-
2
-
-
4644338317
-
Trust negotiation in electronic markets
-
In Schoop, M. & Walczuch (Eds.), Maastricht, The Netherlands
-
Barlow, T., Hess, A., & Seamons, K. E. (2001). Trust negotiation in electronic markets. In Schoop, M. & Walczuch (Eds.), Proceedings of the Eighth Research Symposium on Emerging Electronic Markets (RSEEM 01). Maastricht, The Netherlands.
-
(2001)
Proceedings of the Eighth Research Symposium on Emerging Electronic Markets (RSEEM 01)
-
-
Barlow, T.1
Hess, A.2
Seamons, K.E.3
-
3
-
-
33745900062
-
Xtrust: A scalable trust management infrastructure
-
Fredericton, New Brunswick, Canada
-
Branchaud, M., & Flinn, S. (2004). xTrust: A scalable trust management infrastructure. In Proceedings of the Second Annual Conference on Privacy, Security and Trust (PST 2004) (pp. 207-218), Fredericton, New Brunswick, Canada.
-
(2004)
Proceedings of the Second Annual Conference on Privacy, Security and Trust (PST 2004)
, pp. 207-218
-
-
Branchaud, M.1
Flinn, S.2
-
4
-
-
33746841335
-
Successful application of service-oriented architecture across the enterprise and beyond
-
Brown, G., & Carpenter, R. (2004). Successful application of service-oriented architecture across the enterprise and beyond. Intel Technology Journal, 8(4), 345-359.
-
(2004)
Intel Technology Journal
, vol.8
, Issue.4
, pp. 345-359
-
-
Brown, G.1
Carpenter, R.2
-
5
-
-
0003609864
-
-
Boston, MA, USA, Harvard Business School Press
-
Brown, J. S., & Duguid, P. (2000). The social life of information. Boston, MA, USA: Harvard Business School Press.
-
(2000)
The Social Life of Information
-
-
Brown, J.S.1
Duguid, P.2
-
6
-
-
0038533367
-
Efficient revocation of anonymous group membership
-
Retrieved on March 29, 2007, from
-
Camenisch, J., & Lysyanskaya, A. (2001). Efficient revocation of anonymous group membership. Cryptology ePrint Archive, Report 2001/113. Retrieved on March 29, 2007, from http://eprint.iacr.org/2001/113
-
(2001)
Cryptology EPrint Archive, Report 2001/113
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
7
-
-
0001809810
-
The ponder policy specification language
-
Bristol, UK: Springer-Verlag LNCS 1995
-
Damianou, N., Dulay, N., Lupu, E., & Sloman, M. (2001). The ponder policy specification language. In Proceedings Policy 2001: Workshop on Policies for Distributed Systems and Networks (pp. 17-28). Bristol, UK: Springer-Verlag LNCS 1995.
-
(2001)
Proceedings Policy 2001: Workshop on Policies for Distributed Systems and Networks
, pp. 17-28
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
9
-
-
0036755364
-
Managing access in extended enterprise networks
-
Fuerst, K., Schmidt, T., & Wippel, G. (2002). Managing access in extended enterprise networks. IEEE Internet Computing, 6(5), 67-74.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.5
, pp. 67-74
-
-
Fuerst, K.1
Schmidt, T.2
Wippel, G.3
-
10
-
-
0002572137
-
Individuals, interpersonal relations, and trust
-
In D. Gambetta (Ed.), New York: Basil Blackwell
-
Good, D. (1988). Individuals, interpersonal relations, and trust. In D. Gambetta (Ed.), Trust: Making and Breaking Cooperative Relations (pp. 31-48). New York: Basil Blackwell.
-
(1988)
Trust: Making and Breaking Cooperative Relations
, pp. 31-48
-
-
Good, D.1
-
11
-
-
84898513530
-
A survey of trust in internet applications. IEEE communications surveys
-
Fourth Quarter, 2000. Retrieved on March 29, 2007, from
-
Grandison, T., & Sloman, M. (2000). A survey of trust in internet applications. IEEE Communications Surveys, The Electronic Magazine of Original Peer-Reviewed Survey Articles, Fourth Quarter, 2000. Retrieved on March 29, 2007, from http://citeseer.ist.psu.edu/cachedpage/458414/1
-
(2000)
The Electronic Magazine of Original Peer-Reviewed Survey Articles
-
-
Grandison, T.1
Sloman, M.2
-
12
-
-
84976657250
-
An authorization mechanism for a relational database system
-
Griffiths, P., & Wade, B. (1976). An authorization mechanism for a relational database system. ACM TODS, 1(3), 242-255.
-
(1976)
ACM TODS
, vol.1
, Issue.3
, pp. 242-255
-
-
Griffiths, P.1
Wade, B.2
-
13
-
-
11744348112
-
The street-level epistemology of trust
-
Hardin, R. (1993). The street-level epistemology of trust. Politics and Society, 21, 505-529.
-
(1993)
Politics and Society
, vol.21
, pp. 505-529
-
-
Hardin, R.1
-
14
-
-
84986173295
-
Communities of practice in the distributed international environment
-
Hildreth, P., Kimble, C., & Wright, P. (2000). Communities of practice in the distributed international environment. Journal of Knowledge Management, 4(1), 27-37.
-
(2000)
Journal of Knowledge Management
, vol.4
, Issue.1
, pp. 27-37
-
-
Hildreth, P.1
Kimble, C.2
Wright, P.3
-
15
-
-
0011255177
-
Internet x.509 public key infrastructure, certificate and certificate revocation list (CRL) profile
-
Retrieved on March 29, 2007, from
-
Houseley, R., Polk, W., Ford, W., & Solo, D. (2001). Internet X.509 public key infrastructure, certificate and certificate revocation list (CRL) Profile. RFC 3280 (RFC3280). Retrieved on March 29, 2007, from http://www.faqs/rfcs/rfc3280.html
-
(2001)
RFC 3280 (RFC3280)
-
-
Houseley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
16
-
-
0000142161
-
Putting the balanced scorecard to work
-
Kaplan, R. S. & Norton, D. P. (1993). Putting the balanced scorecard to work. Harvard Business Review, 71(5), 134-141.
-
(1993)
Harvard Business Review
, vol.71
, Issue.5
, pp. 134-141
-
-
Kaplan, R.S.1
Norton, D.P.2
-
17
-
-
21544439275
-
-
Kerberos, Retrieved on March 29, 2007, from
-
Kerberos (2007). Kerberos: The network authentication protocol. Retrieved on March 29, 2007, from http://web.mit.edu/kerberos
-
(2007)
Kerberos: The Network Authentication Protocol
-
-
-
20
-
-
84898514778
-
-
April 21-22, Paper presented at the First European Young Researchers Workshop on Service Oriented Computing, Leicester, UK
-
Lemmergaard, J., C. Gersbo-Møller, D. Brigth, & T. Hansson (2005, April 21-22). Trust and community management: Design and implementation of trust enabling technologie. Paper presented at the First European Young Researchers Workshop on Service Oriented Computing, Leicester, UK.
-
(2005)
Trust and Community Management: Design and Implementation of Trust Enabling Technologie
-
-
Lemmergaard, J.1
Gersbo-Møller, C.2
Brigth, D.3
Hansson, T.4
-
21
-
-
0036085965
-
Design of a role-based trust-management framework
-
Washington, DC, USA: IEEE Computer Society Press
-
Li, N., Mitchell, J. C., & Winsborough, W. H. (2002). Design of a role-based trust-management framework. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, (pp. 114-130). Washington, DC, USA: IEEE Computer Society Press.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
22
-
-
19944374508
-
Enabling knowledge exchanges for e-business communities
-
Malhotra, Y. (2002). Enabling knowledge exchanges for e-business communities. information strategy: The Executives Journal, 18(3), 26-31.
-
(2002)
Information Strategy: The Executives Journal
, vol.18
, Issue.3
, pp. 26-31
-
-
Malhotra, Y.1
-
24
-
-
0011950977
-
Reputation and endorsement for web services
-
New York, NY, USA, ACM Press
-
Maximilien, E. M., & Singh, M. P. (2002). Reputation and endorsement for web services. ACM SIGecom Exchanges, (pp. 24-31). New York, NY, USA: ACM Press.
-
(2002)
ACM SIGecom Exchanges
, pp. 24-31
-
-
Maximilien, E.M.1
Singh, M.P.2
-
26
-
-
0002101577
-
Reputation systems
-
Resnick, P., Zeckhauser, R., Friedman, E., & Kuwabara, K. (2000). Reputation systems. Communications of the ACM, 43(12), 45-48.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Zeckhauser, R.2
Friedman, E.3
Kuwabara, K.4
-
28
-
-
0016081584
-
Protection and the control of information sharing in multics
-
Saltzer, J. (1974). Protection and the control of information sharing in multics. Communications of the ACM (CACM), 17(7). 388-402.
-
(1974)
Communications of the ACM (CACM)
, vol.17
, Issue.7
, pp. 388-402
-
-
Saltzer, J.1
-
29
-
-
84935412791
-
The social control of impersonal trust
-
Shapiro, S. P. (1987). The social control of impersonal trust. American Journal of Sociology, 93(3), 623-658.
-
(1987)
American Journal of Sociology
, vol.93
, Issue.3
, pp. 623-658
-
-
Shapiro, S.P.1
-
30
-
-
2942654406
-
Certificate-based authorization policy in a PKI environment
-
Thompson, M. R., Essiari, A., & Mudumbai, S. (2003). Certificate-based authorization policy in a PKI environment. ACM Press, 6(4), 566-588.
-
(2003)
ACM Press
, vol.6
, Issue.4
, pp. 566-588
-
-
Thompson, M.R.1
Essiari, A.2
Mudumbai, S.3
-
32
-
-
84944078503
-
A reputation-based trust model for peer-to-peer ecommerce communities
-
275-183, Washington, DC, USA: IEEE Computer Society Press
-
Xiong, L., & Liu, L. (2003). A Reputation-Based Trust Model for Peer-to-Peer eCommerce Communities. In Proceedings of the 2003 IEEE Conference on E-Commerce Technology (CEC'03) (pp. 275-183). Washington, DC, USA: IEEE Computer Society Press.
-
(2003)
Proceedings of the 2003 IEEE Conference on E-Commerce Technology (CEC'03)
-
-
Xiong, L.1
Liu, L.2
-
33
-
-
0034309383
-
Trust management through reputation mechanisms
-
Zacharia, G., & Maes, P. (2000). Trust management through reputation mechanisms. Applied Artificial Intelligence, 14(9), 881-907.
-
(2000)
Applied Artificial Intelligence
, vol.14
, Issue.9
, pp. 881-907
-
-
Zacharia, G.1
Maes, P.2
|