A New Monitor Model for Enhancing Trust-Based Systems
暂无分享,去创建一个
[1] J. Nievergelt,et al. Special Feature: Monitoring Program Execution: A Survey , 1981, Computer.
[2] Zakaria Maamar,et al. Service-Oriented Computing: Agents, Semantics, and Engineering, AAMAS 2007 International Workshop, SOCASE 2007, Honolulu, HI, USA, May 14, 2007, Proceedings , 2007, SOCASE.
[3] Ioan Alfred Letia,et al. Z-Based Agents for Service Oriented Computing , 2007, SOCASE.
[4] William N. Robinson,et al. Monitoring Web service requirements , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..
[5] Wolfgang Emmerich,et al. The monitorability of service-level agreements for application-service provision , 2007, WOSP '07.
[6] Ann Q. Gates,et al. A taxonomy and catalog of runtime software-fault monitoring tools , 2004, IEEE Transactions on Software Engineering.
[7] Boi Faltings,et al. Reliable QoS monitoring based on client feedback , 2007, WWW '07.
[8] Bin Luo,et al. A framework for dynamic program analyzers , 1993, OOPSLA '93.
[9] Ravi S. Sandhu,et al. Peer-to-peer access control architecture using trusted computing technology , 2005, SACMAT '05.
[10] Timlynn T. Babitsky,et al. Proceedings of the eighth annual conference on Object-oriented programming systems, languages, and applications , 1993, OOPSLA 1993.
[11] Mohammad Zulkernine,et al. ATM: an automatic trust monitoring algorithm for service software , 2009, SAC '09.
[12] Andrés Marín López,et al. TrustAC: Trust-Based Access Control for Pervasive Devices , 2005, SPC.
[13] Rizos Sakellariou,et al. A taxonomy of grid monitoring systems , 2005, Future Gener. Comput. Syst..
[14] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[15] Sandro Etalle,et al. Integrity constraints in trust management , 2005, SACMAT '05.
[16] Hiroyuki Morikawa,et al. DOLPHIN: an autonomous indoor positioning system in ubiquitous computing environment , 2003, Proceedings IEEE Workshop on Software Technologies for Future Embedded Systems. WSTFES 2003.
[17] Bernhard Plattner,et al. Monitoring Program Execution: A Survey. , 1981 .
[18] Peter Druschel,et al. Peer-to-peer systems , 2010, Commun. ACM.
[19] Alban Grastien,et al. Monitoring Web service networks in a model-based approach , 2005, Third European Conference on Web Services (ECOWS'05).
[20] Paola Lecca,et al. A new probabilistic generative model of parameter inference in biochemical networks , 2009, SAC '09.
[21] Michael Collins,et al. Evaluating Trust-Based Access Control for Social Interaction , 2009, 2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies.
[22] Hisham M. Haddad,et al. Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007 , 2007, SAC.
[23] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[24] George Spanoudakis,et al. Towards security monitoring patterns , 2007, SAC '07.
[25] Jane Yung-jen Hsu,et al. Accountability monitoring and reasoning in service-oriented architectures , 2007, Service Oriented Computing and Applications.
[26] Akhil Sahai,et al. Monitoring and controlling Internet based e-services , 2001, Proceedings. The Second IEEE Workshop on Internet Applications. WIAPP 2001.
[27] Paddy Nixon,et al. Towards self-protecting ubiquitous systems: monitoring trust-based interactions , 2005, Personal and Ubiquitous Computing.
[28] Christian Damsgaard Jensen,et al. Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications , 2002 .
[29] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[30] Karsten Schwan,et al. Falcon: on-line monitoring and steering of large-scale parallel programs , 1995, Proceedings Frontiers '95. The Fifth Symposium on the Frontiers of Massively Parallel Computation.
[31] Srdjan Capkun,et al. Mobility helps security in ad hoc networks , 2003, MobiHoc '03.
[32] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[33] Luciano Baresi,et al. Smart monitors for composed services , 2004, ICSOC '04.
[34] Frank Stajano. Security in Pervasive Computing , 2003, SPC.