-
Menzel, M.1
Thomas, I.2
Meinel, C.3
-
163
-
-
84902840154
-
Toward web services profiles for trust and security in virtual organisations
-
(L. Camarinha-Matos, H. Afsarmanesh, and A. Ortiz, eds.) 186 of IFIP International Federation for Information Processing Springer Boston
-
A. Arenas, I. Djordjevic, T. Dimitrakos, L. Titkov, J. Claessens, C. Geuer-Pollmann, E. Lupu, N. Tuptuk, S. Wesner, and L. Schubert, "Toward web services profiles for trust and security in virtual organisations," in Collaborative Networks and Their Breeding Environments (L. Camarinha-Matos, H. Afsarmanesh, and A. Ortiz, eds.), vol. 186 of IFIP International Federation for Information Processing, pp. 175-182, Springer Boston, 2005.
-
(2005)
Collaborative Networks and Their Breeding Environments
, pp. 175-182
-
-
Arenas, A.1
Djordjevic, I.2
Dimitrakos, T.3
Titkov, L.4
Claessens, J.5
Geuer-Pollmann, C.6
Lupu, E.7
Tuptuk, N.8
Wesner, S.9
Schubert, L.10
-
164
-
-
47749105669
-
A trust based methodology for web service selection
-
(Washington, DC, USA) IEEE Computer Society
-
S. Galizia, A. Gugliotta, and J. Domingue, "A trust based methodology for web service selection," in Proc. International Conference on Semantic Computing, (Washington, DC, USA), pp. 193-200, IEEE Computer Society, 2007.
-
(2007)
Proc. International Conference on Semantic Computing
, pp. 193-200
-
-
Galizia, S.1
Gugliotta, A.2
Domingue, J.3
-
165
-
-
20444480301
-
Toward autonomic Web services trust and selection
-
ICSOC '04: Proceedings of the Second International Conference on Service Oriented Computing
-
E. M. Maximilien and M. P. Singh, "Toward autonomic web services trust and selection," in Proc. 2nd international conference on Service oriented computing, ICSOC '04, (New York, NY, USA), pp. 212-221, ACM, 2004. (Pubitemid 40821152)
-
(2004)
ICSOC '04: Proceedings of the Second International Conference on Service Oriented Computing
, pp. 212-221
-
-
Maximilien, E.M.1
Singh, M.P.2
-
166
-
-
33845310313
-
Trustworthy service selection and composition - Reducing the entropy of service-oriented web
-
DOI 10.1109/INDIN.2005.1560360, 1560360, Proceedings - Thirteenth International Symposium on Temporal Representation and Reasoning, TIME 2006
-
W. Liu, "Trustworthy service selection and composition-reducing the entropy of service-oriented web," in Proc. 3rd IEEE Int. Conf. Industrial Informatics INDIN '05, pp. 104-109, 2005. (Pubitemid 44868848)
-
(2005)
2005 3rd IEEE International Conference on Industrial Informatics, INDIN
, vol.2005
, pp. 104-109
-
-
Liu, W.1
-
167
-
-
1142301944
-
-
H. Skogsrud, B. Benatallah, and F. Casati, "Model-driven trust negotiation for web services," vol. 7, no. 6, pp. 45-52, 2003.
-
(2003)
Model-driven trust negotiation for web services
, vol.7
, Issue.6
, pp. 45-52
-
-
Skogsrud, H.1
Benatallah, B.2
Casati, F.3
-
168
-
-
3543075807
-
An access control framework for business processes for web services
-
(New York, NY, USA) ACM
-
H. Koshutanski and F. Massacci, "An access control framework for business processes for web services," in Proc. 2003 ACM workshop on XML security, XMLSEC '03, (New York, NY, USA), pp. 15-24, ACM, 2003.
-
(2003)
Proc. 2003 ACM workshop on XML security, XMLSEC '03
, pp. 15-24
-
-
Koshutanski, H.1
Massacci, F.2
-
169
-
-
33646824494
-
Trust shaping: Adapting trust establishment and management to application requirements in a service-oriented Grid environment
-
DOI 10.1007/11590354-6, Grid and Cooperative Computing - GCC 2005 - 4th International Conference, Proceedings
-
E. Papalilo, T. Friese, M. Smith, and B. Freisleben, "Trust shaping: Adapting trust establishment and management to application requirements in a service-oriented grid environment," in Grid and Cooperative Computing, pp. 47-58, 2005. (Pubitemid 43774685)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3795
, pp. 47-58
-
-
Papalilo, E.1
Friese, T.2
Smith, M.3
Freisleben, B.4
-
170
-
-
38349102077
-
Balancing trust and incentive in peerto-peer collaborative system
-
Y. Zhang, L. Lin, and J. Huai, "Balancing trust and incentive in peerto-peer collaborative system," in Network Security, vol. 5, pp. 73-81, 2007.
-
(2007)
Network Security
, vol.5
, pp. 73-81
-
-
Zhang, Y.1
Lin, L.2
Huai, J.3
-
171
-
-
70349250946
-
A technical architecture for enforcing usage control requirements in service-oriented architectures
-
(New York, NY, USA) ACM
-
A. Berthold, M. Alam, R. Breu, M. Hafner, A. Pretschner, J.-P. Seifert, and X. Zhang, "A technical architecture for enforcing usage control requirements in service-oriented architectures," in Proc. 2007 ACM workshop on Secure web services, SWS '07, (New York, NY, USA), pp. 18-25, ACM, 2007.
-
(2007)
Proc. 2007 ACM workshop on Secure web services, SWS '07
, pp. 18-25
-
-
Berthold, A.1
Alam, M.2
Breu, R.3
Hafner, M.4
Pretschner, A.5
Seifert, J.-P.6
Zhang, X.7
-
172
-
-
70349690570
-
Enhancing control of service compositions in service-oriented architectures
-
C. Schneider, F. Stumpf, and C. Eckert, "Enhancing control of service compositions in service-oriented architectures," in Proc. Int. Conf. Availability, Reliability and Security ARES '09, pp. 953-959, 2009.
-
(2009)
Proc. Int. Conf. Availability, Reliability and Security ARES '
, vol.9
, pp. 953-959
-
-
Schneider, C.1
Stumpf, F.2
Eckert, C.3
-
173
-
-
58349112752
-
Building an independent integrated authentication service
-
Z. Song, S. Kotani, and R. Masuoka, "Building an independent integrated authentication service," in International Conference for Young Computer Scientists, pp. 2254-2259, 2008.
-
(2008)
International Conference for Young Computer Scientists
, pp. 2254-2259
-
-
Song, Z.1
Kotani, S.2
Masuoka, R.3
-
174
-
-
34250346420
-
Daonity: Grid security with behaviour conformity from trusted computing
-
DOI 10.1145/1179474.1179486, Proceedings of the First ACM Workshop on Scalable Trusted Computing, STC'06. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
W. Mao, F. Yan, and C. Chen, "Daonity: grid security with behaviour conformity from trusted computing," in Proc. first ACM workshop on Scalable trusted computing, STC '06, (New York, NY, USA), pp. 43-46, ACM, 2006. (Pubitemid 47117275)
-
(2006)
Proceedings of the First ACM Workshop on Scalable Trusted Computing, STC'06. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 43-46
-
-
Mao, W.1
Yan, F.2
Chen, C.3
-
176
-
-
54249141830
-
Information security and cryptology ch. Building
-
Berlin, Heidelberg: Springer-Verlag
-
J. Zhan, H. Zhang, and F. Yan, "Information security and cryptology," ch. Building Trusted Sub-domain for the Grid with Trusted Computing, pp. 463-471, Berlin, Heidelberg: Springer-Verlag, 2008.
-
(2008)
Trusted Sub-domain for the Grid with Trusted Computing
, pp. 463-471
-
-
Zhan, J.1
Zhang, H.2
Yan, F.3
-
177
-
-
47749140456
-
Securing grid workflows with trusted computing
-
(M. Bubak, G. van Albada, J. Dongarra, and P. Sloot, eds.) 5103 of Lecture Notes in Computer Science Springer Berlin Heidelberg
-
P.-W. Yau, A. Tomlinson, S. Balfe, and E. Gallery, "Securing grid workflows with trusted computing," in Computational Science ICCS 2008 (M. Bubak, G. van Albada, J. Dongarra, and P. Sloot, eds.), vol. 5103 of Lecture Notes in Computer Science, pp. 510-519, Springer Berlin Heidelberg, 2008.
