|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7373 occurrences of 2496 keywords
|
|
|
Results
Found 28405 publication records. Showing 28395 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
29 | Liqun Chen 0002 |
A DAA Scheme Using Batch Proof and Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trust and Trustworthy Computing, Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings, pp. 166-180, 2010, Springer, 978-3-642-13868-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Amir Herzberg, Haya Schulmann |
Robust Combiners for Software Hardening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trust and Trustworthy Computing, Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings, pp. 282-289, 2010, Springer, 978-3-642-13868-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Emanuele Cesena, Hans Löhr, Gianluca Ramunno, Ahmad-Reza Sadeghi, Davide Vernizzi |
Anonymous Authentication with TLS and DAA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trust and Trustworthy Computing, Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings, pp. 47-62, 2010, Springer, 978-3-642-13868-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Jun-E Tan |
The Leap of Faith from Online to Offline: An Exploratory Study of Couchsurfing.org. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trust and Trustworthy Computing, Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings, pp. 367-380, 2010, Springer, 978-3-642-13868-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-Pierre Seifert |
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trust and Trustworthy Computing, Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings, pp. 1-15, 2010, Springer, 978-3-642-13868-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Nora Lieberknecht |
Application of Trusted Computing in Automation to Prevent Product Piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trust and Trustworthy Computing, Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings, pp. 95-108, 2010, Springer, 978-3-642-13868-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Nikhil Shetty, Galina Schwartz, Jean C. Walrand |
Can Competitive Insurers Improve Network Security? ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trust and Trustworthy Computing, Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings, pp. 308-322, 2010, Springer, 978-3-642-13868-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | John Lyle, Andrew P. Martin |
Engineering Attestable Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trust and Trustworthy Computing, Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings, pp. 257-264, 2010, Springer, 978-3-642-13868-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Stephen Marsh 0001, Pamela Briggs |
Examining Trust, Forgiveness and Regret as Computational Concepts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing with Social Trust ![In: Computing with Social Trust, pp. 9-43, 2009, Springer, 978-1-84800-355-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Cai-Nicolas Ziegler |
On Propagating Interpersonal Trust in Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing with Social Trust ![In: Computing with Social Trust, pp. 133-168, 2009, Springer, 978-1-84800-355-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | John O'Donovan |
Capturing Trust in Social Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing with Social Trust ![In: Computing with Social Trust, pp. 213-257, 2009, Springer, 978-1-84800-355-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Paolo Massa, Paolo Avesani |
Trust Metrics in Recommender Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing with Social Trust ![In: Computing with Social Trust, pp. 259-285, 2009, Springer, 978-1-84800-355-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Cristiano Castelfranchi, Rino Falcone, Emiliano Lorini |
A Non-reductionist Approach to Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing with Social Trust ![In: Computing with Social Trust, pp. 45-72, 2009, Springer, 978-1-84800-355-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Jennifer Golbeck, Ugur Kuter |
The Ripple Effect: Change in Trust and Its Impact Over a Social Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing with Social Trust ![In: Computing with Social Trust, pp. 169-181, 2009, Springer, 978-1-84800-355-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Jennifer Golbeck |
Introduction to Computing with Social Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing with Social Trust ![In: Computing with Social Trust, pp. 1-5, 2009, Springer, 978-1-84800-355-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Raph Levien |
Attack-Resistant Trust Metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing with Social Trust ![In: Computing with Social Trust, pp. 121-132, 2009, Springer, 978-1-84800-355-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Jean-Marc Seigneur |
Social Trust of Virtual Identities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing with Social Trust ![In: Computing with Social Trust, pp. 73-118, 2009, Springer, 978-1-84800-355-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Ming Kwan, Deepak Ramachandran |
Trust and Online Reputation Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing with Social Trust ![In: Computing with Social Trust, pp. 287-311, 2009, Springer, 978-1-84800-355-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Florian Eilers, Uwe Nestmann |
