Context-aware Trust Evaluation Functions for Dynamic Reconfigurable Systems
暂无分享,去创建一个
[1] John S. Baras,et al. Trust evaluation in ad-hoc networks , 2004, WiSe '04.
[2] Sarvapali D. Ramchurn,et al. Trust evaluation through relationship analysis , 2005, AAMAS '05.
[3] Joan Feigenbaum,et al. KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.
[4] Mikko Laukkanen,et al. Context-Sensitive Conversation Patterns for Agents in Wireless Environments , 2004, IWUC.
[5] Omer F. Rana,et al. Reputation-based semantic service discovery , 2004, 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[6] Matthew Richardson,et al. Trust Management for the Semantic Web , 2003, SEMWEB.
[7] Vladimiro Sassone,et al. A Framework for Concrete Reputation-Systems , 2005 .
[8] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[9] Paula M. C. Swatman,et al. Towards The Knowledge Society: eCommerce, eBusiness, and eGovernment, The Second IFIP Conference on E-Commerce, E-Business, E-Government (I3E 2002), October 7-9, 2002, Lisbon, Portugal , 2002, I3E.
[10] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[11] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[12] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[13] Audun Jøsang,et al. A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[14] Fredrik Espinoza,et al. GeoNotes: Social and Navigational Aspects of Location-Based Information Systems , 2001, UbiComp.
[15] Kun Yang,et al. Policy-Driven Mobile Agents for Context-Aware Service in Next Generation Networks , 2003, MATA.
[16] Oh,et al. SEAL — A Framework for Developing SEmantic PortALs , 2001 .
[17] Harith Alani,et al. Trust Strategies for the Semantic Web , 2004, Trust@ISWC.
[18] Birger Larsen,et al. Proceedings of the ACM SIGIR 2005 Workshop on Information Retrieval in Context (IRiX) , 2005 .
[19] Vladimiro Sassone,et al. A formal model for trust in dynamic networks , 2003, First International Conference onSoftware Engineering and Formal Methods, 2003.Proceedings..
[20] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.
[21] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[22] Lea Kutvonen,et al. Trust Management Survey , 2005, iTrust.
[23] Gregory D. Abowd,et al. A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications , 2001, Hum. Comput. Interact..
[24] Audun Jøsang,et al. Simplification and analysis of transitive trust networks , 2006, Web Intell. Agent Syst..
[25] Valérie Issarny,et al. Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.
[26] Grit Denker,et al. The Impact of Context on the Trustworthiness of Communication: An Ontological Approach , 2004, Trust@ISWC.
[27] Philip Robinson,et al. Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments , 2003, SPC.
[28] Jennifer Golbeck,et al. Computing and Applying Trust in Web-based Social Networks , 2005 .
[29] Morris Sloman,et al. Specifying and Analysing Trust for Internet Applications , 2002, I3E.
[30] Jason Pascoe,et al. The stick-e note architecture: extending the interface beyond the user , 1997, IUI '97.
[31] Vitaly Shmatikov,et al. Reputation-Based Trust Management ∗ , 2003 .
[32] Vladimiro Sassone,et al. A framework for concrete reputation-systems with applications to history-based access control , 2005, CCS '05.
[33] Audun Jøsang,et al. Analysing the Relationship between Risk and Trust , 2004, iTrust.
[34] Joan Feigenbaum,et al. REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.
[35] Béat Hirsbrunner,et al. Context Aware Service Provisioning , 2004, The IEEE/ACS International Conference on Pervasive Services.
[36] Zheng Yan,et al. Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .
[37] Catherine Faron-Zucker,et al. Searching the semantic Web: approximate query processing based on ontologies , 2006, IEEE Intelligent Systems.