Users and Trust in Cyberspace (Transcript of Discussion)
暂无分享,去创建一个
[1] Oren Etzioni,et al. Privacy interfaces for information management , 1999, CACM.
[2] Pekka Nikander,et al. Extending Jini with decentralized trust management , 2000 .
[3] Juha Paajarvi. XML Encoding of SPKI Certificates , 2000 .
[4] Thomas Beth,et al. Trust-Based Navigation in Distribution Systems , 1994, Comput. Syst..
[5] Pekka Nikander,et al. Certifying Trust , 1998, Public Key Cryptography.
[6] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[7] Catherine A. Meadows,et al. The Role of Trust in Information Integrity Protocols , 1995, J. Comput. Secur..
[8] Paul F. Syverson,et al. On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] A. Seligman. The Problem of Trust , 2021 .
[10] Levente Buttyán,et al. On the Problem of Trust in Mobile Agent Systems , 1998, NDSS.
[11] Rune Gustavsson,et al. Agents with power , 1999, CACM.
[12] M. Angela Sasse,et al. Privacy Issues in Ubiquitous Multimedia Environments: Wake Sleeping Dogs, or Let Them Lie? , 1999, INTERACT.
[13] Elena Rocco,et al. Trust breaks down in electronic contexts but can be repaired by some initial face-to-face contact , 1998, CHI.
[14] Holger Luczak,et al. Teams without trust? Investigations in the influence of video-mediated communication on the origin of trust among cooperating persons , 1999, Behav. Inf. Technol..
[15] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[16] Ronald Fagin,et al. I'm OK if you're OK: On the notion of trusting communication , 1988, J. Philos. Log..
[17] Donna L. Hoffman,et al. Building consumer trust online , 1999, CACM.
[18] Paola Benassi,et al. TRUSTe: an online privacy seal program , 1999, CACM.
[19] Thomas Beth,et al. Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[20] M. Angela Sasse,et al. Users are not the enemy , 1999, CACM.
[21] G. J. Simmons. An introduction to the mathematics of trust in security protocols , 1993, [1993] Proceedings Computer Security Foundations Workshop VI.
[22] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[23] Roger Clarke,et al. Internet privacy concerns confirm the case for intervention , 1999, CACM.
[24] Mark S. Ackerman,et al. Beyond Concern: Understanding Net Users' Attitudes About Online Privacy , 1999, ArXiv.
[25] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[26] Gerald L. Lohse,et al. Predictors of online buying behavior , 1999, CACM.
[27] Martín Abadi,et al. A semantics for a logic of authentication (extended abstract) , 1991, PODC '91.
[28] F. Ketelaar,et al. Can we trust information , 1997 .
[29] A. Jøsang. TRUST-BASED DECISION MAKING FOR ELECTRONIC TRANSACTIONS , 1999 .