Using Trust for Secure Collaboration in Uncertain Environments
暂无分享,去创建一个
Yong Chen | Vinny Cahill | Christian Damsgaard Jensen | Giovanna Di Marzo Serugendo | Mogens Nielsen | Paddy Nixon | Sotirios Terzis | Jean Bacon | Andrew Twigg | Jean-Marc Seigneur | Marco Carbone | Karl Krukow | Ciarán Bryce | Elizabeth Gray | Brian Shand | Colin English | Waleed Wagealla | Nathan Dimmock | Marco Carbone | J. Bacon | M. Nielsen | J. Seigneur | C. Jensen | Elizabeth Gray | Yong Chen | V. Cahill | P. Nixon | N. Dimmock | Andrew Twigg | G. Serugendo | S. Terzis | B. Shand | C. Bryce | W. Wagealla | K. Krukow | C. English
[1] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[2] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.
[3] Catholijn M. Jonker,et al. Formal Analysis of Models for the Dynamics of Trust Based on Experiences , 1999, MAAMAW.
[4] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[5] Richard E. Smith,et al. Authentication: From Passwords to Public Keys , 2001 .
[6] Jean Bacon,et al. Trust for Ubiquitous, Transparent Collaboration , 2004, Wirel. Networks.
[7] Christian Damsgaard Jensen,et al. Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications , 2002 .
[8] Paddy Nixon,et al. Trusting Collaboration in Global Computing Systems , 2003, iTrust.
[9] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[10] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[11] Diego Gambetta. Can We Trust Trust , 2000 .
[12] References , 1971 .
[13] N. L. Chervany,et al. THE MEANINGS OF TRUST , 2000 .
[14] Berry Schoenmakers. Security aspects of the Ecash payment system , 1998 .
[15] Diego Gambetta. Trust : making and breaking cooperative relations , 1992 .
[16] Vladimiro Sassone,et al. A Formal Model for Trust in Dynamic Networks , 2003 .
[17] Ling Liu,et al. Building Trust in Decentralized Peer-to-Peer Electronic Communities , 2002 .
[18] Jean-Yves Le Boudec,et al. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .
[19] Karl Aberer,et al. Managing trust in a peer-2-peer information system , 2001, CIKM '01.
[20] Yong Chen,et al. End-to-End Trust Starts with Recognition , 2003, SPC.
[21] Stephen Farrell,et al. End-to-end trust in pervasive computing starts with recognition , 2003 .
[22] Andrew Twigg,et al. A Subjective Approach to Routing in P2P and Ad Hoc Networks , 2003, iTrust.
[23] David Chaum,et al. Achieving Electronic Privacy , 1992 .
[24] Jean Bacon,et al. Trust for Ubiquitous, Transparent Collaboration , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[25] Butler W. Lampson,et al. SPKI Certificate Theory , 1999, RFC.
[26] Sadie Creese,et al. Authentication for Pervasive Computing , 2003, SPC.