Trust Management Survey
暂无分享,去创建一个
[1] Lea Viljanen,et al. The TuBE approach to trust management , 2005 .
[2] Valérie Issarny,et al. Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.
[3] Heiko Krumm,et al. Trust-adapted enforcement of security policies in distributed component-structured applications , 2001, Proceedings. Sixth IEEE Symposium on Computers and Communications.
[4] Marek Sergot,et al. Revocation in the privilege calculus , 2003 .
[5] N. L. Chervany,et al. THE MEANINGS OF TRUST , 2000 .
[6] Erik Rissanen. Server based application level authorisation for Rotor , 2003, IEE Proc. Softw..
[7] Klaus Herrmann,et al. Statistical Trustability (Conceptual Work) , 2003, iTrust.
[8] Michael Grimsley,et al. Managing Internet-Mediated Community Trust Relations , 2004, iTrust.
[9] K. Suzanne Barber,et al. Challenges for Trust, Fraud and Deception Research in Multi-agent Systems , 2002, Trust, Reputation, and Security.
[10] Youngkee Kim. How Do People Evaluate a Web Site's Credibility , 2007 .
[11] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[12] Paddy Nixon,et al. A formal model of trust lifecycle management , 2003 .
[13] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[14] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[15] Eugene H. Spafford,et al. A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .
[16] Simon Shiu,et al. Hardware Security Appliances for Trust , 2003, iTrust.
[17] Catholijn M. Jonker,et al. Human Experiments in Trust Dynamics , 2004, iTrust.
[18] Audun Jøsang,et al. Simulating the Effect of Reputation Systems on E-markets , 2003, iTrust.
[19] Evangelos Kotsovinos,et al. Pinocchio: Incentives for Honest Participation in Distributed Trust Management , 2004, iTrust.
[20] Jorge Lobo,et al. Policies for Distributed Systems and Networks , 2001, Lecture Notes in Computer Science.
[21] Roberto Chinnici,et al. Web Services Description Language (WSDL) Version 2.0 Part 1: Core Language , 2007 .
[22] Lea Kutvonen. Automated management of inter-organisational applications , 2002, Proceedings. Sixth International Enterprise Distributed Object Computing.
[23] Ketil Stølen,et al. Using Risk Analysis to Assess User Trust: A Net-Bank Scenario , 2004, iTrust.
[24] Timothy W. Finin,et al. A policy language for a pervasive computing environment , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.
[25] Giovanni Della-Libera,et al. Web Services Trust Language (WS-Trust) , 2002 .
[26] Joan Feigenbaum,et al. KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.
[27] D. Collard,et al. Trust : making and breaking cooperative relations , 1989 .
[28] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[29] Daniel J. Essin,et al. Patterns of trust and policy , 1998, NSPW '97.
[30] Sotirios Terzis,et al. Engineering Trust Based Collaborations in a Global Computing Environment , 2004, iTrust.
[31] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[32] Morris Sloman,et al. Specifying and Analysing Trust for Internet Applications , 2002, I3E.
[33] Yong Chen,et al. Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..
[34] Jaap Gordijn,et al. Designing and evaluating e-business models , 2001 .
[35] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[36] Theodosis Dimitrakos,et al. Towards Dynamic Security Perimeters for Virtual Collaborative Networks , 2004, iTrust.
[37] Yao-Hua Tan. A Trust Matrix Model for Electronic Commerce , 2003, iTrust.
[38] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[39] Robert Demolombe,et al. Reasoning About Trust: A Formal Logical Framework , 2004, iTrust.
[40] C. Badcock,et al. Trust : making and breaking cooperative relations , 1989 .
[41] Lik Mui,et al. A Computational Model of Trust and Reputation for E-businesses , 2002 .
[42] Jaap Gordijn,et al. Modeling Controls for Dynamic Value Exchanges in Virtual Organizations , 2004, iTrust.
[43] Audun Jøsang,et al. Analysing the Relationship between Risk and Trust , 2004, iTrust.
[44] Jeffrey M. Bradshaw,et al. Semantic Web Languages for Policy Representation and Reasoning: A Comparison of KAoS, Rei, and Ponder , 2003, SEMWEB.
[45] Joan Feigenbaum,et al. REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.
[46] Jeffrey M. Bradshaw,et al. KAoS: A Policy and Domain Services Framework for Grid Computing and Semantic Web Services , 2004, iTrust.
[47] Philipp Obreiter. A Case for Evidence-Aware Distributed Reputation Systems: Overcoming the Limitations of Plausibility Considerations , 2004, iTrust.
[48] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.
[49] Yücel Karabulut,et al. Implementation of an Agent-Oriented Trust Management Infrastructure Based on a Hybrid PKI Model , 2003, iTrust.
[50] Yong Chen,et al. Trust Propagation in Small Worlds , 2003, iTrust.
[51] Florian N. Egger,et al. "Trust me, I'm an online vendor": towards a model of trust for e-commerce system design , 2000, CHI Extended Abstracts.
[52] R. Sekar,et al. Specification-based anomaly detection: a new approach for detecting network intrusions , 2002, CCS '02.
[53] John Mylopoulos,et al. The Semantic Web - ISWC 2003 , 2003, Lecture Notes in Computer Science.
[54] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM 2001.
[55] L. Mui,et al. A computational model of trust and reputation , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[56] Paul Resnick,et al. Reputation systems , 2000, CACM.
[57] Ellen R. Tauber,et al. How Do People Evaluate a Web Site's Credibility? , 2002 .
[58] David M. Booth,et al. Web Services Architecture , 2004 .
[59] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[60] Audun Jøsang,et al. The right type of trust for distributed systems , 1996, NSPW '96.
[61] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[62] K.E. Seamons,et al. Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[63] Jeffrey M. Bradshaw,et al. KAoS: An Open Agent Architecture Support-ing Reuse, Interoperability, and Extensibility , 1996 .
[64] Rino Falcone,et al. Trust, Reputation, and Security: Theories and Practice , 2003, Lecture Notes in Computer Science.
[65] Darren P. Mundy,et al. Trust Development and Management in Virtual Communities , 2004, iTrust.
[66] H. S. Teng,et al. Adaptive real-time anomaly detection using inductively generated sequential patterns , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[67] Eugene H. Spafford,et al. Using internal sensors for computer intrusion detection , 2001 .
[68] Fn Florian Egger. FROM INTERACTIONS TO TRANSACTIONS: Designing the Trust Experience for Business-to-Consumer Electronic Commerce , 2003 .