Trust management for multimedia P2P applications in autonomic networking
暂无分享,去创建一个
Andrés Marín López | Florina Almenárez | Daniel Díaz Sánchez | Carlos García-Rubio | Celeste Campo | Alberto Cortés | F. Almenárez | C. García-Rubio | Celeste Campo | A. Cortés
[1] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[2] Indrajit Ray,et al. TrustBAC: integrating trust relationships into the RBAC model for access control in open systems , 2006, SACMAT '06.
[3] Audun J sang,et al. An Algebra for Assessing Trust in Certi cation Chains , 1998 .
[4] J. V. D. Merwe,et al. Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .
[5] Robert H. Deng,et al. Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.
[6] Yong Chen,et al. Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..
[7] Matti Siekkinen,et al. Beyond the Future Internet--Requirements of Autonomic Networking Architectures to Address Long Term Future Networking Challenges , 2007, 11th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS'07).
[8] Audun Jøsang,et al. An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.
[9] Martin Serrano,et al. Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications , 2009, ATC.
[10] J. Baras,et al. Managing Trust in Self-organized Mobile Ad Hoc Networks ∗ ( Extended Abstract ) , 2004 .
[11] David Cooper,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.
[12] Zhu Han,et al. Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.
[13] Sheikh Iqbal Ahamed,et al. Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments , 2010, J. Syst. Softw..
[14] Andrés Marín López,et al. Developing a model for trust management in pervasive devices , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[15] Timothy W. Finin,et al. Active collaborations for trustworthy data management in ad hoc networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[16] Vijay Varadharajan,et al. Interaction Trust Evaluation in Decentralized Environments , 2004, EC-Web.
[17] Markulf Kohlweiss,et al. A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup , 2008, WISTP.
[19] Javier López,et al. Pervasive authentication and authorization infrastructures for mobile users , 2010, Comput. Secur..
[20] Ruidong Li,et al. Future trust management framework for mobile ad hoc networks , 2008, IEEE Communications Magazine.
[21] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[22] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[23] Ueli Maurer,et al. Modelling a Public-Key Infrastructure , 1996, ESORICS.
[24] Audun Jøsang,et al. A Subjective Metric of Authentication , 1998, ESORICS.
[25] Andrés Marín López,et al. A Trust-based Middleware for Providing Security to Ad-Hoc Peer-to-Peer Applications , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[26] Celeste Campo,et al. PTM: A Pervasive Trust Management Model for Dynamic Open Environments ⁄ , 2003 .
[27] Ivan Stojmenovic. Simulations in wireless sensor and ad hoc networks: matching and advancing models, metrics, and solutions , 2008, IEEE Communications Magazine.
[28] Kuifei Yu,et al. An Autonomic Multimedia and Information Service Gateway for Mobile Devices , 2009 .
[29] L. Toledo-Pereyra. Trust , 2006, Mediation Behaviour.
[30] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[31] John S. Baras,et al. On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[32] Vana Kalogeraki,et al. Decentralized trust management for ad-hoc peer-to-peer networks , 2006, MPAC '06.
[33] Andrés Marín López,et al. TrustAC: Trust-Based Access Control for Pervasive Devices , 2005, SPC.
[34] Sheikh Iqbal Ahamed,et al. An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[35] J. Nielsen,et al. Trust or Bust: Communicating Trustworthiness in Web s Alertbox, March 7. , 1999 .
[36] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[37] Frank Stewart,et al. June , 1890, The Hospital.
[38] R. Chen,et al. Poblano A Distributed Trust Model for Peer-to-Peer Networks , 2001 .
[39] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.