Two-Layer Models for Managing Authenticity and Trust

[1]  A. Jøsang TRUST-BASED DECISION MAKING FOR ELECTRONIC TRANSACTIONS , 1999 .

[2]  Seungjoon Lee,et al.  Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[3]  Wendy J. Myrvold,et al.  Generic Reliability Trust Model , 2005, PST.

[4]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[5]  Rolf Haenni,et al.  Towards a Unifying Theory of Logical and Probabilistic Reasoning , 2005, ISIPTA.

[6]  Rolf Haenni,et al.  Credential Networks: a General Model for Distributed Trust and Authenticity Management , 2005, PST.

[7]  Georgios Efthymios Theodorakopoulos,et al.  Distributed Trust Evaluation in Ad-Hoc Networks , 2004 .

[8]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[9]  Joan Feigenbaum,et al.  REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.

[10]  Josh Boyd,et al.  In Community We Trust: Online Security Communication at eBay , 2006, J. Comput. Mediat. Commun..

[11]  Marek Sergot,et al.  Revocation in the privilege calculus , 2003 .

[12]  Ueli Maurer,et al.  Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence , 2000, Public Key Cryptography.

[13]  Michael K. Reiter,et al.  Toward acceptable metrics of authentication , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[14]  Sean W. Smith,et al.  Modeling Public Key Infrastructures in the Real World , 2005, EuroPKI.

[15]  Nils J. Nilsson,et al.  Probabilistic Logic * , 2022 .

[16]  Rolf Haenni Using probabilistic argumentation for key validation in public-key cryptography , 2005, Int. J. Approx. Reason..

[17]  Michael K. Reiter,et al.  Authentication metric analysis and design , 1999, TSEC.

[18]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[19]  Ueli Maurer,et al.  Modelling a Public-Key Infrastructure , 1996, ESORICS.

[20]  Rolf Haenni,et al.  Probabilistic Argumentation Systems , 2003 .

[21]  Joan Feigenbaum,et al.  The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.

[22]  Thomas Beth,et al.  Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[23]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[24]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[25]  Gregor von Bochmann,et al.  Table of Contents , 2008, Biological Psychiatry.

[26]  Charles J. Colbourn,et al.  The Combinatorics of Network Reliability , 1987 .

[27]  Joan Feigenbaum,et al.  KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.

[28]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .