Development and Automatic Monitoring of Trust-Aware Service-Based Software
暂无分享,去创建一个
[1] Julita Vassileva,et al. Trust and reputation model in peer-to-peer networks , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[2] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[3] Boi Faltings,et al. Towards Incentive-Compatible Reputation Management , 2002, Trust, Reputation, and Security.
[4] Diego Gambetta. Can We Trust Trust , 2000 .
[5] Akhil Sahai,et al. Monitoring and controlling Internet based e-services , 2001, Proceedings. The Second IEEE Workshop on Internet Applications. WIAPP 2001.
[6] Pearl Brereton,et al. Service-based software: the future for flexible software , 2000, Proceedings Seventh Asia-Pacific Software Engeering Conference. APSEC 2000.
[7] Angelos D. Keromytis,et al. Key note: Trust management for public-key infrastructures , 1999 .
[8] Nicholas R. Jennings,et al. FIRE: An Integrated Trust and Reputation Model for Open Multi-Agent Systems , 2004, ECAI.
[9] Luciano Baresi,et al. Smart monitors for composed services , 2004, ICSOC '04.
[10] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[11] Indrajit Ray,et al. TrustBAC: integrating trust relationships into the RBAC model for access control in open systems , 2006, SACMAT '06.
[12] Ian T. Foster,et al. The Anatomy of the Grid: Enabling Scalable Virtual Organizations , 2001, Int. J. High Perform. Comput. Appl..
[13] C. Sierra,et al. REGRET: A reputation model for gregarious societies , 2001 .
[14] Ravi S. Sandhu,et al. Peer-to-peer access control architecture using trusted computing technology , 2005, SACMAT '05.
[15] Lin Liu,et al. Modelling Trust for System Design Using the i* Strategic Actors Framework , 2000, Trust in Cyber-societies.
[16] Nicola Mezzetti. Towards a model for trust relationships in virtual enterprises , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..
[17] David M. Eyers,et al. Using trust and risk in role-based access control policies , 2004, SACMAT '04.
[18] Xavier Parent,et al. Specifying Legal Risk Scenarios Using the CORAS Threat Modelling Language , 2005, iTrust.
[19] Alban Grastien,et al. Monitoring Web service networks in a model-based approach , 2005, Third European Conference on Web Services (ECOWS'05).
[20] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[21] Li Zhou,et al. Adaptive trust negotiation and access control for grids , 2005, The 6th IEEE/ACM International Workshop on Grid Computing, 2005..
[22] Shonali Krishnaswamy,et al. A fuzzy model for reasoning about reputation in web services , 2006, SAC.
[23] Sebastian Ries,et al. Certain trust: a trust model for users and agents , 2007, SAC '07.
[24] M. Sloman,et al. A Survey of Trust in Internet Applications I E E E C O M M U N I C a T I O N S , 2000 .
[25] Mitja Kolšek,et al. Session Fixation Vulnerability in Web-based Applications , 2002 .
[26] William L. Fithen,et al. State of the Practice of Intrusion Detection Technologies , 2000 .
[27] Sheikh Iqbal Ahamed,et al. An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[28] Mohammad Zulkernine,et al. UMLtrust: towards developing trust-aware software , 2008, SAC '08.
[29] Bran Selic,et al. Using UML for Modeling Complex Real-Time Systems , 1998, LCTES.
[30] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[31] Keith Rochford,et al. An Agent-based Approach to Grid Service Monitoring , 2001 .
[32] Ioan Alfred Letia,et al. Z-Based Agents for Service Oriented Computing , 2007, SOCASE.
[33] William N. Robinson,et al. Monitoring Web service requirements , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..
[34] Joan Feigenbaum,et al. KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.
[35] Nicholas R. Jennings,et al. Brain Meets Brawn: Why Grid and Agents Need Each Other , 2004, Towards the Learning Grid.
[36] Tyrone Grandison,et al. Conceptions of Trust: Definition, Constructs, and Models , 2007 .
[37] Omer F. Rana,et al. Trust Assessment Using Provenance in Service Oriented Applications , 2006, 2006 10th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW'06).
[38] Ling Liu,et al. Building Trust in Decentralized Peer-to-Peer Electronic Communities , 2002 .
[39] Muthucumaru Maheswaran,et al. Trust modeling for peer-to-peer based computing systems , 2003, Proceedings International Parallel and Distributed Processing Symposium.
[40] Rafal Leszczyna,et al. Trust case: justifying trust in an IT solution , 2005, Reliab. Eng. Syst. Saf..
[41] Theodosis Dimitrakos,et al. A Service-Oriented Trust Management Framework , 2002, Trust, Reputation, and Security.
[42] Junseok Hwang,et al. Trust embedded grid system for the harmonization of practical requirements , 2005, 2005 IEEE International Conference on Services Computing (SCC'05) Vol-1.
[43] Martin Bichler,et al. Service-oriented computing , 2006, Computer.
[44] Sascha Ossowski,et al. Trust-based service provider selection in open environments , 2007, SAC '07.
[45] Paul Resnick,et al. PICS: Internet access controls without censorship , 1996, CACM.
[46] Giorgos Zacharia,et al. Trust management through reputation mechanisms , 2000, Appl. Artif. Intell..
[47] Mohammad Zulkernine,et al. CAT: a context-aware trust model for open and dynamic systems , 2008, SAC '08.
[48] David A. Basin,et al. Model driven security for process-oriented systems , 2003, SACMAT '03.
[49] Evangelos Kotsovinos,et al. BambooTrust: practical scalable trust management for global public computing , 2006, SAC.
[50] Wolfgang Emmerich,et al. The monitorability of service-level agreements for application-service provision , 2007, WOSP '07.
[51] Gabriele Lenzini,et al. Context-aware Trust Evaluation Functions for Dynamic Reconfigurable Systems , 2006, MTW.
[52] Paddy Nixon,et al. Towards self-protecting ubiquitous systems: monitoring trust-based interactions , 2005, Personal and Ubiquitous Computing.
[53] Boi Faltings,et al. Reliable QoS monitoring based on client feedback , 2007, WWW '07.
[54] Dirk Grunwald,et al. A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[55] Ronald H. Perrott,et al. GeneGrid: a commercial grid service oriented virtual bioinformatics laboratory , 2005, 2005 IEEE International Conference on Services Computing (SCC'05) Vol-1.
[56] Munindar P. Singh,et al. Formal Trust Model for Multiagent Systems , 2007, IJCAI.
[57] Daniele Quercia,et al. B-Trust: Bayesian Trust Framework for Pervasive Computing , 2006, iTrust.
[58] Audun Jøsang,et al. The right type of trust for distributed systems , 1996, NSPW '96.
[59] Licia Capra,et al. Autonomic trust prediction for pervasive systems , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[60] Joan Feigenbaum,et al. REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.
[61] Jane Yung-jen Hsu,et al. Accountability monitoring and reasoning in service-oriented architectures , 2007, Service Oriented Computing and Applications.
[62] Linpeng Huang,et al. Service-Based Grid Resource Monitoring with Common Information Model , 2005, NPC.
[63] Mohammad Zulkernine,et al. UMLintr: a UML profile for specifying intrusions , 2006, 13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06).
[64] Yuanda Cao,et al. A vision for the trust managed grid , 2006 .
[65] Nicholas R. Jennings,et al. Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model , 2005, AAMAS '05.
[66] C. M. Sperberg-McQueen,et al. Extensible Markup Language (XML) , 1997, World Wide Web J..
[67] N. L. Chervany,et al. THE MEANINGS OF TRUST , 2000 .
[68] Munindar P. Singh,et al. Service-Oriented Computing: Key Concepts and Principles , 2005, IEEE Internet Comput..
[69] Sandro Etalle,et al. Integrity constraints in trust management , 2005, SACMAT '05.
[70] Simon See,et al. Grid Service Monitoring for Grid Market Framework , 2006, 2006 14th IEEE International Conference on Networks.
[71] Lin Liu,et al. Analyzing trust in technology strategies , 2006, PST.
[72] Yuhui Deng,et al. A heterogeneous storage grid enabled by grid service , 2007, OPSR.
[73] Amir Herzberg,et al. Access control meets public key infrastructure, or: assigning roles to strangers , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[74] David Ingram,et al. Risk Models for Trust-Based Access Control(TBAC) , 2005, iTrust.
[75] Jan Jürjens,et al. Sound development of secure service-based systems , 2004, ICSOC '04.
[76] George Spanoudakis,et al. Requirements monitoring for service-based systems: towards a framework based on event calculus , 2004 .
[77] Vijay Varadharajan,et al. Trust based risk management for distributed system security - a new approach , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[78] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .