메뉴 건너뛰기




Volumn 2012, Issue 4, 2012, Pages 70-77

How the role-based trust management can be applied to wireless sensor networks

Author keywords

Access control; Role based trust management; Trust; Wireless sensor networks

Indexed keywords


EID: 84873883962     PISSN: 15094553     EISSN: 18998852     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (4)

References (46)
  • 1
    • 0003839495 scopus 로고    scopus 로고
    • Ph.D. thesis, Dept. of Computing Science and Mathematics, University of Stirling
    • S. P. Marsh, "Formalising Trust as a Computational Concept", Ph.D. thesis, Dept. of Computing Science and Mathematics, University of Stirling.
    • Formalising Trust As A Computational Concept
    • Marsh, S.P.1
  • 6
    • 34548043694 scopus 로고    scopus 로고
    • Trust-based security for wireless ad hoc and sensor networks
    • A. Boukerche, X. Li, and K. EL-Khatib, "Trust-based security for wireless ad hoc and sensor networks", Comp. Commun., vol. 30, pp. 2413-2427, 2007.
    • (2007) Comp. Commun. , vol.30 , pp. 2413-2427
    • Boukerche, A.1    Li, X.2    El-Khatib, K.3
  • 7
    • 39049103908 scopus 로고    scopus 로고
    • PLUS: Parameterized and localized trust management scheme for sensor networks security
    • Vancouver, Canada
    • Z. Yao, D. Kim, and Y. Doh, "PLUS: Parameterized and localized trust management scheme for sensor networks security", in Proc. 3rd IEEE Int. Conf. Mob. Ad-Hoc and Sensor Syst. MASS-2006, Vancouver, Canada, 2006, pp. 437-446.
    • (2006) Proc. 3rd IEEE Int. Conf. Mob. Ad-Hoc and Sensor Syst. MASS-2006 , pp. 437-446
    • Yao, Z.1    Kim, D.2    Doh, Y.3
  • 9
    • 3142738238 scopus 로고    scopus 로고
    • Peer trust: Supporting reputation-based trust for peer-to-peer electronic communities
    • L. Xiong and L. Liu, "Peer trust: Supporting reputation-based trust for peer-to-peer electronic communities", IEEE Trans. Knowl. Data Eng., vol. 16, no. 7, pp. 843-857, 2004.
    • (2004) IEEE Trans. Knowl. Data Eng. , vol.16 , Issue.7 , pp. 843-857
    • Xiong, L.1    Liu, L.2
  • 12
    • 85113133621 scopus 로고    scopus 로고
    • CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • B. Jerman-Blazic and T. Klobucar, Eds. Kluwer
    • P. Michiardi and R. Molva, "CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks", in Advanced Communications and Multimedia Security, B. Jerman-Blazic and T. Klobucar, Eds. Kluwer 2002, pp. 107-121.
    • (2002) Advanced Communications and Multimedia Security , pp. 107-121
    • Michiardi, P.1    Molva, R.2
  • 14
    • 33144465932 scopus 로고    scopus 로고
    • Information theoretic framework of trust modeling and evaluation for ad hoc networks
    • Y. L. Sun, W. Yu, Z. Han, and K. J. R. Liu, "Information theoretic framework of trust modeling and evaluation for ad hoc networks", IEEE J. Selec. Areas in Commun., vol. 24, no. 2, pp. 305-317, 2006.
    • (2006) IEEE J. Selec. Areas in Commun. , vol.24 , Issue.2 , pp. 305-317
    • Sun, Y.L.1    Yu, W.2    Han, Z.3    Liu, K.J.R.4
  • 15
    • 33144465377 scopus 로고    scopus 로고
    • On trust models and trust evaluation metrics for ad hoc networks
    • G. Theodorakopoulos and J. S. Baras, "On trust models and trust evaluation metrics for ad hoc networks", IEEE J. Selec. Areas in Commun., vol. 24, no. 2, pp. 318-328, 2006.
    • (2006) IEEE J. Selec. Areas in Commun. , vol.24 , Issue.2 , pp. 318-328
    • Theodorakopoulos, G.1    Baras, J.S.2
  • 18
    • 84873891864 scopus 로고    scopus 로고
    • A survey of energy efficient security architectures and protocols for wireless sensor networks
    • K. Daniluk and E. Niewiadomska-Szynkiewicz, "A survey of energy efficient security architectures and protocols for wireless sensor networks", J. Telecom. Inform. Technol., no. 3, pp. 64-72, 2012.
    • J. Telecom. Inform. Technol. , vol.2012 , Issue.3 , pp. 64-72
    • Daniluk, K.1    Niewiadomska-Szynkiewicz, E.2
  • 23
    • 77954087803 scopus 로고    scopus 로고
    • Hybrid trust and reputation management for sensor networks
    • E. Aivaloglou and S. Gritzalis, "Hybrid trust and reputation management for sensor networks", Wirel. Netw., vol. 16, no. 5, pp. 1493-1510, 2010.
