Conceptual Models for Assessment & Assurance of Dependability, Security and Privacy in the Eternal CONNECTed World

This is the first deliverable of WP5, which covers Conceptual Models for Assessment & Assurance of Dependability, Security and Privacy in the Eternal CONNECTed World. As described in the project DOW, in this document we cover the following topics: • Metrics definition • Identification of limitations of current V&V approaches and exploration of extensions/refinements/ new developments • Identification of security, privacy and trust models WP5 focus is on dependability concerning the peculiar aspects of the project, i.e., the threats deriving from on-the-fly synthesis of CONNECTors. We explore appropriate means for assessing/guaranteeing that the CONNECTed System yields acceptable levels for non-functional properties, such as reliability (e.g., the CONNECTor will ensure continued communication without interruption), security and privacy (e.g., the transactions do not disclose confidential data), trust (e.g., Networked Systems are put in communication only with parties they trust). After defining a conceptual framework for metrics definition, we present the approaches to dependability in CONNECT, which cover: i) Model-based V&V, ii) Security enforcement and iii) Trust management. The approaches are centered around monitoring, to allow for on-line analysis. Monitoring is performed alongside the functionalities of the CONNECTed System and is used to detect conditions that are deemed relevant by its clients (i.e., the other CONNECT Enablers). A unified lifecycle encompassing dependability analysis, security enforcement and trust management is outlined, spanning over discovery time, synthesis time and execution time.

[1]  Henrik Ejersbo Jensen,et al.  Reachability Analysis of Probabilistic Systems by Successive Refinements , 2001, PAPM-PROBMIV.

[2]  Alessio Lomuscio,et al.  MCMAS: A Model Checker for the Verification of Multi-Agent Systems , 2009, CAV.

[3]  Amjad Nusayr AOP as a formal framework for runtime monitoring , 2008, FSEDS '08.

[4]  Ilaria Matteucci,et al.  Enforcing private policy via security-by-Contract , 2010 .

[5]  Kyung-Goo Doh,et al.  Trust Type Based Semantic Web Services Assessment and Selection , 2008, 2008 10th International Conference on Advanced Communication Technology.

[6]  Oscar Naim,et al.  Invasiveness of Performance Instrumentation Measurements on Mulitprocessors , 1994, Applications in Parallel and Distributed Computing.

[7]  Gianfranco Ciardo,et al.  A Characterization of the Stochastic Process Underlying a Stochastic Petri Net , 1994, IEEE Trans. Software Eng..

[8]  Standard Glossary of Software Engineering Terminology , 1990 .

[9]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[10]  Brian Randell,et al.  Facing up to Faults , 2000 .

[11]  Richard J. Moore Dynamic Probes and Generalised Kernel Hooks Interface for Linux , 2000, Annual Linux Showcase & Conference.

[12]  Gianfranco Balbo,et al.  Introduction to Stochastic Petri Nets , 2002, European Educational Forum: School on Formal Methods and Performance Analysis.

[13]  Andrea Bondavalli,et al.  Quantitative Evaluation of Distributed Algorithms Using the Neko Framework: The NekoStat Extension , 2005, LADC.

[14]  Paul Dourish,et al.  Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.

[15]  Marta Z. Kwiatkowska,et al.  Stochastic Model Checking , 2007, SFM.

[16]  William J. Stewart,et al.  Introduction to the numerical solution of Markov Chains , 1994 .

[17]  Andrea Bondavalli,et al.  Model-Based Evaluation as a Support to the Design of Dependable Systems , 2005 .

[18]  Silvano Chiaradonna,et al.  Dependability Analysis of Diffusion Protocols in Wireless Networks with Heterogeneous Node Capabilities , 2010, 2010 European Dependable Computing Conference.

[19]  Valérie Issarny,et al.  Towards a formalization of mediating connectors for on the fly interoperability , 2009, 2009 Joint Working IEEE/IFIP Conference on Software Architecture & European Conference on Software Architecture.

[20]  Miklós Telek,et al.  Non-Exponential Stochastic Petri Nets: an Overview of Methods and Techniques , 1997 .

[21]  Lea Viljanen,et al.  Towards an Ontology of Trust , 2005, TrustBus.

[22]  J. Golbeck,et al.  FilmTrust: movie recommendations using trust in web-based social networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[23]  T. W. Anderson,et al.  Resilient Computing Systems , 1987 .

[24]  Fabio Massacci,et al.  Extending Security-by-Contract with Quantitative Trust on Mobile Devices , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.

[25]  Wojciech Penczek,et al.  LDYIS: a Framework for Model Checking Security Protocols , 2008, Fundam. Informaticae.

[26]  T. Anderson,et al.  Resilient computing systems: vol. 1 , 1986 .

[27]  Audun Jøsang,et al.  Semantic Constraints for Trust Transitivity , 2005, APCCM.

[28]  Kishor S. Trivedi,et al.  Recent Developments in Non-Markovian Stochastic Petri Nets , 1998, J. Circuits Syst. Comput..

[29]  Fabio Martinelli,et al.  A Uniform Framework for Security and Trust Modeling and Analysis with Crypto-CCS , 2007, Electron. Notes Theor. Comput. Sci..

[30]  Daisuke Okabe Emergent Social Practices, Situations and Relations through Everyday Camera Phone Use , 2004 .

[31]  Jason Gait,et al.  A probe effect in concurrent programs , 1986, Softw. Pract. Exp..

[32]  N. Luhmann Familiarity, Confidence, Trust: Problems and Alternatives , 2000 .

[33]  C. Pasareanu,et al.  Assume-guarantee testing , 2006, SAVCBS '05.

[34]  Marta Z. Kwiatkowska,et al.  Probabilistic symbolic model checking with PRISM: a hybrid approach , 2004, International Journal on Software Tools for Technology Transfer.

[35]  Morris Sloman,et al.  GEM: a generalized event monitoring language for distributed systems , 1997, Distributed Syst. Eng..

[36]  William H. Sanders,et al.  Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.

[37]  Christoph Lenzen,et al.  Tight bounds for clock synchronization , 2010, JACM.

[38]  Tom Rodden,et al.  Moving out from the control room: ethnography in system design , 1994, CSCW '94.

[39]  Alessio Lomuscio,et al.  Towards verifying compliance in agent-based web service compositions , 2008, AAMAS.

[40]  B. P. Shah,et al.  Analytic solution of stochastic activity networks with exponential and deterministic activities , 1998 .

[41]  Toshiaki Yasue,et al.  An Empirical Study of Method In-lining for a Java Just-in-Time Compiler , 2002, Java Virtual Machine Research and Technology Symposium.

[42]  Jeffrey J. P. Tsai,et al.  A noninvasive architecture to monitor real-time distributed systems , 1990, Computer.

[43]  Michael Steiner,et al.  Malicious- and Accidental-Fault Tolerance for Internet Applications , 2002 .

[44]  Alessio Lomuscio,et al.  Towards verifying contract regulated service composition , 2008, 2008 IEEE International Conference on Web Services.

[45]  Marco Ajmone Marsan,et al.  On Petri nets with deterministic and exponentially distributed firing times , 1986, European Workshop on Applications and Theory of Petri Nets.

[46]  Arjun K. Gupta,et al.  Beta Distribution , 2011, International Encyclopedia of Statistical Science.

[47]  Joseph Y. Halpern,et al.  Gossip-based ad hoc routing , 2002, IEEE/ACM Transactions on Networking.

[48]  Jens Rasmussen,et al.  The Definition of Human Error and a Taxonomy for Technical System Design , 1987 .

[49]  Fabio Massacci,et al.  Enhancing Java ME Security Support with Resource Usage Monitoring , 2008, ERCIM News.

[50]  Michael K. Molloy Performance Analysis Using Stochastic Petri Nets , 1982, IEEE Transactions on Computers.

[51]  Cai-Nicolas Ziegler Investigating Correlations of Trust and Interest Similarity-Do Birds of a Feather Really Flock Together ? , 2005 .

[52]  Wouter Joosen,et al.  Security-by-contract on the .NET platform , 2008, Inf. Secur. Tech. Rep..

[53]  Fabio Martinelli,et al.  A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application , 2008, ISoLA.

[54]  Sheikh Iqbal Ahamed,et al.  An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[55]  Timothy W. Finin,et al.  In reputation we believe: query processing in mobile ad-hoc networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[56]  J. Shaoul Human Error , 1973, Nature.

[57]  Alessio Lomuscio,et al.  Verifying Temporal and Epistemic Properties of Web Service Compositions , 2007, ICSOC.

[58]  Algirdas Avizienis,et al.  Design of fault-tolerant computers , 1967, AFIPS '67 (Fall).

[59]  Reinhard German,et al.  Non-Markovian Analysis , 2002, European Educational Forum: School on Formal Methods and Performance Analysis.

[60]  Christel Baier,et al.  On the Logical Characterisation of Performability Properties , 2000, ICALP.

[61]  Valérie Issarny,et al.  An incentive compatible reputation mechanism for ubiquitous computing environments , 2006, International Journal of Information Security.

[62]  Fabio Martinelli,et al.  Fine Grained Access Control with Trust and Reputation Management for Globus , 2007, OTM Conferences.

[63]  Paola Inverardi,et al.  Modeling of application- and middleware-layer interaction protocols , 2010 .

[64]  Andrea Bondavalli,et al.  A modeling methodology for hierarchical control system and its aplication , 2010, Journal of the Brazilian Computer Society.

[65]  Ling Liu,et al.  A reputation-based trust model for peer-to-peer ecommerce communities , 2003, EC.

[66]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[67]  Steve Howard,et al.  Just what do the youth of today want? Technology appropriation by young people , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[68]  Paulo Marques,et al.  RAIL: code instrumentation for .NET , 2004, OOPSLA '04.

[69]  Terry Williams,et al.  Probability and Statistics with Reliability, Queueing and Computer Science Applications , 1983 .

[70]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[71]  Christel Baier,et al.  Model-Checking Algorithms for Continuous-Time Markov Chains , 2002, IEEE Trans. Software Eng..

[72]  A. Batavia,et al.  Toward the development of consumer-based criteria for the evaluation of assistive devices. , 1990, Journal of rehabilitation research and development.

[73]  Sharma Chakravarthy,et al.  Event Specification and Processing for Advanced Applications: Generalization and Formalization , 2007, DEXA.

[74]  David Chaum,et al.  The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.

[75]  Konrad Slind,et al.  Monitoring distributed systems , 1987, TOCS.

[76]  William H. Sanders,et al.  The Mobius modeling tool , 2001, Proceedings 9th International Workshop on Petri Nets and Performance Models.

[77]  Lubos Brim,et al.  ProbDiVinE-MC: Multi-core LTL Model Checker for Probabilistic Systems , 2008, 2008 Fifth International Conference on Quantitative Evaluation of Systems.

[78]  Marta Z. Kwiatkowska,et al.  PRISM: probabilistic model checking for performance and reliability analysis , 2009, PERV.

[79]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[80]  William H. Sanders,et al.  A Unified Approach for Specifying Measures of Performance, Dependability and Performability , 1991 .

[81]  Paul Dourish,et al.  Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena , 2006, Hum. Comput. Interact..

[82]  Christof Fetzer,et al.  Challenges in Making Pervasive Systems Dependable , 2003, Future Directions in Distributed Computing.

[83]  Alex S. Taylor,et al.  Age-old practices in the 'new world': a study of gift-giving between teenage mobile phone users , 2002, CHI.

[84]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[85]  Nicolas Guelfi,et al.  A metadata-based architectural model for dynamically resilient systems , 2007, SAC '07.

[86]  Colin J. Fidge Fundamentals of Distributed System Observation , 1996, IEEE Softw..

[87]  Kishor S. Trivedi,et al.  Automated Generation and Analysis of Markov Reward Models Using Stochastic Reward Nets , 1993 .

[88]  Sharon Paradesi,et al.  Integrating Behavioral Trust in Web Service Compositions , 2009, 2009 IEEE International Conference on Web Services.

[89]  Abigail Sellen,et al.  The ubiquitous camera: an in-depth study of camera phone use , 2005, IEEE Pervasive Computing.

[90]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[91]  Andrea Bondavalli,et al.  A Decomposition-Based Modeling Framework for Complex Systems , 2009, IEEE Transactions on Reliability.

[92]  C. Geertz,et al.  The Interpretation of Cultures , 1973 .

[93]  William H. Sanders,et al.  Dependability Evaluation Using Composed SAN-Based Reward Models , 1992, J. Parallel Distributed Comput..

[94]  Leslie Lamport,et al.  Time, clocks, and the ordering of events in a distributed system , 1978, CACM.

[95]  Radu Grosu,et al.  Software monitoring with bounded overhead , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[96]  J-C. Laprie,et al.  DEPENDABLE COMPUTING AND FAULT TOLERANCE : CONCEPTS AND TERMINOLOGY , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'..

[97]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[98]  Joost-Pieter Katoen,et al.  How Fast and Fat Is Your Probabilistic Model Checker? An Experimental Performance Comparison , 2007, Haifa Verification Conference.

[99]  Silvano Chiaradonna,et al.  Interdependency Analysis in Electric Power Systems , 2008, CRITIS.

[100]  Thomas A. Henzinger,et al.  Alternating-time temporal logic , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.

[101]  Ian Sommerville,et al.  Designing Dependable Digital Domestic Environments , 2003 .

[102]  Fred Kröger,et al.  Temporal Logic of Programs , 1987, EATCS Monographs on Theoretical Computer Science.

[103]  Gerard Tel,et al.  Synchronous, asynchronous, and causally ordered communication , 1996, Distributed Computing.

[104]  J. Hughes,et al.  Designing with Care: Adapting Cultural Probes to Inform Design in Sensitive Settings , 2003 .

[105]  Brendan Gregg,et al.  Solaris(TM) Performance and Tools: DTrace and MDB Techniques for Solaris 10 and OpenSolaris (Solaris Series) , 2006 .

[106]  Ernesto Damiani,et al.  Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems: Special Topic Section on Soft Approaches to Information Retrieval and Information Access on the Web , 2006 .

[107]  Fabio Massacci,et al.  Security-by-Contract (SxC) for Software and Services of Mobile Systems , 2009 .

[108]  John F. Meyer,et al.  Performability: A Retrospective and Some Pointers to the Future , 1992, Perform. Evaluation.

[109]  Bengt Jonsson,et al.  A logic for reasoning about time and reliability , 1990, Formal Aspects of Computing.

[110]  Alexandre Petrenko,et al.  A formal approach to property testing in causally consistent distributed traces , 2006, Formal Aspects of Computing.

[111]  Paolo Traverso,et al.  At Your Service: Service-Oriented Computing from an EU Perspective , 2009 .

[112]  Wei-Tek Tsai,et al.  Towards dependable service-orientated computing systems , 2009, Simul. Model. Pract. Theory.

[113]  Silvano Chiaradonna,et al.  Simulation Models and Implementation of a Simulator for the Performability Analysis of Electric Power Systems Considering Interdependencies , 2007, 10th IEEE High Assurance Systems Engineering Symposium (HASE'07).

[114]  Alessio Lomuscio,et al.  A Data Symmetry Reduction Technique for Temporal-epistemic Logic , 2009, ATVA.

[115]  Masahiro Fujita,et al.  Multi-Terminal Binary Decision Diagrams: An Efficient Data Structure for Matrix Representation , 1997, Formal Methods Syst. Des..

[116]  Marco Ajmone Marsan,et al.  A class of generalized stochastic Petri nets for the performance evaluation of multiprocessor systems , 1984, TOCS.

