Development and Automatic Monitoring of Trust-Aware Service-Based Software

Thesis (Master, Electrical & Computer Engineering) -- Queen's University, 2008-02-11 15:57:22.003

[1]  Julita Vassileva,et al.  Trust and reputation model in peer-to-peer networks , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[2]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[3]  Boi Faltings,et al.  Towards Incentive-Compatible Reputation Management , 2002, Trust, Reputation, and Security.

[4]  Diego Gambetta Can We Trust Trust , 2000 .

[5]  Akhil Sahai,et al.  Monitoring and controlling Internet based e-services , 2001, Proceedings. The Second IEEE Workshop on Internet Applications. WIAPP 2001.

[6]  Pearl Brereton,et al.  Service-based software: the future for flexible software , 2000, Proceedings Seventh Asia-Pacific Software Engeering Conference. APSEC 2000.

[7]  Angelos D. Keromytis,et al.  Key note: Trust management for public-key infrastructures , 1999 .

[8]  Nicholas R. Jennings,et al.  FIRE: An Integrated Trust and Reputation Model for Open Multi-Agent Systems , 2004, ECAI.

[9]  Luciano Baresi,et al.  Smart monitors for composed services , 2004, ICSOC '04.

[10]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[11]  Indrajit Ray,et al.  TrustBAC: integrating trust relationships into the RBAC model for access control in open systems , 2006, SACMAT '06.

[12]  Ian T. Foster,et al.  The Anatomy of the Grid: Enabling Scalable Virtual Organizations , 2001, Int. J. High Perform. Comput. Appl..

[13]  C. Sierra,et al.  REGRET: A reputation model for gregarious societies , 2001 .

[14]  Ravi S. Sandhu,et al.  Peer-to-peer access control architecture using trusted computing technology , 2005, SACMAT '05.

[15]  Lin Liu,et al.  Modelling Trust for System Design Using the i* Strategic Actors Framework , 2000, Trust in Cyber-societies.

[16]  Nicola Mezzetti Towards a model for trust relationships in virtual enterprises , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..

[17]  David M. Eyers,et al.  Using trust and risk in role-based access control policies , 2004, SACMAT '04.

[18]  Xavier Parent,et al.  Specifying Legal Risk Scenarios Using the CORAS Threat Modelling Language , 2005, iTrust.

[19]  Alban Grastien,et al.  Monitoring Web service networks in a model-based approach , 2005, Third European Conference on Web Services (ECOWS'05).

[20]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[21]  Li Zhou,et al.  Adaptive trust negotiation and access control for grids , 2005, The 6th IEEE/ACM International Workshop on Grid Computing, 2005..

[22]  Shonali Krishnaswamy,et al.  A fuzzy model for reasoning about reputation in web services , 2006, SAC.

[23]  Sebastian Ries,et al.  Certain trust: a trust model for users and agents , 2007, SAC '07.

[24]  M. Sloman,et al.  A Survey of Trust in Internet Applications I E E E C O M M U N I C a T I O N S , 2000 .

[25]  Mitja Kolšek,et al.  Session Fixation Vulnerability in Web-based Applications , 2002 .

[26]  William L. Fithen,et al.  State of the Practice of Intrusion Detection Technologies , 2000 .

[27]  Sheikh Iqbal Ahamed,et al.  An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[28]  Mohammad Zulkernine,et al.  UMLtrust: towards developing trust-aware software , 2008, SAC '08.

[29]  Bran Selic,et al.  Using UML for Modeling Complex Real-Time Systems , 1998, LCTES.

[30]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[31]  Keith Rochford,et al.  An Agent-based Approach to Grid Service Monitoring , 2001 .

[32]  Ioan Alfred Letia,et al.  Z-Based Agents for Service Oriented Computing , 2007, SOCASE.

[33]  William N. Robinson,et al.  Monitoring Web service requirements , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..

[34]  Joan Feigenbaum,et al.  KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.

[35]  Nicholas R. Jennings,et al.  Brain Meets Brawn: Why Grid and Agents Need Each Other , 2004, Towards the Learning Grid.

[36]  Tyrone Grandison,et al.  Conceptions of Trust: Definition, Constructs, and Models , 2007 .

[37]  Omer F. Rana,et al.  Trust Assessment Using Provenance in Service Oriented Applications , 2006, 2006 10th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW'06).

[38]  Ling Liu,et al.  Building Trust in Decentralized Peer-to-Peer Electronic Communities , 2002 .

[39]  Muthucumaru Maheswaran,et al.  Trust modeling for peer-to-peer based computing systems , 2003, Proceedings International Parallel and Distributed Processing Symposium.

