A multi-faceted model of trust that is personalisable and specialisable
暂无分享,去创建一个
[1] B. Misztal. Trust in Modern Societies: The Search for the Bases of Social Order , 1996 .
[2] Dieter Gollmann,et al. Why Trust is Bad for Security , 2006, Electron. Notes Theor. Comput. Sci..
[3] Walt Yao,et al. Fidelis: A Policy-Driven Trust Management Framework , 2003, iTrust.
[4] Dave Lewis,et al. Composition of Trustworthy Web Services , 2004 .
[5] Bernard Barber,et al. The Logic and Limits of Trust , 1983 .
[6] Nigel Shadbolt. A matter of trust , 2002, IEEE Intelligent Systems.
[7] Morris Sloman,et al. Trust Management Tools for Internet Applications , 2003, iTrust.
[8] S. Shapiro. The Social Control of Impersonal Trust , 1987, American Journal of Sociology.
[9] Stephen Farrell,et al. Internet X.509 Public Key Infrastructure Certificate Management Protocols , 1999, RFC.
[10] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[11] D. O’Sullivan,et al. deepTrust Management Application for Discovery , Selection , and Composition of Trustworthy Services , 2005 .
[12] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[13] Declan O'Sullivan,et al. A Framework for the Decentralisation and Management of Collaborative Applications in Ubiquitous Computing Environments , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.
[14] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[15] M. Morris,et al. The Design , 1998 .
[16] Mark L. Stevens,et al. Policy-based management for IP networks , 1999, Bell Labs Technical Journal.
[17] P. Lamsal. Understanding Trust and Security , 2001 .
[18] Peter Saint-Andre,et al. Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence , 2004, RFC.
[19] Joan Feigenbaum,et al. REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.
[20] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[21] Joan Feigenbaum,et al. Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.
[22] Walt Yao,et al. Trust management for widely distributed systems , 2003 .
[23] Justin Wastnage,et al. Matter of trust , 2005 .
[24] N. L. Chervany,et al. THE MEANINGS OF TRUST , 2000 .
[25] James A. Hendler,et al. Accuracy of Metrics for Inferring Trust and Reputation in Semantic Web-Based Social Networks , 2004, EKAW.
[26] Tim Finin,et al. A Security Architecture Based on Trust Management for Pervasive Computing Systems , 2002 .
[27] Marianne Winslett,et al. Negotiating Trust on the Web , 2002, IEEE Internet Comput..
[28] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[29] J. Golbeck,et al. FilmTrust: movie recommendations using trust in web-based social networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[30] Vincent P. Wade,et al. Trust meta-policies for flexible and dynamic policy based trust management , 2006, Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06).
[31] Martin Klepal,et al. A testbed for evaluating human interaction with ubiquitous computing environments , 2005, First International Conference on Testbeds and Research Infrastructures for the DEvelopment of NeTworks and COMmunities.
[32] Declan O'Sullivan,et al. The Design, Generation, and Utilisation of a Semantically Rich Personalised Model of Trust , 2006, iTrust.
[33] Vincent P. Wade,et al. Relationship-driven policy engineering for autonomic organisations , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).
[34] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[35] Amir Herzberg,et al. Access control meets public key infrastructure, or: assigning roles to strangers , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[36] Catholijn M. Jonker,et al. Human Experiments in Trust Dynamics , 2004, iTrust.
[37] Jennifer Golbeck,et al. Inferring Reputation on the Semantic Web , 2004, WWW 2004.
[38] Jennifer Golbeck,et al. Computing and Applying Trust in Web-based Social Networks , 2005 .
[39] N. Luhmann. Trust and Power , 1979 .
[40] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[41] R. Golembiewski,et al. The centrality of interpersonal trust in group processes , 1975 .
[42] Ninghui Li,et al. Towards practical automated trust negotiation , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[43] Yolanda Gil,et al. Trusting Information Sources One Citizen at a Time , 2002, SEMWEB.
[44] J. Davenport. Editor , 1960 .
[45] R. Chen,et al. Poblano A Distributed Trust Model for Peer-to-Peer Networks , 2001 .
[46] Joan Feigenbaum,et al. The KeyNote Trust-Management System , 1998 .
[47] Alfarez Abdul-Rahman,et al. A framework for decentralised trust reasoning , 2005 .
[48] Bill Segall,et al. Content Based Routing with Elvin4 , 2000 .
[49] Alexander Aiken,et al. Attack-Resistant Trust Metrics for Public Key Certification , 1998, USENIX Security Symposium.