On the concept of trust
暂无分享,去创建一个
[1] Bernard Barber,et al. The Logic and Limits of Trust , 1983 .
[2] Jr. Hanna Stair,et al. Quantitative Analysis for Management , 1982 .
[3] P. Venkat Rangan,et al. An axiomatic basis of trust in distributed systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[4] Audun Jøsang,et al. PKI Seeks a Trusting Relationship , 2000, ACISP.
[5] Yao-Hua Tan,et al. Trust and Deception in Virtual Societies , 2001, Springer Netherlands.
[6] Amir Herzberg,et al. Access control meets public key infrastructure, or: assigning roles to strangers , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[7] Andrew J. I. Jones,et al. RESPONSIBILITY FOR ACTION IN ORGANISATIONS: A FORMAL MODEL , 2003 .
[8] Ben Shneiderman,et al. Designing trust into online experiences , 2000, CACM.
[9] Yao-Hua Tan,et al. Toward a Generic Model of Trust for Electronic Commerce , 2000, Int. J. Electron. Commer..
[10] Michael K. Reiter,et al. Path independence for authentication in large-scale systems , 1997, CCS '97.
[11] Audun Jøsang,et al. The right type of trust for distributed systems , 1996, NSPW '96.
[12] J. Lewis,et al. SOCIAL ATOMISM, HOLISM, AND TRUST , 1985 .
[13] Joan Feigenbaum,et al. Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.
[14] B. J. Fogg,et al. Credibility and computing technology , 1999, CACM.
[15] S Hailes,et al. Using Recommendations for Managing Trust in Distributed Systems , 1997 .
[16] Tadayoshi Kohno,et al. Trust (and mistrust) in secure applications , 2001, CACM.
[17] Reihaneh Safavi-Naini,et al. Partial belief and probabilistic reasoning in the analysis of secure protocols , 1992, [1992] Proceedings The Computer Security Foundations Workshop V.
[18] R. Tuomela,et al. Contemporary Action Theory , 1997 .
[19] Diego Gambetta,et al. Trust as type detection , 2001 .
[20] Ueli Maurer,et al. Reasoning about public-key certification: on bindings between entities and public keys , 2000, IEEE J. Sel. Areas Commun..
[21] Markus Jakobsson,et al. On Assurance Structures for WWW Commerce , 1998, Financial Cryptography.
[22] Thomas Beth,et al. Trust-Based Navigation in Distribution Systems , 1994, Comput. Syst..
[23] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.
[24] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[25] Markus Jakobsson,et al. Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System , 1997, Financial Cryptography.
[26] P J Skevington. From security to trust-creating confidence to trade electronically , 1998 .
[27] A. Abdul-Rahman,et al. Relying on trust to find reliable information , 1999 .
[28] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[29] Bruce Christianson,et al. Why Isn't Trust Transitive? , 1996, Security Protocols Workshop.
[30] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[31] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[32] Mark R. Tuttle,et al. A Semantics for a Logic of Authentication , 1991, PODC 1991.
[33] Catherine A. Meadows,et al. The Role of Trust in Information Integrity Protocols , 1995, J. Comput. Secur..
[34] David Lewis. Convention: A Philosophical Study , 1986 .
[35] A. Jøsang. TRUST-BASED DECISION MAKING FOR ELECTRONIC TRANSACTIONS , 1999 .
[36] Audun Jøsang,et al. Authentication for Humans , 2001 .
[37] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.
[38] Audun Jøsang,et al. An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.
[39] A. Koller,et al. Speech Acts: An Essay in the Philosophy of Language , 1969 .
[40] Joan Feigenbaum,et al. A practically implementable and tractable delegation logic , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[41] Andrew J. I. Jones. Communication and Meaning: An Essay in Applied Modal Logic , 1983 .
[42] N. L. Chervany,et al. What is Trust? A Conceptual Analysis and an Interdisciplinary Model , 2000 .
[43] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[44] Erik Stenius. Mood and Language-Game , 1967 .
[45] Matt Bishop,et al. The Solar Trust Model: authentication without limitation , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[46] Pekka Nikander,et al. Certifying Trust , 1998, Public Key Cryptography.
[47] Eric M. Uslaner,et al. Social capital and the net , 2000, CACM.
[48] Angelos D. Keromytis,et al. Trust Management and Network Layer Security Protocols , 1999, Security Protocols Workshop.
[49] Marek J. Sergot,et al. A Formal Characterisation of Institutionalised Power , 1996, Log. J. IGPL.
[50] Joan Feigenbaum,et al. REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.
[51] Ueli Maurer,et al. Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence , 2000, Public Key Cryptography.
[52] Michael K. Reiter,et al. Toward acceptable metrics of authentication , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[53] Audun Jøsang,et al. A Subjective Metric of Authentication , 1998, ESORICS.
[54] N. L. Chervany,et al. Initial Trust Formation in New Organizational Relationships , 1998 .
[55] G. Elofson. Developing Trust with Intelligent Agents: An Exploratory Study , 2001 .
[56] Pekka Nikander,et al. Policy and Trust in Open Multi-Operator Networks , 2000, SMARTNET.
[57] Dean Povey,et al. Developing Electronic Trust Policies Using a Risk Management Model , 1999, CQRE.
[58] Warwick Ford,et al. Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework , 1999, RFC.
[59] C. Castelfranchi,et al. Social Trust : A Cognitive Approach , 2000 .
[60] K. Giffin. The contribution of studies of source credibility to a theory of interpersonal trust in the communication process. , 1967, Psychological bulletin.
[61] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[62] Ronald Fagin,et al. Belief, Awareness, and Limited Reasoning. , 1987, Artif. Intell..
[63] Ueli Maurer,et al. Modelling a Public-Key Infrastructure , 1996, ESORICS.
[64] T. Rea,et al. Engendering trust in elctronic environments: roles for a trusted third party , 2001 .
[65] Andrew J. I. Jones,et al. Trust and Deception in Virtual Societies , 2001 .
[66] Babak Sadighi Firozabadi,et al. On the characterisation of a trusting agent - aspects of a formal approach , 2001 .
[67] H. Raiffa,et al. Decisions with Multiple Objectives , 1993 .
[68] S. French. Value‐focused thinking: A path to creative decision making, Keeney, R. L., Cambridge, MA: Harvard University Press, 1992, ISBN 0‐674‐93197‐1 , 1993 .
[69] Timothy Paul Cronan,et al. Making ethical decisions , 2000, CACM.
[70] Joan Feigenbaum,et al. KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.