메뉴 건너뛰기




Volumn , Issue , 2008, Pages 412-430

Design and implementation of trust enabling functions

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84898535697     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-59904-970-0.ch027     Document Type: Chapter
Times cited : (1)

References (33)
  • 4
    • 33746841335 scopus 로고    scopus 로고
    • Successful application of service-oriented architecture across the enterprise and beyond
    • Brown, G., & Carpenter, R. (2004). Successful application of service-oriented architecture across the enterprise and beyond. Intel Technology Journal, 8(4), 345-359.
    • (2004) Intel Technology Journal , vol.8 , Issue.4 , pp. 345-359
    • Brown, G.1    Carpenter, R.2
  • 6
    • 0038533367 scopus 로고    scopus 로고
    • Efficient revocation of anonymous group membership
    • Retrieved on March 29, 2007, from
    • Camenisch, J., & Lysyanskaya, A. (2001). Efficient revocation of anonymous group membership. Cryptology ePrint Archive, Report 2001/113. Retrieved on March 29, 2007, from http://eprint.iacr.org/2001/113
    • (2001) Cryptology EPrint Archive, Report 2001/113
    • Camenisch, J.1    Lysyanskaya, A.2
  • 9
    • 0036755364 scopus 로고    scopus 로고
    • Managing access in extended enterprise networks
    • Fuerst, K., Schmidt, T., & Wippel, G. (2002). Managing access in extended enterprise networks. IEEE Internet Computing, 6(5), 67-74.
    • (2002) IEEE Internet Computing , vol.6 , Issue.5 , pp. 67-74
    • Fuerst, K.1    Schmidt, T.2    Wippel, G.3
  • 10
    • 0002572137 scopus 로고
    • Individuals, interpersonal relations, and trust
    • In D. Gambetta (Ed.), New York: Basil Blackwell
    • Good, D. (1988). Individuals, interpersonal relations, and trust. In D. Gambetta (Ed.), Trust: Making and Breaking Cooperative Relations (pp. 31-48). New York: Basil Blackwell.
    • (1988) Trust: Making and Breaking Cooperative Relations , pp. 31-48
    • Good, D.1
  • 11
    • 84898513530 scopus 로고    scopus 로고
    • A survey of trust in internet applications. IEEE communications surveys
    • Fourth Quarter, 2000. Retrieved on March 29, 2007, from
    • Grandison, T., & Sloman, M. (2000). A survey of trust in internet applications. IEEE Communications Surveys, The Electronic Magazine of Original Peer-Reviewed Survey Articles, Fourth Quarter, 2000. Retrieved on March 29, 2007, from http://citeseer.ist.psu.edu/cachedpage/458414/1
    • (2000) The Electronic Magazine of Original Peer-Reviewed Survey Articles
    • Grandison, T.1    Sloman, M.2
  • 12
    • 84976657250 scopus 로고
    • An authorization mechanism for a relational database system
    • Griffiths, P., & Wade, B. (1976). An authorization mechanism for a relational database system. ACM TODS, 1(3), 242-255.
    • (1976) ACM TODS , vol.1 , Issue.3 , pp. 242-255
    • Griffiths, P.1    Wade, B.2
  • 13
    • 11744348112 scopus 로고
    • The street-level epistemology of trust
    • Hardin, R. (1993). The street-level epistemology of trust. Politics and Society, 21, 505-529.
    • (1993) Politics and Society , vol.21 , pp. 505-529
    • Hardin, R.1
  • 14
    • 84986173295 scopus 로고    scopus 로고
    • Communities of practice in the distributed international environment
    • Hildreth, P., Kimble, C., & Wright, P. (2000). Communities of practice in the distributed international environment. Journal of Knowledge Management, 4(1), 27-37.
    • (2000) Journal of Knowledge Management , vol.4 , Issue.1 , pp. 27-37
    • Hildreth, P.1    Kimble, C.2    Wright, P.3
  • 15
    • 0011255177 scopus 로고    scopus 로고
    • Internet x.509 public key infrastructure, certificate and certificate revocation list (CRL) profile
    • Retrieved on March 29, 2007, from
    • Houseley, R., Polk, W., Ford, W., & Solo, D. (2001). Internet X.509 public key infrastructure, certificate and certificate revocation list (CRL) Profile. RFC 3280 (RFC3280). Retrieved on March 29, 2007, from http://www.faqs/rfcs/rfc3280.html
    • (2001) RFC 3280 (RFC3280)
    • Houseley, R.1    Polk, W.2    Ford, W.3    Solo, D.4
  • 16
    • 0000142161 scopus 로고
    • Putting the balanced scorecard to work
    • Kaplan, R. S. & Norton, D. P. (1993). Putting the balanced scorecard to work. Harvard Business Review, 71(5), 134-141.
    • (1993) Harvard Business Review , vol.71 , Issue.5 , pp. 134-141
    • Kaplan, R.S.1    Norton, D.P.2
  • 17
    • 21544439275 scopus 로고    scopus 로고
    • Kerberos, Retrieved on March 29, 2007, from
    • Kerberos (2007). Kerberos: The network authentication protocol. Retrieved on March 29, 2007, from http://web.mit.edu/kerberos
    • (2007) Kerberos: The Network Authentication Protocol
  • 22
    • 19944374508 scopus 로고    scopus 로고
    • Enabling knowledge exchanges for e-business communities
    • Malhotra, Y. (2002). Enabling knowledge exchanges for e-business communities. information strategy: The Executives Journal, 18(3), 26-31.
    • (2002) Information Strategy: The Executives Journal , vol.18 , Issue.3 , pp. 26-31
    • Malhotra, Y.1
  • 24
    • 0011950977 scopus 로고    scopus 로고
    • Reputation and endorsement for web services
    • New York, NY, USA, ACM Press
    • Maximilien, E. M., & Singh, M. P. (2002). Reputation and endorsement for web services. ACM SIGecom Exchanges, (pp. 24-31). New York, NY, USA: ACM Press.
    • (2002) ACM SIGecom Exchanges , pp. 24-31
    • Maximilien, E.M.1    Singh, M.P.2
  • 28
    • 0016081584 scopus 로고
    • Protection and the control of information sharing in multics
    • Saltzer, J. (1974). Protection and the control of information sharing in multics. Communications of the ACM (CACM), 17(7). 388-402.
    • (1974) Communications of the ACM (CACM) , vol.17 , Issue.7 , pp. 388-402
    • Saltzer, J.1
  • 29
    • 84935412791 scopus 로고
    • The social control of impersonal trust
    • Shapiro, S. P. (1987). The social control of impersonal trust. American Journal of Sociology, 93(3), 623-658.
    • (1987) American Journal of Sociology , vol.93 , Issue.3 , pp. 623-658
    • Shapiro, S.P.1
  • 30
    • 2942654406 scopus 로고    scopus 로고
    • Certificate-based authorization policy in a PKI environment
    • Thompson, M. R., Essiari, A., & Mudumbai, S. (2003). Certificate-based authorization policy in a PKI environment. ACM Press, 6(4), 566-588.
    • (2003) ACM Press , vol.6 , Issue.4 , pp. 566-588
    • Thompson, M.R.1    Essiari, A.2    Mudumbai, S.3
  • 32
    • 84944078503 scopus 로고    scopus 로고
    • A reputation-based trust model for peer-to-peer ecommerce communities
    • 275-183, Washington, DC, USA: IEEE Computer Society Press
    • Xiong, L., & Liu, L. (2003). A Reputation-Based Trust Model for Peer-to-Peer eCommerce Communities. In Proceedings of the 2003 IEEE Conference on E-Commerce Technology (CEC'03) (pp. 275-183). Washington, DC, USA: IEEE Computer Society Press.
    • (2003) Proceedings of the 2003 IEEE Conference on E-Commerce Technology (CEC'03)
    • Xiong, L.1    Liu, L.2
  • 33
    • 0034309383 scopus 로고    scopus 로고
    • Trust management through reputation mechanisms
    • Zacharia, G., & Maes, P. (2000). Trust management through reputation mechanisms. Applied Artificial Intelligence, 14(9), 881-907.
    • (2000) Applied Artificial Intelligence , vol.14 , Issue.9 , pp. 881-907
    • Zacharia, G.1    Maes, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.