Behavior evaluation for trust management based on formal distributed network monitoring
暂无分享,去创建一个
[1] Jorge López,et al. A formal distributed network monitoring approach for enhancing trust management systems , 2013, MEDES.
[2] Christoph Meinel,et al. A Flexible and Efficient Alert Correlation Platform for Distributed IDS , 2010, 2010 Fourth International Conference on Network and System Security.
[3] Morris Sloman,et al. Trust Management Tools for Internet Applications , 2003, iTrust.
[4] Jorge López,et al. An online passive testing approach for communication protocols , 2014, 2014 9th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE).
[5] Guy Pujolle,et al. An autonomic knowledge monitoring scheme for trust management on mobile ad hoc networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[6] Yuanzhuo Wang,et al. Prevent DNS Cache Poisoning Using Security Proxy , 2011, 2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies.
[7] Chi-Chun Lo,et al. A Cooperative Intrusion Detection System Framework for Cloud Computing Networks , 2010, 2010 39th International Conference on Parallel Processing Workshops.
[8] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[9] Shin Nakajima,et al. The SPIN Model Checker : Primer and Reference Manual , 2004 .
[10] David L. Mills,et al. Internet time synchronization: the network time protocol , 1991, IEEE Trans. Commun..
[11] Ana R. Cavalli,et al. A passive conformance testing approach for a MANET routing protocol , 2009, SAC '09.
[12] Alan O. Freier,et al. Internet Engineering Task Force (ietf) the Secure Sockets Layer (ssl) Protocol Version 3.0 , 2022 .
[13] Ana R. Cavalli,et al. Trust-orBAC: A Trust Access Control Model in Multi-Organization Environments , 2012, ICISS.
[14] Trevor Jim,et al. SD3: a trust management system with certified evaluation , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[15] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[16] Stéphane Maag,et al. A Logic-based Passive Testing Approach for the Validation of Communicating Protocols , 2012, ENASE.
[17] Marianne Winslett,et al. TrustBuilder2: A Reconfigurable Framework for Trust Negotiation , 2009, IFIPTM.
[18] Joan Feigenbaum,et al. REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.
[19] Paul V. Mockapetris,et al. Domain names - implementation and specification , 1987, RFC.
[20] Steven McCanne,et al. The BSD Packet Filter: A New Architecture for User-level Packet Capture , 1993, USENIX Winter.
[21] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[22] David Lee,et al. Network protocol system monitoring-a formal approach with passive testing , 2006, IEEE/ACM Transactions on Networking.
[23] Nora Cuppens-Boulahia,et al. XeNA: an access negotiation framework using XACML , 2009, Ann. des Télécommunications.
[24] Hassan Takabi,et al. DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
[25] Jon Postel,et al. Transmission Control Protocol , 1981, RFC.
[26] Stéphane Maag,et al. A Formal Data-Centric Approach for Passive Testing of Communication Protocols , 2013, IEEE/ACM Transactions on Networking.
[27] Roland Groz,et al. Model Inference and Testing , 2013, Adv. Comput..
[28] Joan Feigenbaum,et al. KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.
[29] Niels Provos,et al. Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority , 2008, NDSS.
[30] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[31] Gilbert Moïsio,et al. Internet Engineering Task Force , 2014 .
[32] Joan Feigenbaum,et al. KeyNote : Trust management for public-key infrastructures. Discussion , 1999 .