    • (2010) Wirel. Netw. , vol.16 , Issue.5 , pp. 1493-1510
    • Aivaloglou, E.1    Gritzalis, S.2
  • 31
    • 84958048748 scopus 로고    scopus 로고
    • Compliance checking in the policymaker trust management system
    • London, UK
    • M. Blaze, J. Feigenbaum and M. Strauss, "Compliance checking in the policymaker trust management system", in Proc. 2nd Int. Conf. Finan. Cryptogr., London, UK, 1998, pp. 254-274.
    • (1998) Proc. 2nd Int. Conf. Finan. Cryptogr , pp. 254-274
    • Blaze, M.1    Feigenbaum, J.2    Strauss, M.3
  • 34
    • 49449101262 scopus 로고    scopus 로고
    • Authorization in trust management: Features and foundations
    • P. Chapin, C. Skalka, and X. S. Wang, "Authorization in trust management: features and foundations", ACM Comp. Surv., vol. 3, pp. 1-48, 2008.
    • (2008) ACM Comp. Surv. , vol.3 , pp. 1-48
    • Chapin, P.1    Skalka, C.2    Wang, X.S.3
  • 35
    • 62349090353 scopus 로고    scopus 로고
    • RT: A Role-Based Trust-Management Framework
    • Washington, DC, USA, IEEE Computer Society Press
    • N. Li and J. Mitchell, "RT: A Role-Based Trust-Management Framework", in Proc. 3rd DARPA Inform. Survivabil. Conf. Expos., Washington, DC, USA, IEEE Computer Society Press, 2003, pp. 201-212.
    • (2003) Proc. 3rd DARPA Inform. Survivabil. Conf. Expos , pp. 201-212
    • Li, N.1    Mitchell, J.2
  • 36
    • 0036085965 scopus 로고    scopus 로고
    • Design of a role-based trust-management framework
    • Oakland, CA, USA
    • N. Li, J. Mitchell, and W. Winsborough, "Design of a role-based trust-management framework", in Proc. IEEE Symp. Secur. Priv., Oakland, CA, USA, 2002, pp. 114-130.
    • (2002) Proc. IEEE Symp. Secur. Priv , pp. 114-130
    • Li, N.1    Mitchell, J.2    Winsborough, W.3
  • 37
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discoveryin trust management
    • N. Li, W. Winsborough, and J. Mitchell, "Distributed credential chain discoveryin trust management", J. Comp. Secur., vol. 1, pp. 35-86, 2003.
    • (2003) J. Comp. Secur. , vol.1 , pp. 35-86
    • Li, N.1    Winsborough, W.2    Mitchell, J.3
  • 39
    • 84873908515 scopus 로고    scopus 로고
    • Model of user access control to virtual machines based on RT-family trust management language with temporal validity constrains-practical application
    • K. Lasota and A. Kozakiewicz, "Model of user access control to virtual machines based on RT-family trust management language with temporal validity constrains-practical application", J. Telecom. Inform. Technol., no. 3, pp. 13-21, 2012.
    • J. Telecom. Inform. Technol. , vol.2012 , Issue.3 , pp. 13-21
    • Lasota, K.1    Kozakiewicz, A.2
  • 43
    • 84862149748 scopus 로고    scopus 로고
    • The semantics of role-based trust management languages
    • T. Szmuc, M. Szpyrka, J. Zendulka, Eds., LNCS 7054. Heidelberg: Springer
    • A. Felkner and K. Sacha, "The semantics of role-based trust management languages", in Advances in Software Engineering Techniques, T. Szmuc, M. Szpyrka, J. Zendulka, Eds., LNCS 7054. Heidelberg: Springer, 2012, pp. 179-189.
    • (2012) Advances in Software Engineering Techniques , pp. 179-189
    • Felkner, A.1    Sacha, K.2
  • 45
    • 79960236493 scopus 로고    scopus 로고
    • T credentials for role-based trust management e-Inform
    • T credentials for role-based trust management", e-Inform. Software Engin. J., vol. 4, no. 1, pp. 9-19, 2010.
    • (2010) Software Engin. J. , vol.4 , Issue.1 , pp. 9-19
    • Felkner, A.1    Sacha, K.2
  • 46
    • 79960235827 scopus 로고    scopus 로고
    • Time validity in role-based trust management inference system
    • Loutraki, Greece, 2011, Communications in Computer and Information Science, Springer
    • A. Felkner and A. Kozakiewicz, "Time validity in role-based trust management inference system", in Proc. Int. Worksh. Sec. Trust Comput., Data Manag, andAppl. IWCS-11, Loutraki, Greece, 2011, Communications in Computer and Information Science, Springer, 2011, vol. 187, pp. 7-15.
    • (2011) Proc. Int. Worksh. Sec. Trust Comput., Data Manag, AndAppl. IWCS-11 , vol.187 , pp. 7-15
    • Felkner, A.1    Kozakiewicz, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.