-
1
-
-
0003839495
-
-
Ph.D. thesis, Dept. of Computing Science and Mathematics, University of Stirling
-
S. P. Marsh, "Formalising Trust as a Computational Concept", Ph.D. thesis, Dept. of Computing Science and Mathematics, University of Stirling.
-
Formalising Trust As A Computational Concept
-
-
Marsh, S.P.1
-
2
-
-
0029700344
-
Decentralized trust management
-
Oakland, CA, USA
-
M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized trust management", in Proc. 17th IEEE Symp. Secur. Priv., Oakland, CA, USA, 1996, pp. 164-173.
-
(1996)
Proc. 17th IEEE Symp. Secur. Priv
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
3
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Rome, Italy
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "SPINS: Security protocols for sensor networks", in Proc. 7th Int. Conf. Mob. Comput. Netw. MobiCom 2001, Rome, Italy, 2001, pp. 189-199.
-
(2001)
Proc. 7th Int. Conf. Mob. Comput. Netw. MobiCom 2001
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
5
-
-
14844315770
-
Reputation-based framework for high integrity sensor networks
-
Washington, DC, USA
-
S. Ganeriwal and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks", in Proc. 2nd ACM Worksh. Secur. Ad Hoc Sensor Netw., Washington, DC, USA, 2004, pp. 66-77.
-
(2004)
Proc. 2nd ACM Worksh. Secur. Ad Hoc Sensor Netw
, pp. 66-77
-
-
Ganeriwal, S.1
Srivastava, M.B.2
-
6
-
-
34548043694
-
Trust-based security for wireless ad hoc and sensor networks
-
A. Boukerche, X. Li, and K. EL-Khatib, "Trust-based security for wireless ad hoc and sensor networks", Comp. Commun., vol. 30, pp. 2413-2427, 2007.
-
(2007)
Comp. Commun.
, vol.30
, pp. 2413-2427
-
-
Boukerche, A.1
Li, X.2
El-Khatib, K.3
-
7
-
-
39049103908
-
PLUS: Parameterized and localized trust management scheme for sensor networks security
-
Vancouver, Canada
-
Z. Yao, D. Kim, and Y. Doh, "PLUS: Parameterized and localized trust management scheme for sensor networks security", in Proc. 3rd IEEE Int. Conf. Mob. Ad-Hoc and Sensor Syst. MASS-2006, Vancouver, Canada, 2006, pp. 437-446.
-
(2006)
Proc. 3rd IEEE Int. Conf. Mob. Ad-Hoc and Sensor Syst. MASS-2006
, pp. 437-446
-
-
Yao, Z.1
Kim, D.2
Doh, Y.3
-
8
-
-
0038717615
-
A reputation system for peer-to-peer networks
-
Monterey, CA, USA
-
M. Gupta, P. Judge, and M. Ammar, "A reputation system for peer-to-peer networks", in Proc. 13th Int. Worksh. Netw. Operating Sys. Support Digit. Audio Video NOSSDAV 2003, Monterey, CA, USA, 2003, pp. 144-15.
-
(2003)
Proc. 13th Int. Worksh. Netw. Operating Sys. Support Digit. Audio Video NOSSDAV 2003
, pp. 144-215
-
-
Gupta, M.1
Judge, P.2
Ammar, M.3
-
9
-
-
3142738238
-
Peer trust: Supporting reputation-based trust for peer-to-peer electronic communities
-
L. Xiong and L. Liu, "Peer trust: Supporting reputation-based trust for peer-to-peer electronic communities", IEEE Trans. Knowl. Data Eng., vol. 16, no. 7, pp. 843-857, 2004.
-
(2004)
IEEE Trans. Knowl. Data Eng.
, vol.16
, Issue.7
, pp. 843-857
-
-
Xiong, L.1
Liu, L.2
-
11
-
-
14844324732
-
A robust reputation system for peer-to-peer and mobile ad-hoc networks
-
Cambridge, MA, USA
-
S. Buchegger and J. Y. L. Boudec, "A robust reputation system for peer-to-peer and mobile ad-hoc networks", in Proc. 2nd Worksh. Econom. Peer-to-Peer Sys. P2PEcon 2004, Cambridge, MA, USA, 2004.
