-
1
-
-
84872843470
-
Extensible authentication protocol (EAP) (RFC 3748)
-
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., & Levkowetz, H. (2004). Extensible authentication protocol (EAP) (RFC 3748). Network Working Group.
-
(2004)
Network Working Group
-
-
Aboba, B.1
Blunk, L.2
Vollbrecht, J.3
Carlson, J.4
Levkowetz, H.5
-
2
-
-
84883804152
-
-
Al-Muhtadi, J., Anand, M., Mickunas, M. D., & Campbell, R. (2000). Secure smart homes using Jini and UIUC SESAME.
-
(2000)
Secure Smart Homes Using Jini and UIUC SESAME
-
-
Al-Muhtadi, J.1
Anand, M.2
Mickunas, M.D.3
Campbell, R.4
-
5
-
-
0038589165
-
The anatomy of a large-scale hypertextual Web search engine
-
Brin, S., & Page, L. (1998). The anatomy of a large-scale hypertextual Web search engine. Computer Networks, 30(1-7).
-
(1998)
Computer Networks
, vol.30
, Issue.1-7
-
-
Brin, S.1
Page, L.2
-
8
-
-
2442549069
-
Using trust for secure collaboration in uncertain environments
-
July-September
-
Cahill, V., Gray, E., Seigneur, J.-M., Jensen, C., Chen, Y., & Shand, B. (2003, July-September). Using trust for secure collaboration in uncertain environments. Pervasive Computing, 2(3), 52-61.
-
(2003)
Pervasive Computing
, vol.2
, Issue.3
, pp. 52-61
-
-
Cahill, V.1
Gray, E.2
Seigneur, J.-M.3
Jensen, C.4
Chen, Y.5
Shand, B.6
-
10
-
-
2442446612
-
Towards security and privacy for pervasive computing
-
November 8, Keio University, Tokyo, Japan
-
Campbell, R., Al-Muhtadi, J., Naldurg, P., Sampermane, G., & Mickunas, M. D. (2002, November 8). Towards security and privacy for pervasive computing. In Proceedings of the International Symposium on Software Security, Keio University, Tokyo, Japan.
-
(2002)
Proceedings of the International Symposium On Software Security
-
-
Campbell, R.1
Al-Muhtadi, J.2
Naldurg, P.3
Sampermane, G.4
Mickunas, M.D.5
-
13
-
-
0042349494
-
Managing and sharing servants' reputations in P2P systems
-
IEEE
-
Damiani, E., Vimercati, S. D. C. D., Paraboschi, S., & Samarati, P. (2003). Managing and sharing servants' reputations in P2P systems. In Transactions on knowledge and data engineering (pp. 840-854). IEEE.
-
(2003)
Transactions On Knowledge and Data Engineering
, pp. 840-854
-
-
Damiani, E.1
Vimercati, S.D.C.D.2
Paraboschi, S.3
Samarati, P.4
-
14
-
-
13244267079
-
P2P-based collaborative spam detection and filtering
-
Damiani, E., Vimercati, S. D. C. D., Paraboschi, S., & Samarati, P. (2004). P2P-based collaborative spam detection and filtering. In Proceedings of the Fourth International Conference on Peer-to-Peer Computing (P2P'04).
-
(2004)
Proceedings of the Fourth International Conference On Peer-to-Peer Computing (P2P'04)
-
-
Damiani, E.1
Vimercati, S.D.C.D.2
Paraboschi, S.3
Samarati, P.4
-
15
-
-
1142301905
-
Managing multiple and dependable identities
-
Damiani, E., Vimercati, S. D. C. D., & Samarati, P. (2003). Managing multiple and dependable identities. IEEE Internet Computing, 7(6), 29-37.
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.6
, pp. 29-37
-
-
Damiani, E.1
Vimercati, S.D.C.D.2
Samarati, P.3
-
19
-
-
84899289173
-
Preliminary definition of a trust-based access control model
-
Dimmock, N., Bacon, J., Belokosztolszki, A., Eyers, D., Ingram, D., & Moody, K. (2004). Preliminary definition of a trust-based access control model. SECURE Deliverable 3.2.
-
(2004)
SECURE Deliverable 3.2
-
-
Dimmock, N.1
Bacon, J.2
Belokosztolszki, A.3
Eyers, D.4
Ingram, D.5
Moody, K.6
-
21
-
-
84899386940
-
-
eBay. (n.d.), Retrieved November 29, 2005, from
-
eBay. (n.d.). Feedback Forum. Retrieved November 29, 2005, from http://pages.ebay.com/services/forum/feedback.html
-
Feedback Forum
-
-
-
22
-
-
84871065735
-
-
FOAF, Retrieved April 8, 2006, from
-
FOAF. The Friend-of-a-Friend Project. Retrieved April 8, 2006, from http://www.foafproject.org/
-
The Friend-of-a-Friend Project
-
-
-
28
-
-
35248830148
-
Trust propagation in small worlds
-
Springer-Verlag
-
Gray, E., Seigneur, J.-M., Chen, Y., & Jensen, C. D. (2003). Trust propagation in small worlds. In Proceedings of the First International Conference on Trust Management (LNCS 2693). Springer-Verlag.
-
(2003)
Proceedings of the First International Conference On Trust Management (LNCS 2693)
-
-
Gray, E.1
Seigneur, J.-M.2
Chen, Y.3
Jensen, C.D.4
-
31
-
-
0013238897
-
A subjective metric of authentication
-
In J.- J. Quisquater, Y. Deswarte, C. Meadows, & D. Gollmann (Eds.), Louvain-la-Neuve, Belgium: Springer-Verlag
-
Jøsang, A. (1998). A subjective metric of authentication. In J.- J. Quisquater, Y. Deswarte, C. Meadows, & D. Gollmann (Eds.), ESORICS'98. Louvain-la-Neuve, Belgium: Springer-Verlag.
-
(1998)
ESORICS'98
-
-
Jøsang, A.1
-
35
-
-
84899367315
-
What's in a name? Trust
-
Khare, R. (1999). What's in a name? Trust. 4K Associates.
-
(1999)
4K Associates
-
-
Khare, R.1
-
39
-
-
0003899818
-
The Kerberos Network Authentication Service
-
Kohl, J., & Neuman, B. C. (1993). The Kerberos Network Authentication Service, Version 5.
-
(1993)
Version 5
-
-
Kohl, J.1
Neuman, B.C.2
-
41
-
-
84969377247
-
User authentication and authorization in the Java(TM) platform
-
Phoenix, AZ
-
Lai, C., Gong, L., Koved, L., Nadalin, A., & Schemers, R. (1999). User authentication and authorization in the Java(TM) platform. In Proceedings of the 15th Annual Computer Security Application Conference, Phoenix, AZ.
-
(1999)
Proceedings of the 15th Annual Computer Security Application Conference
-
-
Lai, C.1
Gong, L.2
Koved, L.3
Nadalin, A.4
Schemers, R.5
-
42
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
ACM
-
Lampson, B., Abadi, M., Burrows, M., & Wobber, E. (1992). Authentication in distributed systems: Theory and practice. In Transactions on computer systems. ACM.
-
(1992)
Transactions On Computer Systems
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
44
-
-
84899318056
-
Attack resistant trust metrics
-
Levien, R. (2004). Attack resistant trust metrics. UC Berkeley.
-
(2004)
UC Berkeley
-
-
Levien, R.1
-
45
-
-
35048837841
-
-
LibertyAlliance, Retrieved 29/11/2005, from
-
LibertyAlliance. Liberty Alliance Project. Retrieved 29/11/2005, from http://www.projectliberty.org/
-
Liberty Alliance Project
-
-
-
47
-
-
0003839495
-
-
Department of Mathematics and Computer Science, University of Stirling
-
Marsh, S. (1994). Formalising trust as a computational concept. Department of Mathematics and Computer Science, University of Stirling.
-
(1994)
Formalising Trust As a Computational Concept
-
-
Marsh, S.1
-
48
-
-
33750068186
-
Motivation and personality
-
Maslow, A. H. (1954). Motivation and personality. Harper.
-
(1954)
Harper
-
-
Maslow, A.H.1
-
50
-
-
84899307152
-
-
Microsoft. (n.d.), Retrieved November 29, 2005, from
-
Microsoft. (n.d.). NET Passport 2.5. Retrieved November 29, 2005, from http://msdn.microsoft.com/library/default.asp?url=/library/en-us/passport25/serviceguide/intro/NET_Passport_SDK_Components.asp
-
NET Passport 2.5
-
-
-
51
-
-
0037880329
-
-
Milojicic, D. S., Kalogeraki, V., Lukose, R., Nagaraja, K., Pruyne, J., & Richard, B. (2002). Peer-to-peer computing.
-
(2002)
Peer-to-peer Computing
-
-
Milojicic, D.S.1
Kalogeraki, V.2
Lukose, R.3
Nagaraja, K.4
Pruyne, J.5
Richard, B.6
-
54
-
-
49149133619
-
Petri nets, event structures and domains
-
Nielsen, M., Plotkin, G., & Winskel, G. (1981). Petri nets, event structures and domains. Theoritical Computer Science, (13), 85-108.
-
(1981)
Theoritical Computer Science
, Issue.13
, pp. 85-108
-
-
Nielsen, M.1
Plotkin, G.2
Winskel, G.3
-
55
-
-
84899276752
-
-
OpenPrivacy, Retrieved November 11, 2005, from
-
OpenPrivacy. (2001). Open Privacy project. Retrieved November 11, 2005, from http://www.openprivacy.org/Postini.
-
(2001)
Open Privacy Project
-
-
-
56
-
-
84899232124
-
-
Postini, Retrieved November 11, 2005, from
-
Postini. (2004). Worldwide map of origin of spam. Retrieved November 11, 2005, from http://www.postini.com/SECURE.
-
(2004)
Worldwide Map of Origin of Spam
-
-
-
62
-
-
84899250038
-
Decentralized identity for the digital business ecosystem
-
Seigneur, J.-M. (2005a). Decentralized identity for the digital business ecosystem. ERCIM News.
-
(2005)
ERCIM News
-
-
Seigneur, J.-M.1
-
64
-
-
63349108095
-
The SECURE framework architecture (Beta)
-
Seigneur, J.-M., Cahill, V., Jensen, C. D., Gray, E., & Chen, Y. (2004). The SECURE framework architecture (Beta). TCD Technical Report.
-
(2004)
TCD Technical Report
-
-
Seigneur, J.-M.1
Cahill, V.2
Jensen, C.D.3
Gray, E.4
Chen, Y.5
-
65
-
-
34548176061
-
Combating spam with TEA (Trustworthy Email Addresses)
-
Seigneur, J.-M., Dimmock, N., Bryce, C., & Jensen, C. D. (2004). Combating spam with TEA (Trustworthy Email Addresses). In Proceedings of the 2nd Conference on Privacy, Security and Trust.
-
(2004)
Proceedings of the 2nd Conference On Privacy, Security and Trust
-
-
Seigneur, J.-M.1
Dimmock, N.2
Bryce, C.3
Jensen, C.D.4
-
69
-
-
2442422211
-
Trust enhanced ubiquitous payment without too much privacy loss
-
ACM
-
Seigneur, J.-M., & Jensen, C. D. (2004c). Trust enhanced ubiquitous payment without too much privacy loss. In Proceedings of SAC 2004. ACM.
-
(2004)
Proceedings of SAC 2004
-
-
Seigneur, J.-M.1
Jensen, C.D.2
-
70
-
-
84899179209
-
Authentication: From passwords to public keys
-
Smith, R. E. (2001). Authentication: From passwords to public keys. Addison Wesley.
-
(2001)
Addison Wesley
-
-
Smith, R.E.1
-
72
-
-
84899320667
-
An algorithm for building user-role profiles in a trust environment
-
Springer
-
Terzi, E., Zhong, Y., Bhargava, B., Pankaj, & Madria, S. (2003). An algorithm for building user-role profiles in a trust environment. In Proceedings of the International Conference on Data Warehousing and Knowledge Discovery. Springer.
-
(2003)
Proceedings of the International Conference On Data Warehousing and Knowledge Discovery
-
-
Terzi, E.1
Zhong, Y.2
Bhargava, B.3
Pankaj4
Madria, S.5
-
73
-
-
33750041719
-
The SECURE collaboration model
-
Terzis, S., Wagealla, W., English, C., McGettrick, A., & Nixon, P. (2004). The SECURE collaboration model. SECURE Deliverables D2.1, D.2.2 and D2.3.
-
(2004)
SECURE Deliverables D2.1, D.2.2 and D2.3
-
-
Terzis, S.1
Wagealla, W.2
English, C.3
McGettrick, A.4
Nixon, P.5
-
74
-
-
0001504032
-
An experimental study of the small world problem
-
Travers, J., & Milgram, S. (1969). An experimental study of the small world problem. Sociometry, 32(4), 425-443.
-
(1969)
Sociometry
, vol.32
, Issue.4
, pp. 425-443
-
-
Travers, J.1
Milgram, S.2
-
76
-
-
24944461741
-
A formal model of trust lifecycle management
-
Wagealla, W., Carbone, M., English, C., Terzis, S., & Nixon, P. (2003). A formal model of trust lifecycle management. In Proceedings of the Workshop on Formal Aspects of Security and Trust (FAST 2003).
-
(2003)
Proceedings of the Workshop On Formal Aspects of Security and Trust (FAST 2003)
-
-
Wagealla, W.1
Carbone, M.2
English, C.3
Terzis, S.4
Nixon, P.5
-
77
-
-
84899400458
-
Identity and search in social networks
-
Watts, D., Sheridan, D. P., & Newman, M. E. J. (2002). Identity and search in social networks. Science 1(1), 26-41.
-
(2002)
Science
, vol.1
, Issue.1
, pp. 26-41
-
-
Watts, D.1
Sheridan, D.P.2
Newman, M.E.J.3
-
80
-
-
0036871183
-
-
IEEE
-
Winslett, M., Yu, T., Seamons, K. E., Hess, A., Jacobson, J., & Jarvis, R. (2002). Negotiating trust on the Web (pp. 30-37). IEEE.
-
(2002)
Negotiating Trust On the Web
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
-
81
-
-
0028380781
-
Authentication in the Taos operating system
-
Wobber, E., Abadi, M., Burrows, M., & Lampson, B. (1994). Authentication in the Taos operating system. ACM.
-
(1994)
ACM
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
-
83
-
-
33750086126
-
Investigating correlations of trust and interest similarity-do birds of a feather really flock together?
-
Ziegler, C.-N., & Golbeck, J. (2006). Investigating correlations of trust and interest similarity-do birds of a feather really flock together? Decision Support Systems 42(3), 1111-1136.
-
(2006)
Decision Support Systems
, vol.42
, Issue.3
, pp. 1111-1136
-
-
Ziegler, C.-N.1
Golbeck, J.2
|