Two-Layer Models for Managing Authenticity and Trust
暂无分享,去创建一个
[1] A. Jøsang. TRUST-BASED DECISION MAKING FOR ELECTRONIC TRANSACTIONS , 1999 .
[2] Seungjoon Lee,et al. Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[3] Wendy J. Myrvold,et al. Generic Reliability Trust Model , 2005, PST.
[4] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[5] Rolf Haenni,et al. Towards a Unifying Theory of Logical and Probabilistic Reasoning , 2005, ISIPTA.
[6] Rolf Haenni,et al. Credential Networks: a General Model for Distributed Trust and Authenticity Management , 2005, PST.
[7] Georgios Efthymios Theodorakopoulos,et al. Distributed Trust Evaluation in Ad-Hoc Networks , 2004 .
[8] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[9] Joan Feigenbaum,et al. REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.
[10] Josh Boyd,et al. In Community We Trust: Online Security Communication at eBay , 2006, J. Comput. Mediat. Commun..
[11] Marek Sergot,et al. Revocation in the privilege calculus , 2003 .
[12] Ueli Maurer,et al. Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence , 2000, Public Key Cryptography.
[13] Michael K. Reiter,et al. Toward acceptable metrics of authentication , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[14] Sean W. Smith,et al. Modeling Public Key Infrastructures in the Real World , 2005, EuroPKI.
[15] Nils J. Nilsson,et al. Probabilistic Logic * , 2022 .
[16] Rolf Haenni. Using probabilistic argumentation for key validation in public-key cryptography , 2005, Int. J. Approx. Reason..
[17] Michael K. Reiter,et al. Authentication metric analysis and design , 1999, TSEC.
[18] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[19] Ueli Maurer,et al. Modelling a Public-Key Infrastructure , 1996, ESORICS.
[20] Rolf Haenni,et al. Probabilistic Argumentation Systems , 2003 .
[21] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.
[22] Thomas Beth,et al. Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[23] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[24] John S. Baras,et al. Trust evaluation in ad-hoc networks , 2004, WiSe '04.
[25] Gregor von Bochmann,et al. Table of Contents , 2008, Biological Psychiatry.
[26] Charles J. Colbourn,et al. The Combinatorics of Network Reliability , 1987 .
[27] Joan Feigenbaum,et al. KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.
[28] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .