XenoTrust: event-based distributed trust management
暂无分享,去创建一个
Peter R. Pietzuch | Steven Hand | Evangelos Kotsovinos | Boris Dragovic | S. Hand | Boris Dragovic | P. Pietzuch | Evangelos Kotsovinos
[1] Steven Hand,et al. Managing Trust and Reputation in the XenoServer Open Platform , 2003, iTrust.
[2] Joan Feigenbaum,et al. KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.
[3] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[4] Hagit Attiya,et al. Optimal Clock Synchronization under Different Delay Assumptions (Preliminary Version). , 1993, PODC 1993.
[5] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[6] Peter R. Pietzuch,et al. A Framework for Event Composition in Distributed Systems , 2003, Middleware.
[7] Angelos D. Keromytis,et al. Key note: Trust management for public-key infrastructures , 1999 .
[8] Karl Aberer,et al. Managing trust in a peer-2-peer information system , 2001, CIKM '01.
[9] Ueli Maurer,et al. Modelling a Public-Key Infrastructure , 1996, ESORICS.
[10] Steven Hand,et al. Controlling the XenoServer Open Platform , 2003, 2003 IEEE Conference onOpen Architectures and Network Programming..
[11] Paul Syverson,et al. A Taxonomy of Replay Attacks , 1994 .
[12] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[13] Fred B. Schneider,et al. A Paradigm for Reliable Clock Synchronization , 1986 .
[14] Pattie Maes,et al. Kasbah: An Agent Marketplace for Buying and Selling Goods , 1996, PAAM.
[15] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[16] Anne-Marie Kermarrec,et al. The many faces of publish/subscribe , 2003, CSUR.
[17] Paul F. Syverson,et al. A taxonomy of replay attacks [cryptographic protocols] , 1994, Proceedings The Computer Security Foundations Workshop VII.
[18] Munindar P. Singh,et al. A Social Mechanism of Reputation Management in Electronic Communities , 2000, CIA.
[19] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.