Using a Trust Inference Model for Flexible and Controlled Information Sharing During Crises
暂无分享,去创建一个
[1] Jenny Palm,et al. Developing Local Emergency Management by Co-Ordination between Municipalities in Policy Networks: Experiences from Sweden , 2007 .
[2] J. H. Davis,et al. An Integrative Model of Organizational Trust: Past, Present, and Future , 2007 .
[3] Angappa Gunasekaran,et al. Knowledge and Information Technology Management: Human and Social Perspectives , 2002 .
[4] Robert Lee Chartrand. The many potentials of information technology for emergency management , 1985, Inf. Soc..
[5] Toshinori Munakata,et al. Fuzzy systems: an overview , 1994, CACM.
[6] Dale E. Zand. Trust and Managerial Problem Solving , 1972 .
[7] Richard T. Sylves,et al. Organizing the War on Terrorism , 2002 .
[8] Guido Deboeck,et al. Trading on the Edge: Neural, Genetic, and Fuzzy Systems for Chaotic Financial Markets , 1994 .
[9] Qilian Liang,et al. Fuzzy logic-optimized secure media access control (FSMAC) protocol wireless sensor networks , 2005, CIHSPS 2005. Proceedings of the 2005 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, 2005..
[10] L. Comfort. Crisis Management in Hindsight: Cognition, Communication, Coordination, and Control , 2007 .
[11] István Mezgár,et al. The role of trust in information technology management , 2002 .
[12] William Yu Chung Wang,et al. Supply Chain Management: Issues in the New Era of Collaboration And Competition , 2006 .
[13] D. A. MacDonald. Communication and Trust in Global Virtual Teams , 2007 .
[14] John S. Baras,et al. On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.
[15] Arnon Rosenthal,et al. Specifying data sharing agreements , 2006, Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06).
[16] George P. Huber,et al. The Decision-Making Paradigm of Organizational Design , 1986 .
[17] Sushil Jajodia,et al. Redirection policies for mission-based information sharing , 2006, SACMAT '06.
[18] P. Williams. Crisis Management , 1972, Contemporary Strategy.
[19] Ian I. Mitroff. The Role of Computers and Decision Aids in Crisis Management: A Developer's Report , 1994 .
[20] Lotfi A. Zadeh,et al. Fuzzy Logic , 2009, Encyclopedia of Complexity and Systems Science.
[21] Alexander Kouzmin,et al. Communicating throughout Katrina: Competing and Complementary Conceptual Lenses on Crisis Communication , 2007 .
[22] Lotfi A. Zadeh,et al. Fuzzy logic, neural networks, and soft computing , 1993, CACM.
[23] Lotfi A. Zadeh,et al. Fuzzy logic = computing with words , 1996, IEEE Trans. Fuzzy Syst..
[24] William H. Sanders,et al. Automatic Verification of Distributed and Layered Security Policy Implementations , 2008 .
[25] Chuen-Chien Lee,et al. Fuzzy logic in control systems: fuzzy logic controller. I , 1990, IEEE Trans. Syst. Man Cybern..
[26] Roger C. Mayer,et al. The trusted general manager and business unit performance: empirical evidence of a competitive advantage , 2000 .
[27] John S. Baras,et al. Trust evaluation in ad-hoc networks , 2004, WiSe '04.
[28] Starr Roxanne Hiltz,et al. Controversies in the design of computer-mediated communication systems: A Delphi study , 1982, CHI '82.
[29] Colin Camerer,et al. Not So Different After All: A Cross-Discipline View Of Trust , 1998 .
[30] A. Kouzmin,et al. Crisis Management: Toward a New Informational “Localisim” in Local Government Reform , 2000 .
[31] L. Comfort,et al. Coordination in Rapidly Evolving Disaster Response Systems , 2004 .
[32] Shanshan Song,et al. Trusted Grid Computing with Security Binding and Trust Integration , 2005, Journal of Grid Computing.
[33] A. Boin,et al. Institutional crises and reforms in policy sectors: the case of asylum policy in Europe , 2001 .
[34] Chuen-Chien Lee,et al. Fuzzy logic in control systems: fuzzy logic controller. II , 1990, IEEE Trans. Syst. Man Cybern..
[35] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[36] Martha Derthick. Where Federalism Didn’t Fail , 2007 .
[37] T. Drabek. Human System Responses to Disaster: An Inventory of Sociological Findings , 2011 .
[38] Chuen-Chien Lee. FUZZY LOGIC CONTROL SYSTEMS: FUZZY LOGIC CONTROLLER - PART I , 1990 .
[39] Paul J. Hart,et al. Power and Trust: Critical Factors in the Adoption and Use of Electronic Data Interchange , 1997 .
[40] Irfan A. Essa,et al. Parameterized Authentication , 2004, ESORICS.
[41] Ueli Maurer,et al. Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence , 2000, Public Key Cryptography.
[42] Kishor S. Trivedi,et al. Network survivability modeling , 2009, Comput. Networks.
[43] A. Boin,et al. Preparing for the Future: Critical Challenges in Crisis Management , 2000 .
[44] Claudia Keser,et al. Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[45] C. Wise,et al. Organizing for Homeland Security after Katrina: Is Adaptive Management What’s Missing? , 2006 .
[46] Ross T. Newkirk. Extending Geographic Information Systems for Risk Analysis and Management , 1993 .
[47] Allen C. Amason. Distinguishing the Effects of Functional and Dysfunctional Conflict on Strategic Decision Making: Resolving a Paradox for Top Management Teams , 1996 .
[48] C. L. Scott. Interpersonal Trust: A Comparison of Attitudinal and Situational Factors , 1980 .
[49] Peter Nijkamp,et al. Decision Support Tools for Urban Contingency Policy. A Scenario Approach to Risk Management of the Vesuvio Area in Naples, Italy , 2002 .
[50] Roberto Tamassia,et al. Role-based cascaded delegation , 2004, SACMAT '04.
[51] Mikhail J. Atallah,et al. Point-Based Trust: Define How Much Privacy Is Worth , 2006, ICICS.
[52] Roberto Tamassia,et al. On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous Computing , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[53] Jean Bacon,et al. Trust for Ubiquitous, Transparent Collaboration , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[54] Alan M.G. Jarman. ‘Reliability’ Reconsidered: A Critique of the HRO‐NAT Debate , 2001 .
[55] Johan Eriksson. Cyberplagues, IT, and Security: Threat Politics in the Information Age , 2001 .
[56] Henry W. Fischer. Enhancing Disaster Mitigation Planning and Response Through the Use of Cyberspace: Suggestions and Issues to Consider , 1999 .
[57] Richard Elmore,et al. How to Manage Urban School Districts , 2006 .
[58] R. Hurley. The decision to trust. , 2011, Harvard business review.