-
(2004)
Proc. 2nd Worksh. Econom. Peer-to-Peer Sys. P2PEcon 2004
-
-
Buchegger, S.1
Boudec, J.Y.L.2
-
12
-
-
85113133621
-
CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
B. Jerman-Blazic and T. Klobucar, Eds. Kluwer
-
P. Michiardi and R. Molva, "CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks", in Advanced Communications and Multimedia Security, B. Jerman-Blazic and T. Klobucar, Eds. Kluwer 2002, pp. 107-121.
-
(2002)
Advanced Communications and Multimedia Security
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
13
-
-
27544444562
-
A reputation-based trust mechanism for ad-hoc networks
-
Murcia, Spain
-
Y. Rebahi, V. E. Mujica-V, and D. Sisalem, "A reputation-based trust mechanism for ad-hoc networks", in Proc. 10th IEEE Symp. Comp. Commun. ISCC 2005, Murcia, Spain, 2005, pp. 37-42.
-
(2005)
Proc. 10th IEEE Symp. Comp. Commun. ISCC 2005
, pp. 37-42
-
-
Rebahi, Y.1
Mujica-V, V.E.2
Sisalem, D.3
-
14
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
Y. L. Sun, W. Yu, Z. Han, and K. J. R. Liu, "Information theoretic framework of trust modeling and evaluation for ad hoc networks", IEEE J. Selec. Areas in Commun., vol. 24, no. 2, pp. 305-317, 2006.
-
(2006)
IEEE J. Selec. Areas in Commun.
, vol.24
, Issue.2
, pp. 305-317
-
-
Sun, Y.L.1
Yu, W.2
Han, Z.3
Liu, K.J.R.4
-
15
-
-
33144465377
-
On trust models and trust evaluation metrics for ad hoc networks
-
G. Theodorakopoulos and J. S. Baras, "On trust models and trust evaluation metrics for ad hoc networks", IEEE J. Selec. Areas in Commun., vol. 24, no. 2, pp. 318-328, 2006.
-
(2006)
IEEE J. Selec. Areas in Commun.
, vol.24
, Issue.2
, pp. 318-328
-
-
Theodorakopoulos, G.1
Baras, J.S.2
-
16
-
-
33744991057
-
Trust evaluation based security solutions in ad hoc networks
-
Gjovik, Norway
-
Z. Yan, P. Zhang, and T. Virtanen, "Trust evaluation based security solutions in ad hoc networks", in Proc. 7th Nordic Worksh. Secur. IT Syst., Gjovik, Norway, 2003.
-
(2003)
Proc. 7th Nordic Worksh. Secur. IT Syst
-
-
Yan, Z.1
Zhang, P.2
Virtanen, T.3
-
17
-
-
37349084148
-
Reputation-based trust in wireless sensor netwoks
-
Seoul, Korea
-
H. Chen, H. Wu, X. Zhou, and C. Gao, "Reputation-based trust in wireless sensor netwoks", in Proc. Int. Conf. Multim. Ubiq. Engin. MUE 2007, Seoul, Korea, 2007.
-
(2007)
Proc. Int. Conf. Multim. Ubiq. Engin. MUE 2007
-
-
Chen, H.1
Wu, H.2
Zhou, X.3
Gao, C.4
-
18
-
-
84873891864
-
A survey of energy efficient security architectures and protocols for wireless sensor networks
-
K. Daniluk and E. Niewiadomska-Szynkiewicz, "A survey of energy efficient security architectures and protocols for wireless sensor networks", J. Telecom. Inform. Technol., no. 3, pp. 64-72, 2012.
-
J. Telecom. Inform. Technol.
, vol.2012
, Issue.3
, pp. 64-72
-
-
Daniluk, K.1
Niewiadomska-Szynkiewicz, E.2
-
19
-
-
84919391531
-
Adaptacja rozwia̧zań honeypot dla sieci czujników
-
Polish
-
K. Lasota, E. Niewiadomska-Szynkiewicz, and A. Kozakiewicz, "Adaptacja rozwia̧zań honeypot dla sieci czujnikó w", in Proc. Kon-ferencja Sieci Komputerowe SK-12, Szczyrk, Poland, 2012, Studia Informatica, vol. 33, no. 3A, pp. 139-148 (in Polish).
