Managing Ad-Hoc Trust Relationships in Pervasive Computing Environments
暂无分享,去创建一个
[1] David W. Chadwick,et al. Merging and extending the PGP and PEM trust models-the ICE-TEL trust model , 1997, IEEE Netw..
[2] Timothy W. Finin,et al. Trust-Based Security in Pervasive Computing Environments , 2022 .
[3] Laurent Bussard,et al. Trust and Authorization in Pervasive B2E Scenarios , 2003, ISC.
[4] Diego Gambetta. Trust : making and breaking cooperative relations , 1992 .
[5] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[6] Thomas Beth,et al. Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[7] John Linn,et al. Privacy enhancement for Internet electronic mail: Part II - certificate-based key management , 1987, RFC.
[8] Michael Koch,et al. Ubiquitous Computing , 2001, CSCW-Kompendium.
[9] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[10] Celeste Campo,et al. SPDP: A Secure Service Discovery Protocol for Ad-hoc Networks , 2003 .
[11] Diego Gambetta. Can We Trust Trust , 2000 .
[12] Svein J. Knapskog,et al. A metric for trusted systems , 1998 .
[13] Paddy Nixon,et al. Security models for trusting network appliances , 2002, Proceedings 3rd IEEE International Workshop on System-on-Chip for Real-Time Applications.
[14] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[15] Christian Damsgaard Jensen,et al. Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications , 2002 .
[16] Audun Jøsang,et al. The consensus operator for combining beliefs , 2002, Artif. Intell..
[17] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[18] Timothy W. Finin,et al. Vigil: Enforcing Security in Ubiquitous Environments , 2002 .
[19] P. Vannoorenberghe,et al. Strategies for combining conflicting dogmatic beliefs , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.
[20] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[21] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[22] Audun Jøsang,et al. An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.
[23] Andreas Matheus,et al. How to Declare Access Control Policies for XML Structured Information Objects using OASIS' eXtensible Access Control Markup Language (XACML) , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[24] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[25] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.