UNIQuE: A User-Centric Framework for Network Identity Management
暂无分享,去创建一个
[1] S. T. Buckland,et al. An Introduction to the Bootstrap. , 1994 .
[2] Yinan Yang,et al. W3 Trust Model: Evluating Trust and Transitivity of Trust of Online Services , 2002, International Conference on Internet Computing.
[3] Steven Hand,et al. Managing Trust and Reputation in the XenoServer Open Platform , 2003, iTrust.
[4] C. Badcock,et al. Trust : making and breaking cooperative relations , 1989 .
[5] Henry Hexmoor,et al. Trust-Based Security Policies , 2004 .
[6] Audun Jøsang,et al. Trust Requirements in Identity Management , 2005, ACSW.
[7] Matt Bishop,et al. The Solar Trust Model: authentication without limitation , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[8] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[9] Jeff Hodges,et al. A brief introduction to liberty , 2002 .
[10] Audun Jøsang,et al. The right type of trust for distributed systems , 1996, NSPW '96.
[11] A. Abdul-Rahman,et al. Relying on trust to find reliable information , 1999 .
[12] Diego Gambetta. Can We Trust Trust , 2000 .
[13] Roy T. Fielding,et al. Hypertext Transfer Protocol - HTTP/1.1 , 1997, RFC.
[14] Rachael Ott,et al. Building Trust Online , 2000 .
[15] Theodosis Dimitrakos,et al. System Models, e-Risks and e-Trust - Towards bridging the gap? , 2001, I3E.
[16] Stephen Farrell,et al. Internet X.509 Public Key Infrastructure Certificate Management Protocols , 1999, RFC.
[17] Boon Thau Loo,et al. Trust Management , 2006, Lecture Notes in Computer Science.
[18] Sotirios Terzis,et al. Security, Privacy and Trust Issues in Smart Environments , 2005 .
[19] Deepak Goel,et al. RATING: rigorous assessment of trust in identity management , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[20] E. Drexler,et al. Incentive engineering for computational resource management , 1988 .
[21] Angelos D. Keromytis,et al. Key note: Trust management for public-key infrastructures , 1999 .
[22] Feng Zhu,et al. A Stateless Network Architecture for Inter-Enterprise Authentication, Authorization and Accounting , 2003, ICWS.
[23] Christian Cachin,et al. Distributing trust on the Internet , 2001, 2001 International Conference on Dependable Systems and Networks.
[24] J. Camenisch,et al. Title: First Annual Research Report the Prime Project Receives Research Funding from the Community's Sixth Framework Programme and the Swiss Federal Office for Education and Science. Privacy and Identity Management for Europe Prime Privacy and Identity Management for Europe , 2005 .