[40]  Rafal Leszczyna,et al.  Trust case: justifying trust in an IT solution , 2005, Reliab. Eng. Syst. Saf..

[41]  Theodosis Dimitrakos,et al.  A Service-Oriented Trust Management Framework , 2002, Trust, Reputation, and Security.

[42]  Junseok Hwang,et al.  Trust embedded grid system for the harmonization of practical requirements , 2005, 2005 IEEE International Conference on Services Computing (SCC'05) Vol-1.

[43]  Martin Bichler,et al.  Service-oriented computing , 2006, Computer.

[44]  Sascha Ossowski,et al.  Trust-based service provider selection in open environments , 2007, SAC '07.

[45]  Paul Resnick,et al.  PICS: Internet access controls without censorship , 1996, CACM.

[46]  Giorgos Zacharia,et al.  Trust management through reputation mechanisms , 2000, Appl. Artif. Intell..

[47]  Mohammad Zulkernine,et al.  CAT: a context-aware trust model for open and dynamic systems , 2008, SAC '08.

[48]  David A. Basin,et al.  Model driven security for process-oriented systems , 2003, SACMAT '03.

[49]  Evangelos Kotsovinos,et al.  BambooTrust: practical scalable trust management for global public computing , 2006, SAC.

[50]  Wolfgang Emmerich,et al.  The monitorability of service-level agreements for application-service provision , 2007, WOSP '07.

[51]  Gabriele Lenzini,et al.  Context-aware Trust Evaluation Functions for Dynamic Reconfigurable Systems , 2006, MTW.

[52]  Paddy Nixon,et al.  Towards self-protecting ubiquitous systems: monitoring trust-based interactions , 2005, Personal and Ubiquitous Computing.

[53]  Boi Faltings,et al.  Reliable QoS monitoring based on client feedback , 2007, WWW '07.

[54]  Dirk Grunwald,et al.  A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[55]  Ronald H. Perrott,et al.  GeneGrid: a commercial grid service oriented virtual bioinformatics laboratory , 2005, 2005 IEEE International Conference on Services Computing (SCC'05) Vol-1.

[56]  Munindar P. Singh,et al.  Formal Trust Model for Multiagent Systems , 2007, IJCAI.

[57]  Daniele Quercia,et al.  B-Trust: Bayesian Trust Framework for Pervasive Computing , 2006, iTrust.

[58]  Audun Jøsang,et al.  The right type of trust for distributed systems , 1996, NSPW '96.

[59]  Licia Capra,et al.  Autonomic trust prediction for pervasive systems , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[60]  Joan Feigenbaum,et al.  REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.

[61]  Jane Yung-jen Hsu,et al.  Accountability monitoring and reasoning in service-oriented architectures , 2007, Service Oriented Computing and Applications.

[62]  Linpeng Huang,et al.  Service-Based Grid Resource Monitoring with Common Information Model , 2005, NPC.

[63]  Mohammad Zulkernine,et al.  UMLintr: a UML profile for specifying intrusions , 2006, 13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06).

[64]  Yuanda Cao,et al.  A vision for the trust managed grid , 2006 .

[65]  Nicholas R. Jennings,et al.  Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model , 2005, AAMAS '05.

[66]  C. M. Sperberg-McQueen,et al.  Extensible Markup Language (XML) , 1997, World Wide Web J..

[67]  N. L. Chervany,et al.  THE MEANINGS OF TRUST , 2000 .

[68]  Munindar P. Singh,et al.  Service-Oriented Computing: Key Concepts and Principles , 2005, IEEE Internet Comput..

[69]  Sandro Etalle,et al.  Integrity constraints in trust management , 2005, SACMAT '05.

[70]  Simon See,et al.  Grid Service Monitoring for Grid Market Framework , 2006, 2006 14th IEEE International Conference on Networks.

[71]  Lin Liu,et al.  Analyzing trust in technology strategies , 2006, PST.

[72]  Yuhui Deng,et al.  A heterogeneous storage grid enabled by grid service , 2007, OPSR.

[73]  Amir Herzberg,et al.  Access control meets public key infrastructure, or: assigning roles to strangers , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[74]  David Ingram,et al.  Risk Models for Trust-Based Access Control(TBAC) , 2005, iTrust.

[75]  Jan Jürjens,et al.  Sound development of secure service-based systems , 2004, ICSOC '04.

[76]  George Spanoudakis,et al.  Requirements monitoring for service-based systems: towards a framework based on event calculus , 2004 .

[77]  Vijay Varadharajan,et al.  Trust based risk management for distributed system security - a new approach , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[78]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .