Trust Transfer in Distributed Systems
暂无分享,去创建一个
[1] Morris Sloman,et al. Trust Management Tools for Internet Applications , 2003, iTrust.
[2] Catholijn M. Jonker,et al. Formal Analysis of Models for the Dynamics of Trust Based on Experiences , 1999, MAAMAW.
[3] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[4] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[5] Joseph Y. Halpern,et al. A Knowledge-Based Framework for Belief change, Part I: Foundations , 1994, TARK.
[6] Audun Jsang,et al. Analysing topologies of transitive trust , 2003 .
[7] Audun Jøsang,et al. An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.
[8] Ninghui Li,et al. Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[9] Audun Jøsang,et al. Semantic Constraints for Trust Transitivity , 2005, APCCM.
[10] N. Malcolm. On Knowledge and Belief , 1954 .
[11] Audun J sang,et al. An Algebra for Assessing Trust in Certi cation Chains , 1998 .
[12] Martín Abadi,et al. A semantics for a logic of authentication (extended abstract) , 1991, PODC '91.
[13] Munindar P. Singh,et al. Developing trust in large-scale peer-to-peer systems , 2004, IEEE First Symposium onMulti-Agent Security and Survivability, 2004.
[14] P. Venkat Rangan,et al. An axiomatic basis of trust in distributed systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[15] Churn-Jung Liau,et al. Belief, information acquisition, and trust in multi-agent systems--A modal logic formulation , 2003, Artif. Intell..
[16] C. Guarneri. Cornell University Press , 1991 .
[17] Bruce Christianson,et al. Why Isn't Trust Transitive? , 1996, Security Protocols Workshop.
[18] Wiebe van der Hoek. Systems for Knowledge and Beliefs , 1990, JELIA.
[19] Andreas Birk,et al. Learning to Trust , 2000, Trust in Cyber-societies.
[20] Audun Jøsang,et al. Simplification and analysis of transitive trust networks , 2006, Web Intell. Agent Syst..
[21] Amir Herzberg,et al. Access control meets public key infrastructure, or: assigning roles to strangers , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[22] Rino Falcone,et al. Principles of trust for MAS: cognitive anatomy, social importance, and quantification , 1998, Proceedings International Conference on Multi Agent Systems (Cat. No.98EX160).