-
Proc. Kon-ferencja Sieci Komputerowe SK-12, Szczyrk, Poland, 2012, Studia Informatica
, vol.33
, Issue.3 A
, pp. 139-148
-
-
Lasota, K.1
Niewiadomska-Szynkiewicz, E.2
Kozakiewicz, A.3
-
20
-
-
84873892228
-
Mobilny honeypot dla sieci sensorycznych
-
Polish
-
K. Lasota, E. Niewiadomska-Szynkiewicz, and A. Kozakiewicz, "Mobilny honeypot dla sieci sensorycznych", Przegla̧d Telekomu-nikacyjny, no. 8-9, pp. 699-704, 2012 (in Polish).
-
(2012)
Przegla̧d Telekomu-nikacyjny
, Issue.8-9
, pp. 699-704
-
-
Lasota, K.1
Niewiadomska-Szynkiewicz, E.2
Kozakiewicz, A.3
-
21
-
-
84875347958
-
Modelling trust in wireless sensor networks from the sensor reliability prospective
-
T. Sobh et al., Eds. Heidelberg: Springer, 317-321
-
M. Momani, S. Challa, and K. Aboura, "Modelling trust in wireless sensor networks from the sensor reliability prospective", in Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecomm., T. Sobh et al., Eds. Heidelberg: Springer, 2007, pp. 179-189, pp. 317-321.
-
(2007)
Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecomm
, pp. 179-189
-
-
Momani, M.1
Challa, S.2
Aboura, K.3
-
22
-
-
34547321367
-
Trust management problem in distributed wireless sensor networks
-
Sydney, Australia
-
R. A. Shaikh, H. Jameel, S. Lee, S. Rajput, and Y. J. Song, "Trust management problem in distributed wireless sensor networks", in Proc. 12th IEEE Conf. Embedd. Real-Time Comput. Syst. Appl. RTCSA 2006, Sydney, Australia, 2006, pp. 411-414.
-
(2006)
Proc. 12th IEEE Conf. Embedd. Real-Time Comput. Syst. Appl. RTCSA 2006
, pp. 411-414
-
-
Shaikh, R.A.1
Jameel, H.2
Lee, S.3
Rajput, S.4
Song, Y.J.5
-
23
-
-
77954087803
-
Hybrid trust and reputation management for sensor networks
-
E. Aivaloglou and S. Gritzalis, "Hybrid trust and reputation management for sensor networks", Wirel. Netw., vol. 16, no. 5, pp. 1493-1510, 2010.
-
(2010)
Wirel. Netw.
, vol.16
, Issue.5
, pp. 1493-1510
-
-
Aivaloglou, E.1
Gritzalis, S.2
-
24
-
-
41149110884
-
A security framework with trust management for sensor networks
-
Athens, Greece
-
Z. Yao, D. Kim, I. Lee, K. Kim, and J. Jang, "A security framework with trust management for sensor networks", in Proc. Worksh. of the 1st Int. Conf. Secur. Priv. Emerg. Areas in Commun. Netw. SecureComm 2005, Athens, Greece, 2005, pp. 190-198.
-
(2005)
Proc. Worksh. of the 1st Int. Conf. Secur. Priv. Emerg. Areas in Commun. Netw. SecureComm 2005
, pp. 190-198
-
-
Yao, Z.1
Kim, D.2
Lee, I.3
Kim, K.4
Jang, J.5
-
25
-
-
33847055510
-
A security framework with trust management for sensor networks
-
Athens, Greece
-
Y. Zhiying, K. Daeyoung, L. Insun, K. Kiyoung, and J. Jongsoo, "A security framework with trust management for sensor networks", in Proc. 1st Int. Conf. Secur. Priv. Emerg. Areas in Commun. Netw. SecureComm 2005, Athens, Greece, 2005.