[117]  Kai Hwang,et al.  GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks , 2008, IEEE Transactions on Knowledge and Data Engineering.

[118]  Thomas Hérault,et al.  Distribution, Approximation and Probabilistic Model Checking , 2006, PDMC@ICALP.

[119]  Lionel Brunie,et al.  T2D: a peer to peer trust management system based on disposition to trust , 2010, SAC '10.

[120]  Antonia Bertolino,et al.  Scaling up SLA monitoring in pervasive environments , 2007, ESSPE '07.

[121]  Alessio Lomuscio,et al.  Deontic Interpreted Systems , 2003, Stud Logica.

[122]  M. Spezialetti,et al.  A general approach to recognizing event occurrences in distributed computations , 1988, [1988] Proceedings. The 8th International Conference on Distributed.

[123]  Peng Gao,et al.  Formal Verification and Simulation for Performance Analysis for Probabilistic Broadcast Protocols , 2006, ADHOC-NOW.

[124]  Lois Ann Scheidt,et al.  Bridging the gap: a genre analysis of Weblogs , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[125]  Rainer Unland,et al.  On the semantics of complex events in active database management systems , 1999, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337).

[126]  Ronald Fagin,et al.  Reasoning about knowledge , 1995 .

[127]  Andrew Hinton,et al.  PRISM: A Tool for Automatic Verification of Probabilistic Systems , 2006, TACAS.

[128]  Helen Nissenbaum,et al.  Users' conceptions of web security: a comparative study , 2002, CHI Extended Abstracts.

[129]  Douglas C. Schmidt,et al.  Guest Editor's Introduction: Model-Driven Engineering , 2006, Computer.

[130]  Bonnie A. Nardi,et al.  Blogging as social activity, or, would you let 900 million people read your diary? , 2004, CSCW.

[131]  A. Colman,et al.  The complexity of cooperation: Agent-based models of competition and collaboration , 1998, Complex..

[132]  Petteri Nurmi,et al.  A Bayesian framework for online reputation systems , 2006, Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06).

[133]  Marta Z. Kwiatkowska,et al.  Analysis of a gossip protocol in PRISM , 2008, PERV.

[134]  Robert L. Wears,et al.  Resilience Engineering: Concepts and Precepts , 2006, Quality and Safety in Health Care.

[135]  Kishor S. Trivedi,et al.  Techniques for System Dependability Evaluation , 2000 .

[136]  Peter Scheuermann,et al.  Active Database Systems , 2008, Wiley Encyclopedia of Computer Science and Engineering.

[137]  Joost-Pieter Katoen,et al.  The Ins and Outs of the Probabilistic Model Checker MRMC , 2009, 2009 Sixth International Conference on the Quantitative Evaluation of Systems.

[138]  Caj Södergård,et al.  Mobile television - technology and user experiences: Report on the Mobile-TV project , 2003 .

[139]  Paola Inverardi,et al.  Deciding Observational Congruence of Finite-State CCS Expressions by Rewriting , 1995, Theor. Comput. Sci..

[140]  Budi Arief,et al.  Computer security impaired by legitimate users , 2004, Comput. Secur..

[141]  Athman Bouguettaya,et al.  Reputation Propagation in Composite Services , 2009, 2009 IEEE International Conference on Web Services.

[142]  Christian Schaefer,et al.  Runtime monitoring for next generation Java ME platform , 2010, Comput. Secur..

[143]  Christel Baier,et al.  LiQuor: A tool for Qualitative and Quantitative Linear Time analysis of Reactive Systems , 2006, Third International Conference on the Quantitative Evaluation of Systems - (QEST'06).

[144]  Fabio Martinelli,et al.  Enhancing grid security by fine-grained behavioral control and negotiation-based authorization , 2009, International Journal of Information Security.

[145]  Håkan L. S. Younes Ymer: A Statistical Model Checker , 2005, CAV.

[146]  Álvaro Enrique Arenas,et al.  Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach , 2008, ServiceWave.

