Using Recommendations for Managing Trust in Distributed Systems
暂无分享,去创建一个
[1] Sverker Jansson,et al. Simulated Social Control for Secure Internet Commerce ( position paper ) , 1996 .
[2] C. Badcock,et al. Trust : making and breaking cooperative relations , 1989 .
[3] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[4] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[5] Sverker Janson,et al. Reactive Security and Social Control , 1996 .
[6] Ueli Maurer,et al. Modelling a Public-Key Infrastructure , 1996, ESORICS.
[7] P. S. Tasker,et al. DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA , 1985 .
[8] Thomas Beth,et al. Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] N. Luhmann. Trust and Power , 1979 .
[10] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[11] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[12] Audun Jøsang,et al. The right type of trust for distributed systems , 1996, NSPW '96.