-
(2005)
Proc. 1st Int. Conf. Secur. Priv. Emerg. Areas in Commun. Netw. SecureComm 2005
-
-
Zhiying, Y.1
Daeyoung, K.2
Insun, L.3
Kiyoung, K.4
Jongsoo, J.5
-
26
-
-
63149092510
-
Reputation-based Trust Managmenet in Wireless Sensor Networks
-
Sydney, Australia
-
T. A. Zia, "Reputation-based Trust Managmenet in Wireless Sensor Networks", in Proc. Int. Conf. Intell. Sensors, Sensor Netw. Inform. Proces. ISSNIP 2008, Sydney, Australia, pp. 163-166.
-
Proc. Int. Conf. Intell. Sensors, Sensor Netw. Inform. Proces. ISSNIP 2008
, pp. 163-166
-
-
Zia, T.A.1
-
28
-
-
35148895900
-
Agent-based trust model in wireless sensor networks
-
Qingdao, China
-
H. Chen, H. Wu, X Zhou, and C. Gao, "Agent-based trust model in wireless sensor networks", in Proc. 8th ACIS Int. Conf. Softw. Engin. Artif. Intell., Netw. Parallel/Distrib. Comput., Qingdao, China, 2007.
-
(2007)
Proc. 8th ACIS Int. Conf. Softw. Engin. Artif. Intell., Netw. Parallel/Distrib. Comput
-
-
Chen, H.1
Wu, H.2
Zhou, X.3
Gao, C.4
-
29
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D. F. Ferraiolo, R. S. Sandhu, S. I. Gavrila, D. R. Kuhn, and R. Chandramouli, "Proposed NIST standard for role-based access control", ACM Trans. Inf. Syst. Secur., vol. 3, pp. 224-274, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.S.2
Gavrila, S.I.3
Kuhn, D.R.4
Chandramouli, R.5
-
30
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-based access control models", IEEE Computer, vol. 2, pp. 38-47, 1996.
-
(1996)
IEEE Computer
, vol.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
31
-
-
84958048748
-
Compliance checking in the policymaker trust management system
-
London, UK
-
M. Blaze, J. Feigenbaum and M. Strauss, "Compliance checking in the policymaker trust management system", in Proc. 2nd Int. Conf. Finan. Cryptogr., London, UK, 1998, pp. 254-274.
-
(1998)
Proc. 2nd Int. Conf. Finan. Cryptogr
, pp. 254-274
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
32
-
-
84982899264
-
The role of trust management in distributed systems security
-
J. Vitek and C. D. Jensen, Eds., Springer
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, "The role of trust management in distributed systems security", in LNCS Secure Internet Programming: Security Issues for Mobile and Distributed Objects, J. Vitek and C. D. Jensen, Eds. Springer, 1999, pp. 185-210.
-
(1999)
LNCS Secure Internet Programming: Security Issues for Mobile and Distributed Objects
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
33
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
D. Clarke, J.-E. Elien, C. Ellison, M. Fredette, A. Morcos, and R. L. Rivest, "Certificate chain discovery in SPKI/SDSI", J. Comp. Secur., vol. 9, pp. 285-322, 2001.
-
(2001)
J. Comp. Secur.
, vol.9
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
34
-
-
49449101262
-
Authorization in trust management: Features and foundations
-
P. Chapin, C. Skalka, and X. S. Wang, "Authorization in trust management: features and foundations", ACM Comp. Surv., vol. 3, pp. 1-48, 2008.
-
(2008)
ACM Comp. Surv.
, vol.3
, pp. 1-48
-
-
Chapin, P.1
Skalka, C.2
Wang, X.S.3
-
35
-
-
62349090353
-
RT: A Role-Based Trust-Management Framework
-
Washington, DC, USA, IEEE Computer Society Press
-
N. Li and J. Mitchell, "RT: A Role-Based Trust-Management Framework", in Proc. 3rd DARPA Inform. Survivabil. Conf. Expos., Washington, DC, USA, IEEE Computer Society Press, 2003, pp. 201-212.
-
(2003)
Proc. 3rd DARPA Inform. Survivabil. Conf. Expos
, pp. 201-212
-
-
Li, N.1
Mitchell, J.2
-
36
-
-
0036085965
-
Design of a role-based trust-management framework
-
Oakland, CA, USA
-
N. Li, J. Mitchell, and W. Winsborough, "Design of a role-based trust-management framework", in Proc. IEEE Symp. Secur. Priv., Oakland, CA, USA, 2002, pp. 114-130.
-
(2002)
Proc. IEEE Symp. Secur. Priv
, pp. 114-130
-
-
Li, N.1
Mitchell, J.2
Winsborough, W.3
-
37
-
-
0037243196
-
Distributed credential chain discoveryin trust management
-
N. Li, W. Winsborough, and J. Mitchell, "Distributed credential chain discoveryin trust management", J. Comp. Secur., vol. 1, pp. 35-86, 2003.
-
(2003)
J. Comp. Secur.
, vol.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.2
Mitchell, J.3
-
38
-
-
67650653902
-
-
Tech. Rep. TR-CTIT-07-34, Centre for Telematics and Information Technology University of Twente, Enschede
-
M. R. Czenko, S. Etalle, D. Li, and W. H. Winsborough, "An introduction to the role based trust management framework RT", Tech. Rep. TR-CTIT-07-34, Centre for Telematics and Information Technology University of Twente, Enschede, 2007.
-
(2007)
An Introduction to the Role Based Trust Management Framework RT
-
-
Czenko, M.R.1
Etalle, S.2
Li, D.3
Winsborough, W.H.4
-
39
-
-
84873908515
-
Model of user access control to virtual machines based on RT-family trust management language with temporal validity constrains-practical application
-
K. Lasota and A. Kozakiewicz, "Model of user access control to virtual machines based on RT-family trust management language with temporal validity constrains-practical application", J. Telecom. Inform. Technol., no. 3, pp. 13-21, 2012.
-
J. Telecom. Inform. Technol.
, vol.2012
, Issue.3
, pp. 13-21
-
-
Lasota, K.1
Kozakiewicz, A.2
-
40
-
-
33750906295
-
Inferring dynamic credentials for role-based trust management
-
Venice, Italy
-
D. Gorla, M. Hennessy, and V. Sassone, "Inferring dynamic credentials for role-based trust management", in Proc. 8th ACM SIGPLAN Conf. Princip. Pract. Declarat. Program. PPDP 06, Venice, Italy, 2006, pp. 213-224.
-
(2006)
Proc. 8th ACM SIGPLAN Conf. Princip. Pract. Declarat. Program. PPDP 06
, pp. 213-224
-
-
Gorla, D.1
Hennessy, M.2
Sassone, V.3
-
43
-
-
84862149748
-
The semantics of role-based trust management languages
-
T. Szmuc, M. Szpyrka, J. Zendulka, Eds., LNCS 7054. Heidelberg: Springer
-
A. Felkner and K. Sacha, "The semantics of role-based trust management languages", in Advances in Software Engineering Techniques, T. Szmuc, M. Szpyrka, J. Zendulka, Eds., LNCS 7054. Heidelberg: Springer, 2012, pp. 179-189.
-
(2012)
Advances in Software Engineering Techniques
, pp. 179-189
-
-
Felkner, A.1
Sacha, K.2
-
45
-
-
79960236493
-
T credentials for role-based trust management e-Inform
-
T credentials for role-based trust management", e-Inform. Software Engin. J., vol. 4, no. 1, pp. 9-19, 2010.
-
(2010)
Software Engin. J.
, vol.4
, Issue.1
, pp. 9-19
-
-
Felkner, A.1
Sacha, K.2
-
46
-
-
79960235827
-
Time validity in role-based trust management inference system
-
Loutraki, Greece, 2011, Communications in Computer and Information Science, Springer
-
A. Felkner and A. Kozakiewicz, "Time validity in role-based trust management inference system", in Proc. Int. Worksh. Sec. Trust Comput., Data Manag, andAppl. IWCS-11, Loutraki, Greece, 2011, Communications in Computer and Information Science, Springer, 2011, vol. 187, pp. 7-15.
-
(2011)
Proc. Int. Worksh. Sec. Trust Comput., Data Manag, AndAppl. IWCS-11
, vol.187
, pp. 7-15
-
-
Felkner, A.1
Kozakiewicz, A.2
|