Deriving Trust from Experience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust, 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers, pp. 36-50, 2009, Springer, 978-3-642-12458-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Ehab ElSalamouny, Vladimiro Sassone, Mogens Nielsen |
HMM-Based Trust Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust, 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers, pp. 21-35, 2009, Springer, 978-3-642-12458-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Peter Lipp, Ahmad-Reza Sadeghi, Klaus-Michael Koch (eds.) |
Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![Springer, 978-3-540-68978-2 The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Rino Falcone, K. Suzanne Barber, Jordi Sabater-Mir, Munindar P. Singh (eds.) |
Trust in Agent Societies, 11th International Workshop, TRUST 2008, Estoril, Portugal, May 12-13, 2008. Revised Selected and Invited Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS-TRUST ![Springer, 978-3-540-92802-7 The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Dries Schellekens, Pim Tuyls, Bart Preneel |
Embedded Trusted Computing with Authenticated Non-volatile Memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 60-74, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Mario Strasser, Heiko Stamer |
A Software-Based Trusted Platform Module Emulator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 33-47, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Benjamin Monate, Julien Signoles |
Slicing for Security of Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 133-142, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Paul England |
Practical Techniques for Operating System Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 1-13, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security distributed systems, trusted computing, security models, attestation |
29 | Konstantin Hyppönen, Marko Hassinen, Elena Trichina |
Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 107-118, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Sergey Bratus, Nihal D'Cunha, Evan R. Sparks, Sean W. Smith |
TOCTOU, Traps, and Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 14-32, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Paul England, Jork Löser |
Para-Virtualized TPM Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 119-132, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Konstantin Hyppönen, Marko Hassinen, Elena Trichina |
Combining Biometric Authentication with Privacy-Enhancing Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 155-165, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Thomas Weigold, Thorsten Kramp, Reto Hermann, Frank Höring, Peter Buhler, Michael Baentsch |
The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 75-91, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Secure Internet Banking, Authentication, Malicious Software, Secure Token, Man-in-the-middle |
29 | Adrian Leung, Liqun Chen 0002, Chris J. Mitchell |
On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 179-190, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Direct Anonymous Attestation, Privacy, Trusted Computing, DAA |
29 | Walter Quattrociocchi, Mario Paolucci, Rosaria Conte |
Reputation and Uncertainty Reduction: Simulating Partner Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS-TRUST ![In: Trust in Agent Societies, 11th International Workshop, TRUST 2008, Estoril, Portugal, May 12-13, 2008. Revised Selected and Invited Papers, pp. 308-325, 2008, Springer, 978-3-540-92802-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Priscilla Avegliano, Jaime Simão Sichman |
Using the RePartSimulator to Analyze Different Reputation-Based Partnership Formation Strategies within a Marketplace Scenario. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS-TRUST ![In: Trust in Agent Societies, 11th International Workshop, TRUST 2008, Estoril, Portugal, May 12-13, 2008. Revised Selected and Invited Papers, pp. 226-243, 2008, Springer, 978-3-540-92802-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Luis G. Nardin, Anarosa Brandão, Jaime Simão Sichman, Laurent Vercouter |
SOARI: A Service Oriented Architecture to Support Agent Reputation Models Interoperability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS-TRUST ![In: Trust in Agent Societies, 11th International Workshop, TRUST 2008, Estoril, Portugal, May 12-13, 2008. Revised Selected and Invited Papers, pp. 292-307, 2008, Springer, 978-3-540-92802-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Murat Sensoy, Pinar Yolum |
Experimental Evaluation of Deceptive Information Filtering in Context-Aware Service Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS-TRUST ![In: Trust in Agent Societies, 11th International Workshop, TRUST 2008, Estoril, Portugal, May 12-13, 2008. Revised Selected and Invited Papers, pp. 326-347, 2008, Springer, 978-3-540-92802-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Claudio A. Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati |
Trust Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Privacy, and Trust in Modern Data Management ![In: Security, Privacy, and Trust in Modern Data Management, pp. 103-117, 2007, Springer, 978-3-540-69860-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Gillian Hardstone, Luciana D'Adderio, Robin Williams |