-
(2008)
Computational Science ICCS 2008
, pp. 510-519
-
-
Yau, P.-W.1
Tomlinson, A.2
Balfe, S.3
Gallery, E.4
-
179
-
-
71549130410
-
Innovations for grid security from trusted computing
-
(B. Christianson, B. Crispo, J. Malcolm, and M. Roe, eds.) 5087 of Lecture Notes in Computer Science Springer Berlin /Heidelberg
-
W. Mao, A. Martin, H. Jin, and H. Zhang, "Innovations for grid security from trusted computing," in Security Protocols (B. Christianson, B. Crispo, J. Malcolm, and M. Roe, eds.), vol. 5087 of Lecture Notes in Computer Science, pp. 132-149, Springer Berlin /Heidelberg, 2009.
-
(2009)
Security Protocols
, pp. 132-149
-
-
Mao, W.1
Martin, A.2
Jin, H.3
Zhang, H.4
-
180
-
-
47749117634
-
Models in software engineering ch. Modeling
-
Berlin, Heidelberg: Springer-Verlag
-
M. Hafner, M. Memon, and M. Alam, "Models in software engineering," ch. Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet, pp. 132-144, Berlin, Heidelberg: Springer-Verlag, 2008.
-
(2008)
Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet
, pp. 132-144
-
-
Hafner, M.1
Memon, M.2
Alam, M.3
-
181
-
-
84864577448
-
Sealed grid with downloadable services
-
(T. Priol and M. Vanneschi, eds.) Springer US
-
M. Kuba, D. Kouǐl, and M. Prochžka, "Sealed grid with downloadable services," in Towards Next Generation Grids (T. Priol and M. Vanneschi, eds.), pp. 83-91, Springer US, 2007.
-
(2007)
Towards Next Generation Grids
, pp. 83-91
-
-
Kuba, M.1
Kouǐl, D.2
Prochžka, M.3
-
183
-
-
47749138230
-
Using trusted computing in commercial grids
-
(B. Akhgar, ed.) Springer London
-
P.-W. Yau and A. Tomlinson, "Using trusted computing in commercial grids," in ICCS 2007 (B. Akhgar, ed.), pp. 31-36, Springer London, 2007.
-
(2007)
ICCS
, vol.2007
, pp. 31-36
-
-
Yau, P.-W.1
Tomlinson, A.2
-
186
-
-
4644323662
-
Enhancing grid security with trust management
-
Proceedings - 2004 IEEE International Conference on Services Computing, SCC 2004
-
C. Lin, V. Varadharajan, Y. Wang, and V. Pruthi, "Enhancing grid security with trust management," in Proc. IEEE Int. Conf. Services Computing (SCC 2004), pp. 303-310, 2004. (Pubitemid 40201759)
-
(2004)
Proceedings - 2004 IEEE International Conference on Services Computing, SCC 2004
, pp. 303-310
-
-
Lin, C.1
Varadharajan, V.2
Wang, Y.3
Pruthi, V.4
-
187
-
-
80455131570
-
-
L. Moreau, S. Chapman, A. Schreiber, R. Hempel, L. Varga, U. Cortes, and S. Willmott, "Provenance-based trust for grid computing position paper," 2004.
-
(2004)
Provenance-based trust for grid computing position paper
-
-
Moreau, L.1
Chapman, S.2
Schreiber, A.3
Hempel, R.4
Varga, L.5
Cortes, U.6
Willmott, S.7
-
188
-
-
0035124553
-
When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web
-
DOI 10.1002/1532-2890(2000)52:1<12::AID-ASI1062>3.0.CO;2-V
-
C. A. Lynch, "When documents deceive: trust and provenance as new factors for information retrieval in a tangled web," J. Am. Soc. Inf. Sci. Technol., vol. 52, pp. 12-17, January 2001. (Pubitemid 32133545)
-
(2001)
Journal of the American Society for Information Science and Technology
, vol.52
, Issue.1
, pp. 12-17
-
-
Lynch, C.A.1
-
189
-
-
32944460934
-
On homeland security and the semantic web: A provenance and trust aware inference framework
-
AAAI Press
-
L. Ding, P. Kolari, T. Finin, A. Joshi, Y. Peng, and Y. Yesha, "On homeland security and the semantic web: A provenance and trust aware inference framework," in In AAAI Spring Symposium on AI Technologies for Homeland Security, pp. 21-23, AAAI Press, 2005.
