Trust Computing for Social Networking
暂无分享,去创建一个
[1] Barbara Carminati,et al. Private Relationships in Social Networks , 2007, 2007 IEEE 23rd International Conference on Data Engineering Workshop.
[2] Indrajit Ray,et al. A Vector Model of Trust for Developing Trustworthy Systems , 2004, ESORICS.
[3] Ninghui Li,et al. Beyond proof-of-compliance: security analysis in trust management , 2005, JACM.
[4] Barbara Carminati,et al. Rule-Based Access Control for Social Networks , 2006, OTM Workshops.
[5] Dan S. Wallach,et al. Extensible security architectures for Java , 1997, SOSP.
[6] Seungjoon Lee,et al. Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[7] John S. Baras,et al. Trust Evaluation in Anarchy: A Case Study on Autonomous Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[8] Jennifer Golbeck,et al. Computing and Applying Trust in Web-based Social Networks , 2005 .
[9] Audun Jøsang,et al. An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.
[10] Catholijn M. Jonker,et al. Formal Analysis of Models for the Dynamics of Trust Based on Experiences , 1999, MAAMAW.
[11] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[12] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[13] Matthew Richardson,et al. Trust Management for the Semantic Web , 2003, SEMWEB.
[14] Audun Jsang,et al. Analysing topologies of transitive trust , 2003 .
[15] Ramanathan V. Guha,et al. Propagation of trust and distrust , 2004, WWW '04.
[16] John S. Baras,et al. Trust evaluation in ad-hoc networks , 2004, WiSe '04.
[17] Elisa Bertino,et al. A Trust-Based Context-Aware Access Control Model for Web-Services , 2004, Proceedings. IEEE International Conference on Web Services, 2004..
[18] Vijay Varadharajan,et al. A Trust based Access Control Framework for P2P File-Sharing Systems , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[19] Erik Vullings,et al. A Trust-based Access Control Model for Virtual Organizations , 2006, 2006 Fifth International Conference on Grid and Cooperative Computing Workshops.
[20] Seungjoon Lee,et al. Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[21] David Manlove,et al. Vertex and Edge Covers with Clustering Properties: Complexity and Algorithms , 2009, ACiD.
[22] Viktor S. Grishchenko,et al. Redefining Web-of-Trust : reputation , recommendations , responsibility and trust among peers , 2022 .