Standardization, Trust and Dependability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trust in Technology ![In: Trust in Technology: A Socio-Technical Perspective, pp. 69-103, 2006, Springer, 978-1-4020-4257-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Ian Sommerville, Guy Dewsbury, Karen Clarke, Mark Rouncefield |
Dependability and Trust in Organisational and Domestic Computer Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trust in Technology ![In: Trust in Technology: A Socio-Technical Perspective, pp. 169-193, 2006, Springer, 978-1-4020-4257-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Karen Clarke, Gillian Hardstone, Mark Hartswood, Rob Procter, Mark Rouncefield |
Trust and Organisational Work. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trust in Technology ![In: Trust in Technology: A Socio-Technical Perspective, pp. 1-20, 2006, Springer, 978-1-4020-4257-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Theodosis Dimitrakos, Fabio Martinelli (eds.) |
Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![Springer, 0-387-24050-0 The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
29 | Kieron O'Hara, Harith Alani, Yannis Kalfoglou, Nigel Shadbolt |
Trust Strategies for the Semantic Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trust@ISWC ![In: Proceedings of the ISWC*04 Workshop on Trust, Security, and Reputation on the Semantic Web, Hiroshima, Japan, November 7, 2004, 2004, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
29 | Travis Leithead, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett, Ting Yu 0001, Charles C. Zhang |
How to Exploit Ontologies for Trust Negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trust@ISWC ![In: Proceedings of the ISWC*04 Workshop on Trust, Security, and Reputation on the Semantic Web, Hiroshima, Japan, November 7, 2004, 2004, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
29 | Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Alexandre Miège |
A Formal Approach to Specify and Deploy a Network Security Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 203-218, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Erik Rissanen, Babak Sadighi Firozabadi, Marek J. Sergot |
Discretionary Overriding of Access Control in the Privilege Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 219-232, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Jeremy W. Bryans, Maciej Koutny, Peter Y. A. Ryan |
Modelling Dynamic Opacity Using Petri Nets with Silent Actions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 159-172, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
non-deducibility, observable behaviour, silent actions, Petri nets, anonymity, opacity |
29 | Christian Haack, Alan Jeffrey |
Pattern-Matching Spi-Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 55-70, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Jerry den Hartog, Erik P. de Vink |
Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 85-98, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
systematic hardening, simulation, side-channel attack, DPA, power analysis, smartcard, countermeasures, fault analysis |
29 | Ali E. Abdallah, Etienne J. Khayat |
A Formal Model for Parameterized Role-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 233-246, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland |
Complementing Computational Protocol Analysis with Formal Specifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 129-144, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | James Heather, Jonathan Y. Clark |
Family Secrets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 99-114, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan |
Reasoning about Secure Interoperation Using Soft Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 173-186, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
constraint satisfaction, Secure interoperation |
29 | Laurent Mazaré |
Decidability of Opacity with Non-Atomic Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 71-84, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Dolev-Yao Constraints, Security, Formal Verification, Decidability, Rewriting Systems, Opacity |
29 | Mario Bravetti, Nadia Busi, Roberto Gorrieri, Roberto Lucchi, Gianluigi Zavattaro |
Security Issues in the Tuple-Space Coordination Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 1-12, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Jan Cederquist, Muhammad Torabi Dashti |
Formal Analysis of a Fair Payment Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 41-54, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Lantian Zheng, Andrew C. Myers |
Dynamic Security Labels and Noninterference (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 27-40, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Ricardo Corin, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini, I. Staicu |
A Logic for Auditing Accountability in Decentralized Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 187-201, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina |
Information Flow Analysis for Probabilistic Timed Automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 13-26, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Rino Falcone, Munindar P. Singh, Yao-Hua Tan (eds.) |
Trust in Cyber-societies, Integrating the Human and Artificial Perspectives [based on a workshop on Deception, Fraud, and Trust in Agent Societies held during the Autonomous Agents Conference in Barcelona, Spain in June 2000] ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trust in Cyber-societies ![Springer, 3-540-43069-5 The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Kuldeep Yadav, Avinash Srinivasan |
iTrust: an integrated trust framework for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1466-1471, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
promiscuous, security, sensor networks, trust, monitoring |
29 | Jianxin Li 0002, Dacheng Zhang, Jinpeng Huai, Jie Xu 0007 |
Context-aware trust negotiation in peer-to-peer service collaborations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Netw. Appl. ![In: Peer-to-Peer Netw. Appl. 2(2), pp. 164-177, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Peer-to-peer access control, Security policy, Privacy preservation, Credential, Trust establishment |
29 | Zaki Malik, Athman Bouguettaya |
RATEWeb: Reputation Assessment for Trust Establishment among Web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 18(4), pp. 885-911, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Web service, Trust, Reputation |
29 | Justin Manweiler, Ryan Scudellari, Landon P. Cox |
SMILE: encounter-based trust for mobile social services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 246-255, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, social networking, trust, location-based services |
29 | Jayashree Padmanabhan, K. S. Easwarakumar, Gokul B., Harishankar S. |
Trust based traffic monitoring approach for preventing denial of service attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 200-206, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
clustering, networks, trust, denial of service, centroid, dos |
29 | Sebastian Ries |
Extending Bayesian trust models regarding context-dependence and user friendly representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 1294-1301, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
recommendations, trust model, evidence |
29 | Martin Serrano, Sven van der Meer, John Strassner, Stefano De Paoli, Aphra Kerr, Cristiano Storni |
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 6th International Conference, ATC 2009, Brisbane, Australia, July 7-9, 2009, Proceedings, pp. 249-267, 2009, Springer, 978-3-642-02703-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Pervasive Services, Social Networks, Pervasive Computing, Information Systems, Trust Management, Systems Management, Policy-Based Management, Autonomic Communications, Reputation Mechanisms |
29 | Mijeom Kim, Mohan Kumar, Sukju Jung |
Trust Management Using Networks of Volunteers in Ubiquitous Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NEW2AN ![In: Smart Spaces and Next Generation Wired/Wireless Networking, 9th International Conference, NEW2AN 2009 and Second Conference on Smart Spaces, ruSMART 2009, St. Petersburg, Russia, September 15-18, 2009. Proceedings, pp. 279-290, 2009, Springer, 978-3-642-04188-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Ubiquitous computing, Service discovery, Trust management |
29 | Frank Edward Walter, Stefano Battiston, Frank Schweitzer |
A model of a trust-based recommendation system on a social network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Auton. Agents Multi Agent Syst. ![In: Auton. Agents Multi Agent Syst. 16(1), pp. 57-74, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Social network, Trust, Recommender system |
29 | Peter C. Chapin, Christian Skalka, Xiaoyang Sean Wang |
Authorization in trust management: Features and foundations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 40(3), pp. 9:1-9:48, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
trust management systems, Distributed authorization |
29 | Henriette S. M. Cramer, Vanessa Evers, Satyan Ramlal, Maarten van Someren, Lloyd Rutledge, Natalia Stash, Lora Aroyo, Bob J. Wielinga |
The effects of transparency on trust in and acceptance of a content-based art recommender. ![Search on Bibsonomy](Pics/bibsonomy.png) |
User Model. User Adapt. Interact. ![In: User Model. User Adapt. Interact. 18(5), pp. 455-496, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Human-computer interaction, Trust, Recommender systems, Transparency, Cultural heritage, Acceptance, User-adaptivity |
29 | Sheikh Iqbal Ahamed, Munirul M. Haque, Nilothpal Talukder |
Service sharing with trust in pervasive environment: now it's time to break the jinx. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 1622-1628, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
malicious recommendation, student's t-distribution, access control, trust model |
29 | Nasser Nassiri |
Increasing trust through the use of 3d e-commerce environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 1463-1466, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
3D e-commerce environment, trust, touch, appearance |
29 | James Caverlee, Ling Liu 0001, Steve Webb |
Towards robust trust establishment in web-based social networks with socialtrust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 17th International Conference on World Wide Web, WWW 2008, Beijing, China, April 21-25, 2008, pp. 1163-1164, 2008, ACM, 978-1-60558-085-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
social networks, trust |
29 | Shrija Rajbhandari, Omer F. Rana, Ian Wootten |