-
(2005)
AAAI Spring Symposium on AI Technologies for Homeland Security
, pp. 21-23
-
-
Ding, L.1
Kolari, P.2
Finin, T.3
Joshi, A.4
Peng, Y.5
Yesha, Y.6
-
190
-
-
35048864354
-
Using semantic web technologies for representing E-science provenance
-
J. Zhao, C. Wroe, C. A. Goble, R. Stevens, D. Quan, and R. M. Greenwood, "Using semantic web technologies for representing e-science provenance," in International Semantic Web Conference, pp. 92-106, 2004. (Pubitemid 39743877)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3298
, pp. 92-106
-
-
Zhao, J.1
Wroe, C.2
Goble, C.3
Stevens, R.4
Quan, D.5
Greenwood, M.6
-
191
-
-
52149096452
-
Quantifying trust based on service level agreement for software as a service
-
L. Tan, C. hung Chi, and J. Deng, "Quantifying trust based on service level agreement for software as a service," in International Computer Software and Applications Conference, pp. 116-119, 2008.
-
(2008)
International Computer Software and Applications Conference
, pp. 116-119
-
-
Tan, L.1
Deng, J.2
-
192
-
-
71049170403
-
Trust assessment using provenance in service oriented applications
-
S. Rajbhandari, A. Contes, O. F. Rana, V. Deora, and I. Wootten, "Trust assessment using provenance in service oriented applications," in Enterprise Distributed Object Computing Conference, 2006.
-
(2006)
Enterprise Distributed Object Computing Conference
-
-
Rajbhandari, S.1
Contes, A.2
Rana, O.F.3
Deora, V.4
Wootten, I.5
-
193
-
-
33751073448
-
Evaluating provenance-based trust for scientific workflows
-
DOI 10.1109/CCGRID.2006.43, 1630842, Sixth IEEE International Symposium on Cluster Computing and the Grid: Spanning the World and Beyond, 2006. CCGRID 06
-
S. Rajbhandari, I. Wootten, A. S. Ali, and O. F. Rana, "Evaluating provenance-based trust for scientific workflows," in Cluster Computing and the Grid, pp. 365-372, 2006. (Pubitemid 44761727)
-
(2006)
Sixth IEEE International Symposium on Cluster Computing and the Grid, 2006. CCGRID 06
, pp. 365-372
-
-
Rajbhandari, S.1
Wootten, I.2
Shaikh Ali, A.3
Rana, O.F.4
-
194
-
-
84864627715
-
Establishing workflow trust using provenance information
-
S. Rajbhandari, A. Contes, O. F.Rana, V. Deora, , and I. Wootten, "Establishing workflow trust using provenance information," in IEEE Workshop on Modelling Autonomic Communications Environments (MACE), 2006.
-
(2006)
IEEE Workshop on Modelling Autonomic Communications Environments (MACE)
-
-
Rajbhandari, S.1
Contes, A.2
Rana, O.F.3
Deora, V.4
Wootten, I.5
-
195
-
-
51849083449
-
Scientific workflow provenance querying with security views
-
A. Chebotko, S. Chang, S. Lu, F. Fotouhi, and P. Yang, "Scientific workflow provenance querying with security views," in Proc. Ninth Int. Conf. Web-Age Information Management WAIM '08, pp. 349-356, 2008.
-
(2008)
Proc. Ninth Int. Conf. Web-Age Information Management WAIM '
, vol.8
, pp. 349-356
-
-
Chebotko, A.1
Chang, S.2
Lu, S.3
Fotouhi, F.4
Yang, P.5
-
197
-
-
50649093804
-
Provenance services for distributed workflows
-
IEEE Computer Society
-
S. M. S. d. Cruz, P. M. Barros, P. M. Bisch, M. L. M. Campos, and M. Mattoso, "Provenance services for distributed workflows," in Proc. 2008 Eighth IEEE International Symposium on Cluster Computing and the Grid, (Washington, DC, USA), pp. 526-533, IEEE Computer Society, 2008.
-
(2008)
Proc. 2008 Eighth IEEE International Symposium on Cluster Computing and the Grid, (Washington, DC, USA)
, pp. 526-533
-
-
Cruz, S.M.S.D.1
Barros, P.M.2
Bisch, P.M.3
Campos, M.L.M.4
Mattoso, M.5
-
200
-
-
84949747356
-
An authorization model for workflows
-
V. Atluri and W. kuang Huang, "An authorization model for workflows," in European Symposium on Research in Computer Security, pp. 44-64, 1996. (Pubitemid 126128893)
-
(1996)
Lecture Notes in Computer Science
, Issue.1146
, pp. 44-64
-
-
Atluri, V.1
Huang, W.-K.2
-
201
-
-
33751436350
-
DW-RBAC: A formal security model of delegation and revocation in workflow systems
-
DOI 10.1016/j.is.2005.11.008, PII S0306437905001122
-
J. Wainer, A. Kumar, and P. Barthelmess, "DW.-rbac: A formal security model of delegation and revocation in workflow systems," Inf. Syst., vol. 32, pp. 365-384, May 2007. (Pubitemid 44821542)
-
(2007)
Information Systems
, vol.32
, Issue.3
, pp. 365-384
-
-
Wainer, J.1
Kumar, A.2
Barthelmess, P.3
-
202
-
-
58449093195
-
Secure workflow development from early requirements analysis
-
M. Seguran, C. Hebert, and G. Frankova, "Secure workflow development from early requirements analysis," in Proc. IEEE Sixth European Conf. on Web Services ECOWS '08, pp. 125-134, 2008.
-
(2008)
Proc. IEEE Sixth European Conf. on Web Services ECOWS '08
, pp. 125-134
-
-
Seguran, M.1
Hebert, C.2
Frankova, G.3
-
203
-
-
35048841167
-
Requirements engineering meets trust management model, methodology, and reasoning
-
Springer Verlag
-
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone, "Requirements engineering meets trust management model, methodology, and reasoning," in In Proc. iTrust 04, LNCS 2995, pp. 176-190, Springer Verlag, 2004.
-
(2004)
Proc. iTrust 04, LNCS
, vol.2995
, pp. 176-190
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
204
-
-
84864616146
-
-
tech. rep., CLRC Rutherford Appleton Laboratory
-
B. Matthews, J. Bicarregui, and T. Dimitrakos, "Building trust on the grid, trust issues underpinning scalable virtual organisations," tech. rep., CLRC Rutherford Appleton Laboratory, 2001.
-
(2001)
Building trust on the grid, trust issues underpinning scalable virtual organisations
-
-
Matthews, B.1
Bicarregui, J.2
Dimitrakos, T.3
-
206
-
-
33747510016
-
Refactoring service-based systems: How to avoid trusting a workflow service
-
DOI 10.1002/cpe.997
-
H. Chivers and J. A. Mcdermid, "Refactoring service-based systems: how to avoid trusting a workflow service," Concurrency and Computation: Practice and Experience, vol. 18, pp. 1255-1275, 2006. (Pubitemid 44258509)
-
(2006)
Concurrency Computation Practice and Experience
, vol.18
, Issue.10
, pp. 1255-1275
-
-
Chivers, H.1
McDermid, J.2
-
207
-
-
0000206310
-
Security models for web-based applications
-
DOI 10.1145/359205.359224
-
J. B. D. Joshi, W. G. Aref, A. Ghafoor, and E. H. Spafford, "Security models for web-based applications," Commun. ACM, vol. 44, pp. 38-44, February 2001. (Pubitemid 33631852)
-
(2001)
Communications of the ACM
, vol.44
, Issue.2
, pp. 38-44
-
-
Joshi, J.B.D.1
Aref, W.G.2
Ghafoor, A.3
Spafford, E.H.4
-
208
-
-
84864619557
-
-
Globus security policy and implementation
-
"Globus security policy and implementation," 1997.
-
(1997)
-
-
-
210
-
-
18744365186
-
SOWAC: A service-oriented workflow access control model
-
Proceedings of the 28th Annual International Computer Software and Applications Conference, COMPSAC 2004
-
W. Xu, J. Wei, Y. Liu, and J. Li, "Sowac: A service-oriented workflow access control model," in Proc. 28th Annual International Computer Software and Applications Conference-Volume 01, COMPSAC '04, (Washington, DC, USA), pp. 128-134, IEEE Computer Society, 2004. (Pubitemid 40673840)
-
(2004)
Proceedings - International Computer Software and Applications Conference
, vol.1
, pp. 128-134
-
-
Xu, W.1
Wei, J.2
Liu, Y.3
Li, J.4
-
211
-
-
72549109305
-
Authorization model for multilevel security workflow based on rtbac
-
IEEE Press
-
L. Wang and X. Xie, "Authorization model for multilevel security workflow based on rtbac," in Proc. 3rd international conference on Anti-Counterfeiting, security, and identification in communication, ASID'09, (Piscataway, NJ, USA), pp. 520-523, IEEE Press, 2009.
-
(2009)
Proc. 3rd international conference on Anti-Counterfeiting, security, and identification in communication, ASID'09, (Piscataway, NJ, USA)
, pp. 520-523
-
-
Wang, L.1
Xie, X.2
-
212
-
-
84864619559
-
-
Xamcl and oasis security services technical committee
-
"Xamcl and oasis security services technical committee," 2005.
-
(2005)
-
-
-
213
-
-
38949106870
-
Xacml policy integration algorithms
-
29 February
-
P. Mazzoleni, B. Crispo, S. Sivasubramanian, and E. Bertino, "Xacml policy integration algorithms," ACM Trans. Inf. Syst. Secur., vol. 11, pp. 4:1-4:29, February 2008.
-
(2008)
ACM Trans. Inf. Syst. Secur.
, vol.11
, Issue.1-4
, pp. 4
-
-
Mazzoleni, P.1
Crispo, B.2
Sivasubramanian, S.3
Bertino, E.4
-
214
-
-
77953066525
-
Choosing reputable servents in a p2p network
-
F. Cornelli, E. Damiani, S. D. C. di Vimercati, S. Paraboschi, and P. Samarati, "Choosing reputable servents in a p2p network," in World Wide Web Conference Series, pp. 376-386, 2002.
-
(2002)
World Wide Web Conference Series
, pp. 376-386
-
-
Cornelli, F.1
Damiani, E.2
Di Vimercati, S.D.C.3
Paraboschi, S.4
Samarati, P.5
-
215
-
-
0038011186
-
A reputation-based approach for choosing reliable resources in peer-to-peer networks
-
E. Damiani, D. C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante, "A reputation-based approach for choosing reliable resources in peer-to-peer networks," in Computer and Communications Security, pp. 207-216, 2002.
-
(2002)
Computer and Communications Security
, pp. 207-216
-
-
Damiani, E.1
Di Vimercati, D.C.2
Paraboschi, S.3
Samarati, P.4
Violante, F.5
-
217
-
-
0242276201
-
A policy based approach to security for the semantic web
-
(D. Fensel, K. Sycara, and J. Mylopoulos, eds.) 2870 of Lecture Notes in Computer Science Springer Berlin /Heidelberg
-
L. Kagal, T. Finin, and A. Joshi, "A policy based approach to security for the semantic web," in The Semantic Web-ISWC 2003 (D. Fensel, K. Sycara, and J. Mylopoulos, eds.), vol. 2870 of Lecture Notes in Computer Science, pp. 402-418, Springer Berlin /Heidelberg, 2003.
-
(2003)
The Semantic Web-ISWC
, vol.2003
, pp. 402-418
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
218
-
-
68949124506
-
-
C. Barreto, V. Bullard, T. Erl, J. Evdemon, D. Jordan, K. Kand, D. Kňig, S. Moser, R. Stout, R. Ten-Hove, I. Trickovic, D. van der Rijn, and A. Yiu, "Web services business process execution language version 2.0," 2007.
-
(2007)
Web services business process execution language version 2.0
-
-
Barreto, C.1
Bullard, V.2
Erl, T.3
Evdemon, J.4
Jordan, D.5
Kňig, K.K.D.6
Moser, S.7
Stout, R.8
Ten-Hove, R.9
Trickovic, I.10
Van Der Rijn, D.11
Yiu, A.12
-
223
-
-
77954114693
-
Sectet-an extensible framework for the realization of secure inter-organizational workflows
-
(E. F. Medina, Mariemma, E. F. Medina, and Mariemma, eds.) INSTICC Press
-
M. Hafner, R. Breu, B. Agreiter, and A. Nowak, "Sectet-an extensible framework for the realization of secure inter-organizational workflows," in WOSIS (E. F. Medina, Mariemma, E. F. Medina, and Mariemma, eds.), pp. 47-57, INSTICC Press, 2006.
