Trust based risk management for distributed system security - a new approach
暂无分享,去创建一个
[1] J. C. Byington,et al. Mobile agents and security , 1998, IEEE Commun. Mag..
[2] Vijay Varadharajan. Security enhanced mobile agents , 2000, CCS.
[3] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[4] Vijay Varadharajan,et al. Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems , 2003, ACNS.
[5] Paula Kotzé,et al. Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology , 2002 .
[6] Shanshan Song,et al. Selfish grid computing: game-theoretic modeling and NAS performance results , 2005, CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005..
[7] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[8] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[9] Matt Bishop,et al. What Is Computer Security? , 2003, IEEE Secur. Priv..
[10] Audun Jøsang,et al. A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[11] Sverker Jansson,et al. Simulated Social Control for Secure Internet Commerce ( position paper ) , 1996 .
[12] Vijay Varadharajan,et al. Trust enhanced security for mobile agents , 2005, Seventh IEEE International Conference on E-Commerce Technology (CEC'05).
[13] Elsabé Cloete,et al. Classification of malicious host threats in mobile agent computing , 2002 .
[14] Danny B. Lange,et al. Programming and Deploying Java¿ Mobile Agents with Aglets¿ , 1998 .
[15] Li Gong,et al. Inside Java 2 Platform Security: Architecture, API Design, and Implementation , 1999 .
[16] Vijay Varadharajan,et al. Trust Enhanced Security - A New Philosophy for Secure Collaboration of Mobile Agents , 2006, 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[17] Rolf Oppliger. Security issues related to mobile code and agent-based systems , 1999, Comput. Commun..
[18] Munindar P. Singh,et al. Distributed Reputation Management for Electronic Commerce , 2002, Comput. Intell..
[19] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[20] W. A. Jansen,et al. MOBILE AGENTS AND SECURITY , 1999 .
[21] Lars Rasmusson,et al. Simulated social control for secure Internet commerce , 1996, NSPW '96.
[22] Morrie Gasser,et al. The Digital Distributed System Security Architecture , 1989 .
[23] Michael Sonntag,et al. Mobile agent security based on payment , 2000, OPSR.
[24] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[25] Shanshan Song,et al. Fuzzy Trust Integration for Security Enforcement in Grid Computing , 2004, NPC.
[26] A. Jøsang. Subjective Evidential Reasoning � , 2002 .