Using Trust for Secure Collaboration in Uncertain Environments

The SECURE project investigates the design of security mechanisms for pervasive computing based on trust. It addresses how entities in unfamiliar pervasive computing environments can overcome initial suspicion to provide secure collaboration.

[1]  Ronald L. Rivest,et al.  SDSI - A Simple Distributed Security Infrastructure , 1996 .

[2]  Joan Feigenbaum,et al.  The KeyNote Trust-Management System Version 2 , 1999, RFC.

[3]  Catholijn M. Jonker,et al.  Formal Analysis of Models for the Dynamics of Trust Based on Experiences , 1999, MAAMAW.

[4]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[5]  Richard E. Smith,et al.  Authentication: From Passwords to Public Keys , 2001 .

[6]  Jean Bacon,et al.  Trust for Ubiquitous, Transparent Collaboration , 2004, Wirel. Networks.

[7]  Christian Damsgaard Jensen,et al.  Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications , 2002 .

[8]  Paddy Nixon,et al.  Trusting Collaboration in Global Computing Systems , 2003, iTrust.

[9]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[10]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[11]  Diego Gambetta Can We Trust Trust , 2000 .

[12]  References , 1971 .

[13]  N. L. Chervany,et al.  THE MEANINGS OF TRUST , 2000 .

[14]  Berry Schoenmakers Security aspects of the Ecash payment system , 1998 .

[15]  Diego Gambetta Trust : making and breaking cooperative relations , 1992 .

[16]  Vladimiro Sassone,et al.  A Formal Model for Trust in Dynamic Networks , 2003 .

[17]  Ling Liu,et al.  Building Trust in Decentralized Peer-to-Peer Electronic Communities , 2002 .

[18]  Jean-Yves Le Boudec,et al.  The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[19]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[20]  Yong Chen,et al.  End-to-End Trust Starts with Recognition , 2003, SPC.

[21]  Stephen Farrell,et al.  End-to-end trust in pervasive computing starts with recognition , 2003 .

[22]  Andrew Twigg,et al.  A Subjective Approach to Routing in P2P and Ad Hoc Networks , 2003, iTrust.

[23]  David Chaum,et al.  Achieving Electronic Privacy , 1992 .

[24]  Jean Bacon,et al.  Trust for Ubiquitous, Transparent Collaboration , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[25]  Butler W. Lampson,et al.  SPKI Certificate Theory , 1999, RFC.

[26]  Sadie Creese,et al.  Authentication for Pervasive Computing , 2003, SPC.