-
(2006)
WOSIS
, pp. 47-57
-
-
Hafner, M.1
Breu, R.2
Agreiter, B.3
Nowak, A.4
-
225
-
-
84948706138
-
Chimera: A virtual data system for representing, querying, and automating data derivation
-
I. Foster, J. Vockler, M. Wilde, and Y. Zhao, "Chimera: a virtual data system for representing, querying, and automating data derivation," in Proc. 14th Int Scientific and Statistical Database Management Conf, pp. 37-46, 2002.
-
(2002)
Proc. 14th Int Scientific and Statistical Database Management Conf
, pp. 37-46
-
-
Foster, I.1
Vockler, J.2
Wilde, M.3
Zhao, Y.4
-
226
-
-
44849119845
-
Metadata in the collaboratory for multi-scale chemical science
-
Dublin Core Metadata Initiative
-
C. Pancerella, J. Hewson, W. Koegler, D. Leahy, M. Lee, L. Rahn, C. Yang, J. D. Myers, B. Didier, R. McCoy, K. Schuchardt, E. Stephan, T. Windus, K. Amin, S. Bittner, C. Lansing, M. Minkoff, S. Nijsure, G. von Laszewski, R. Pinzon, B. Ruscic, A. Wagner, B. Wang, W. Pitz, Y.-L. Ho, D. Montoya, L. Xu, T. C. Allison, W. H. Green, Jr., and M. Frenklach, "Metadata in the collaboratory for multi-scale chemical science," in Proc. 2003 international conference on Dublin Core and metadata applications: supporting communities of discourse and practice-metadata research & applications, pp. 13:1-13:9, Dublin Core Metadata Initiative, 2003.
-
(2003)
Proc. 2003 international conference on Dublin Core and metadata applications: supporting communities of discourse and practice-metadata research & applications
, vol.1-13
, Issue.9
, pp. 13
-
-
Pancerella, C.1
Hewson, J.2
Koegler, W.3
Leahy, D.4
Lee, M.5
Rahn, L.6
Yang, C.7
Myers, J.D.8
Didier, B.9
McCoy, R.10
Schuchardt, K.11
Stephan, E.12
Windus, T.13
Amin, K.14
Bittner, S.15
Lansing, C.16
Minkoff, M.17
Nijsure, S.18
Von Laszewski, G.19
Pinzon, R.20
Ruscic, B.21
Wagner, A.22
Wang, B.23
Pitz, W.24
Ho, Y.-L.25
Montoya, D.26
Xu, L.27
Allison, T.C.28
Green Jr., W.H.29
Frenklach, M.30
more..
-
227
-
-
27144470355
-
Multi-scale science, supporting emerging practice with semantically derived provenance
-
J. Myers, C. Pancerella, C. Lansing, K. Schuchardt, and B. Didier, "Multi-Scale Science, Supporting Emerging Practice with Semantically Derived Provenance," in ISWC workshop on Semantic Web Technologies for Searching and Retrieving Scientific Data, 2003.
-
(2003)
ISWC workshop on Semantic Web Technologies for Searching and Retrieving Scientific Data
-
-
Myers, J.1
Pancerella, C.2
Lansing, C.3
Schuchardt, K.4
Didier, B.5
-
228
-
-
84858835658
-
Trio: A system for integrated management of data, accuracy, and lineage
-
J. Widom, "Trio: A system for integrated management of data, accuracy, and lineage.," In Conference on Innovative Data Systems Research, pp. 262-276, 2005.
-
(2005)
Conference on Innovative Data Systems Research
, pp. 262-276
-
-
Widom, J.1
-
229
-
-
0024984237
-
An architecture for practical delegation in a distributed system
-
1990 IEEE Comput Soc Symp Res Secur Privacy
-
M. Gasser and E. McDermott, "An architecture for practical delegation in a distributed system," in Proc. IEEE Computer Society Symp Research in Security and Privacy, pp. 20-30, 1990. (Pubitemid 20739272)
-
(1990)
Proceedings of the Symposium on Security and Privacy
, pp. 20-30
-
-
Gasser Morrie1
McDermott Ellen2
|