[147]  Esko Kurvinen,et al.  Only when miss universe snatches me: teasing in MMS messaging , 2003, DPPI '03.

[148]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM '01.

[149]  Boudewijn R. Haverkort,et al.  Markovian Models for Performance and Dependability Evaluation , 2002, European Educational Forum: School on Formal Methods and Performance Analysis.

[150]  Luciano Baresi,et al.  Smart monitors for composed services , 2004, ICSOC '04.

[151]  Mikhail Dmitriev Selective profiling of Java applications using dynamic bytecode instrumentation , 2004, IEEE International Symposium on - ISPASS Performance Analysis of Systems and Software, 2004.

[152]  William H. Sanders,et al.  Stochastic Activity Networks: Formal Definitions and Concepts , 2002, European Educational Forum: School on Formal Methods and Performance Analysis.

[153]  Ali Movaghar,et al.  Performability modeling with stochastic activity networks , 1985 .

[154]  W. Keith Edwards,et al.  Security automation considered harmful? , 2008, NSPW '07.

[155]  Vitaly Shmatikov,et al.  Analysis of probabilistic contract signing , 2002, J. Comput. Secur..

[156]  William W. Gaver,et al.  Design: Cultural probes , 1999, INTR.

[157]  Mirco Tribastone The PEPA Plug-in Project , 2007, Fourth International Conference on the Quantitative Evaluation of Systems (QEST 2007).

[158]  Christopher J. Alberts,et al.  Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Framework, Version 1.0 , 1999 .

[159]  David E. Culler,et al.  The ganglia distributed monitoring system: design, implementation, and experience , 2004, Parallel Comput..

[160]  Enrico Macii,et al.  Algebraic decision diagrams and their applications , 1993, Proceedings of 1993 International Conference on Computer Aided Design (ICCAD).

[161]  Allen D. Malony,et al.  A Generic and Configurable Source-Code Instrumentation Component , 2009, ICCS.

[162]  Peter R. Pietzuch,et al.  A Framework for Event Composition in Distributed Systems , 2003, Middleware.

[163]  David Anthony Parker,et al.  Implementation of symbolic model checking for probabilistic systems , 2003 .

[164]  Giovanna Di Marzo Serugendo,et al.  Robustness and Dependability of Self-Organizing Systems - A Safety Engineering Perspective , 2009, SSS.

[165]  Paul Dourish,et al.  How HCI interprets the probes , 2007, CHI.

[166]  Markus Siegle,et al.  Recent Extensions to the Stochastic Process Algebra Tool CASPA , 2008, 2008 Fifth International Conference on Quantitative Evaluation of Systems.

[167]  Daniel W. Manchala,et al.  Trust metrics, models and protocols for electronic commerce transactions , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).

[168]  Jean-Claude Laprie,et al.  From Dependability to Resilience , 2008, DSN 2008.

[169]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[170]  R. Silverstone Television And Everyday Life , 1994 .

[171]  Athman Bouguettaya,et al.  Reputation Bootstrapping for Trust Establishment among Web Services , 2009, IEEE Internet Computing.

[172]  Marco Conti,et al.  Lessons from an Ad hoc Network Test-Bed: Middleware and Routing Issues , 2005, Ad Hoc Sens. Wirel. Networks.

[173]  Jean-Claude Laprie,et al.  Dependable computing: concepts, limits, challenges , 1995 .

[174]  Allison Druin,et al.  Technology probes: inspiring design for and with families , 2003, CHI '03.

[175]  Fabio Martinelli,et al.  A Fine-Grained and X.509-Based Access Control System for Globus , 2006, OTM Conferences.

[176]  Timo Ojala,et al.  Mobile kärpät: a case study in wireless personal area networking , 2004, MUM '04.

[177]  Shanshan Song,et al.  Trusted P2P transactions with fuzzy reputation aggregation , 2005, IEEE Internet Computing.

[178]  Andrea Bondavalli,et al.  Service-Level Availability Estimation of GPRS , 2003, IEEE Trans. Mob. Comput..