-
1
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
J. Zhu and J. Ma, “A new authentication scheme with anonymity for wireless environments,” IEEE Transactions on Consumer Electronics, Vol. 50, 2004, pp. 231-235.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, pp. 231-235
-
-
Zhu, J.1
Ma, J.2
-
2
-
-
84916883747
-
A variable threshold-value authentication architecture for wireless mesh networks
-
P. Guo, J. Wang, B. Li, and S. Lee, “A variable threshold-value authentication architecture for wireless mesh networks,” Journal of Internet Technology, Vol. 15, 2014, pp. 929-936.
-
(2014)
Journal of Internet Technology
, vol.15
, pp. 929-936
-
-
Guo, P.1
Wang, J.2
Li, B.3
Lee, S.4
-
4
-
-
84921914402
-
ReputationPro: The efficient approaches to contextual transaction trust computation in E-commerce environments
-
H. B. Zhang, Y. Wang, X. Z. Zhang, and E.-P. Lim, “ReputationPro: the efficient approaches to contextual transaction trust computation in E-commerce environments,” ACM Transactions on the Web, Vol. 9, 2015, p. 49.
-
(2015)
ACM Transactions on The Web
, vol.9
, pp. 49
-
-
Zhang, H.B.1
Wang, Y.2
Zhang, X.Z.3
Lim, E.-P.4
-
5
-
-
84926455204
-
Social network and tag sources based augmenting collaborative recommender system
-
T. H. Ma, J. J. Zhou, M. L. Tang, Y. Tian, A. Al-dhelaan, M. Al-rodhaan, and S. Y. Lee, “Social network and tag sources based augmenting collaborative recommender system,” IEICE Transactions on Information and Systems, Vol. E98-D, 2015, pp. 902-910.
-
(2015)
IEICE Transactions on Information and Systems
, vol.E98-D
, pp. 902-910
-
-
Ma, T.H.1
Zhou, J.J.2
Tang, M.L.3
Tian, Y.4
Al-Dhelaan, A.5
Al-Rodhaan, M.6
Lee, S.Y.7
-
7
-
-
84855998039
-
A trust negotiation based security framework for service provisioning in load-balancing clusters
-
A. Maña, H. Koshutanski, and E. J. Pérez, “A trust negotiation based security framework for service provisioning in load-balancing clusters,” Computers and Security, Vol. 31, 2012, pp. 4-25.
-
(2012)
Computers and Security
, vol.31
, pp. 4-25
-
-
Maña, A.1
Koshutanski, H.2
Pérez, E.J.3
-
8
-
-
33745764834
-
Automated trust negotiation using cryptographic credentials
-
J. Li, N. Li, and W. H. Winsborough, “Automated trust negotiation using cryptographic credentials,” in Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005, pp. 46-57.
-
(2005)
Proceedings of The 12th ACM Conference on Computer and Communications Security
, pp. 46-57
-
-
Li, J.1
Li, N.2
Winsborough, W.H.3
-
9
-
-
84939548725
-
Automated trust negotiation
-
W. H. Winsborough, K. E. Seamons, and V. E. Jones, “Automated trust negotiation,” in Proceedings of IEEE DARPA Information Survivability Conference and Exposition, Vol. 1, 2000, pp. 88-102.
-
(2000)
Proceedings of IEEE DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 88-102
-
-
Winsborough, W.H.1
Seamons, K.E.2
Jones, V.E.3
-
10
-
-
84860569499
-
Trust vector-based sensitive information protecting scheme in automatic trust negotiation
-
J. Lei, B. Zhang, and X. Fang, “Trust vector-based sensitive information protecting scheme in automatic trust negotiation,” in Proceedings of IEEE International Conference on Computer Science and Network Technology, Vol. 2, 2011, pp. 735-738.
-
(2011)
Proceedings of IEEE International Conference on Computer Science and Network Technology
, vol.2
, pp. 735-738
-
-
Lei, J.1
Zhang, B.2
Fang, X.3
-
11
-
-
77957003585
-
A rule-based trust negotiation system
-
P. Bonatti, J. L. De Coi, D. Olmedilla, et al. “A rule-based trust negotiation system,” IEEE Transactions on Knowledge and Data Engineering, Vol. 22, 2010, pp. 1507-1520.
-
(2010)
IEEE Transactions on Knowledge and Data Engineering
, vol.22
, pp. 1507-1520
-
-
Bonatti, P.1
De Coi, J.L.2
Olmedilla, D.3
-
12
-
-
84855998039
-
A trust negotiation based security framework for service provisioning in load-balancing clusters
-
A. Maña, H. Koshutanski, and E. J.Pérez, “A trust negotiation based security framework for service provisioning in load-balancing clusters,” Computers and Security, Vol. 31, 2012, pp. 4-25.
-
(2012)
Computers and Security
, vol.31
, pp. 4-25
-
-
Maña, A.1
Koshutanski, H.2
Pérez, E.J.3
-
13
-
-
80052669474
-
A subjective logic based dynamic trust mechanism for voice over internet protocol (VOIP) over wireless mesh networks (WMNs)
-
H. Lin, L. Xu, J. Gao, et al., “A subjective logic based dynamic trust mechanism for voice over internet protocol (VOIP) over wireless mesh networks (WMNs),” Scientific Research and Essays, Vol. 18, 2011, pp. 3873-3884.
-
(2011)
Scientific Research and Essays
, vol.18
, pp. 3873-3884
-
-
Lin, H.1
Xu, L.2
Gao, J.3
-
14
-
-
84948440714
-
Design of a role-based trust-management framework
-
N. Li, J. C. Mitchell, and W. H. Winsborough, “Design of a role-based trust-management framework,” in Proceedings of IEEE Symposium on Security and Privacy, 2002, pp. 114-130.
-
(2002)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
15
-
-
24344462707
-
Privacy-preserving trust negotiations
-
E. Bertino, E. Ferrari, and A. C. Squicciarini, “Privacy-preserving trust negotiations,” Privacy Enhancing Technologies, 2005, pp. 283-301.
-
(2005)
Privacy Enhancing Technologies
, pp. 283-301
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
16
-
-
35048864339
-
Trading privacy for trust
-
Springer, Berlin, Heidelberg
-
J. M. Seigneur and C. D. Jensen, “Trading privacy for trust,” Trust Management, Springer, Berlin, Heidelberg, 2004, pp. 93-107.
-
(2004)
Trust Management
, pp. 93-107
-
-
Seigneur, J.M.1
Jensen, C.D.2
-
17
-
-
84957811521
-
Protecting privacy during on-line trust negotiation
-
Springer, Berlin, Heidelberg
-
Seamons, E. Kent, et al., “Protecting privacy during on-line trust negotiation,” Privacy Enhancing Technologies, Springer, Berlin, Heidelberg, 2003, pp. 129-143.
-
(2003)
Privacy Enhancing Technologies
, pp. 129-143
-
-
Seamons, E.K.1
-
18
-
-
78349255568
-
Point-based trust: Define how much privacy is worth
-
Springer, Berlin, Heidelberg
-
D. Yao, K. B. Frikken, M. J. Atallah, et al., “Point-based trust: Define how much privacy is worth,” Information and Communications Security, Springer, Berlin, Heidelberg, 2006, pp. 190-209.
-
(2006)
Information and Communications Security
, pp. 190-209
-
-
Yao, D.1
Frikken, K.B.2
Atallah, M.J.3
-
20
-
-
79955997599
-
Receipt-mode trust negotiation: Efficient authorization through outsourced interactions
-
A. K. Adams, A. J. Lee, and D. Mossé, “Receipt-mode trust negotiation: efficient authorization through outsourced interactions,” in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011, pp. 430-434.
-
(2011)
Proceedings of The 6th ACM Symposium on Information, Computer and Communications Security
, pp. 430-434
-
-
Adams, A.K.1
Lee, A.J.2
Mossé, D.3
-
21
-
-
77954936499
-
Privacy-preserving trust verification
-
J. Vaidya, V. Atluri, B. Shafiq, et al., “Privacy-preserving trust verification,” in Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010, pp. 139-148.
-
(2010)
Proceedings of The 15th ACM Symposium on Access Control Models and Technologies
, pp. 139-148
-
-
Vaidya, J.1
Atluri, V.2
Shafiq, B.3
-
22
-
-
84923041168
-
Reaching agreement in security policy negotiation
-
Y. Li, N. Cuppens-Boulahia, J. M. Crom, et al., “Reaching agreement in security policy negotiation,” in Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2014, pp. 98-105.
-
(2014)
Proceedings of The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
, pp. 98-105
-
-
Li, Y.1
Cuppens-Boulahia, N.2
Crom, J.M.3
-
24
-
-
84961572519
-
Trust negotiation based approach to enforce manet routing security
-
A. B. C. Douss, S. Ayed, R. Abassi, et al. “Trust negotiation based approach to enforce manet routing security,” in Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015, pp. 360-366.
-
(2015)
Proceedings of The 10th International Conference on Availability, Reliability and Security
, pp. 360-366
-
-
Douss, A.B.C.1
Ayed, S.2
Abassi, R.3
-
25
-
-
85032613367
-
Cloud-based utility service framework for trust negotiations using federated identity management
-
U. Premarathne, I. Khalil, Z. Tari, et al., “Cloud-based utility service framework for trust negotiations using federated identity management,” IEEE Transactions on Cloud Computing, 2015.
-
(2015)
IEEE Transactions on Cloud Computing
-
-
Premarathne, U.1
Khalil, I.2
Tari, Z.3
-
27
-
-
0004116989
-
-
MIT Press, Cambridge
-
T. H. Cormen, C. E. Leiserson, R. L. Rivest, et al., Introduction to Algorithms, MIT Press, Cambridge, 2001.
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
-
29
-
-
77649261628
-
-
Ph.D. Thesis, Department of Computer Science, Stanford University
-
C. Gentry, “A fully homomorphic encryption scheme,” Ph.D. Thesis, Department of Computer Science, Stanford University, 2009.
-
(2009)
A Fully Homomorphic Encryption Scheme
-
-
Gentry, C.1
-
30
-
-
0034449542
-
PRUNES: An efficient and complete strategy for automated trust negotiation over the Internet
-
T. Yu, X. Ma, and M. Winslett, “PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet,” in Proceedings of the 7th ACM Conference on Computer and Communications Security, 2000, pp. 210-219.
-
(2000)
Proceedings of The 7th ACM Conference on Computer and Communications Security
, pp. 210-219
-
-
Yu, T.1
Ma, X.2
Winslett, M.3
|