A multi-faceted model of trust that is personalisable and specialisable

[1]  B. Misztal Trust in Modern Societies: The Search for the Bases of Social Order , 1996 .

[2]  Dieter Gollmann,et al.  Why Trust is Bad for Security , 2006, Electron. Notes Theor. Comput. Sci..

[3]  Walt Yao,et al.  Fidelis: A Policy-Driven Trust Management Framework , 2003, iTrust.

[4]  Dave Lewis,et al.  Composition of Trustworthy Web Services , 2004 .

[5]  Bernard Barber,et al.  The Logic and Limits of Trust , 1983 .

[6]  Nigel Shadbolt A matter of trust , 2002, IEEE Intelligent Systems.

[7]  Morris Sloman,et al.  Trust Management Tools for Internet Applications , 2003, iTrust.

[8]  S. Shapiro The Social Control of Impersonal Trust , 1987, American Journal of Sociology.

[9]  Stephen Farrell,et al.  Internet X.509 Public Key Infrastructure Certificate Management Protocols , 1999, RFC.

[10]  Emil C. Lupu,et al.  The Ponder Policy Specification Language , 2001, POLICY.

[11]  D. O’Sullivan,et al.  deepTrust Management Application for Discovery , Selection , and Composition of Trustworthy Services , 2005 .

[12]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[13]  Declan O'Sullivan,et al.  A Framework for the Decentralisation and Management of Collaborative Applications in Ubiquitous Computing Environments , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.

[14]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[15]  M. Morris,et al.  The Design , 1998 .

[16]  Mark L. Stevens,et al.  Policy-based management for IP networks , 1999, Bell Labs Technical Journal.

[17]  P. Lamsal Understanding Trust and Security , 2001 .

[18]  Peter Saint-Andre,et al.  Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence , 2004, RFC.

[19]  Joan Feigenbaum,et al.  REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.

[20]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[21]  Joan Feigenbaum,et al.  Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.

[22]  Walt Yao,et al.  Trust management for widely distributed systems , 2003 .

[23]  Justin Wastnage,et al.  Matter of trust , 2005 .

[24]  N. L. Chervany,et al.  THE MEANINGS OF TRUST , 2000 .

[25]  James A. Hendler,et al.  Accuracy of Metrics for Inferring Trust and Reputation in Semantic Web-Based Social Networks , 2004, EKAW.

[26]  Tim Finin,et al.  A Security Architecture Based on Trust Management for Pervasive Computing Systems , 2002 .

[27]  Marianne Winslett,et al.  Negotiating Trust on the Web , 2002, IEEE Internet Comput..

[28]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[29]  J. Golbeck,et al.  FilmTrust: movie recommendations using trust in web-based social networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[30]  Vincent P. Wade,et al.  Trust meta-policies for flexible and dynamic policy based trust management , 2006, Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06).

[31]  Martin Klepal,et al.  A testbed for evaluating human interaction with ubiquitous computing environments , 2005, First International Conference on Testbeds and Research Infrastructures for the DEvelopment of NeTworks and COMmunities.

[32]  Declan O'Sullivan,et al.  The Design, Generation, and Utilisation of a Semantically Rich Personalised Model of Trust , 2006, iTrust.

[33]  Vincent P. Wade,et al.  Relationship-driven policy engineering for autonomic organisations , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).

[34]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[35]  Amir Herzberg,et al.  Access control meets public key infrastructure, or: assigning roles to strangers , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[36]  Catholijn M. Jonker,et al.  Human Experiments in Trust Dynamics , 2004, iTrust.

[37]  Jennifer Golbeck,et al.  Inferring Reputation on the Semantic Web , 2004, WWW 2004.

[38]  Jennifer Golbeck,et al.  Computing and Applying Trust in Web-based Social Networks , 2005 .

[39]  N. Luhmann Trust and Power , 1979 .

[40]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[41]  R. Golembiewski,et al.  The centrality of interpersonal trust in group processes , 1975 .

[42]  Ninghui Li,et al.  Towards practical automated trust negotiation , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[43]  Yolanda Gil,et al.  Trusting Information Sources One Citizen at a Time , 2002, SEMWEB.

[44]  J. Davenport Editor , 1960 .

[45]  R. Chen,et al.  Poblano A Distributed Trust Model for Peer-to-Peer Networks , 2001 .

[46]  Joan Feigenbaum,et al.  The KeyNote Trust-Management System , 1998 .

[47]  Alfarez Abdul-Rahman,et al.  A framework for decentralised trust reasoning , 2005 .

[48]  Bill Segall,et al.  Content Based Routing with Elvin4 , 2000 .

[49]  Alexander Aiken,et al.  Attack-Resistant Trust Metrics for Public Key Certification , 1998, USENIX Security Symposium.