A fuzzy model for calculating workflow trust using provenance data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mardi Gras Conference ![In: Proceedings of the 15th ACM Mardi Gras conference: From lightweight mash-ups to lambda grids: Understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilities, Baton Rouge, Louisiana, USA, January 29 - February 3, 2008, pp. 10, 2008, ACM, 978-1-59593-835-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SOA, trust, workflow, provenance, fuzzy inference |
29 | Oluwafemi O. Ajayi, Richard O. Sinnott, Anthony Stell |
Dynamic trust negotiation for flexible e-health collaborations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mardi Gras Conference ![In: Proceedings of the 15th ACM Mardi Gras conference: From lightweight mash-ups to lambda grids: Understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilities, Baton Rouge, Louisiana, USA, January 29 - February 3, 2008, pp. 8, 2008, ACM, 978-1-59593-835-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control, e-health, trust negotiation |
29 | Zhitang Li, Huaiqing Lin, Chuiwei Lu, Yejiang Zhang |
Managing Data for Evaluating Trust in Unstructured Peer-to-Peer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GPC ![In: Advances in Grid and Pervasive Computing, Third International Conference, GPC 2008, Kunming, China, May 25-28, 2008. Proceedings, pp. 308-318, 2008, Springer, 978-3-540-68081-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
managing data, peer-to-peer, trust, reputation |
29 | Lin Tan, Chi-Hung Chi, Jianming Deng |
Quantifying Trust Based on Service Level Agreement for Software as a Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 116-119, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
qualuty, Software engineering, trust, software service |
29 | Asimina Vasalou, Jens Riegelsberger |
Recovering trust and avoiding escalation: an overlooked design goal of social systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, CHI 2008, Florence, Italy, April 5-10, 2008, pp. 3333-3338, 2008, ACM, 978-1-60558-012-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
forgiveness, trust breakdowns, resolution, trading |
29 | Luis Vicente Casaló, Jesús Cisneros |
An Empirical Test of the Multiplicative Effect of Usability on Consumer Trust and Satisfaction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 1-5 September 2008, Turin, Italy, pp. 439-443, 2008, IEEE Computer Society, 978-0-7695-3299-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Internet, Usability, trust, satisfaction |
29 | Carol J. Fung, Olga Baysal, Jie Zhang 0002, Issam Aib, Raouf Boutaba |
Trust Management for Host-Based Collaborative Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Managing Large-Scale Service Deployment, 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings, pp. 109-122, 2008, Springer, 978-3-540-85999-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Intrusion detection Network, Security, Collaboration, Peer-to-Peer, Trust Management |
29 | Mozhgan Tavakolifard, Svein J. Knapskog, Peter Herrmann |
Trust transferability among similar contexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'08 - Proceedings of the 4th ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Vancouver, British Columbia, Canada, October 27-28, 2008, pp. 91-97, 2008, ACM, 978-1-60558-237-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ontology, trust, context, semantic similarity |
29 | Furong Wang, Chen Huang 0003, Jing Zhao, Chunming Rong |
IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, GinoWan, Okinawa, Japan, March 25-28, 2008, pp. 978-984, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
trust, Ad hoc, evidence, intrusion |
29 | Jie Zhang 0002, Ali A. Ghorbani 0001, Robin Cohen |
A familiarity-based trust model for effective selection of sellers in multiagent e-commerce systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 6(5), pp. 333-344, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Trust, E-commerce, Multiagent systems, Familiarity |
29 | Asimina Vasalou, Astrid Hopfensitz, Jeremy Pitt |
Is an apology enough?: how to resolve trust breakdowns in episodic online interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BCS HCI (2) ![In: Proceedings of the 21st British HCI Group Annual Conference on HCI 2007: HCI...but not as we know it - Volume 2, BCS HCI 2007, University of Lancaster, United Kingdom, 3-7 September 2007, pp. 119-122, 2007, BCS, 978-1-902505-95-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
apology, forgiveness, trust, reputation, repair |
29 | Hicham Ibrahim, Pradeep K. Atrey, Abdulmotaleb El-Saddik |
Semantic similarity based trust computation in websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MS ![In: Proceedings of the 1st ACM Workshop on The Many Faces of Multimedia Semantics, MS 2007, Augsburg, Bavaria, Germany, September 28, 2007, pp. 65-72, 2007, ACM, 978-1-59593-782-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
trust computation, semantic similarity |
29 | Justin R. Pike, Elizabeth Marie Ehlers, Ockmer L. Oosthuizen |
A Specialised Architecture for Embedding Trust Evaluation Capabilities in Intelligent Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRIMA ![In: Agent Computing and Multi-Agent Systems, 10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007, Bangkok, Thailand, November 21-23, 2007. Revised Papers, pp. 404-409, 2007, Springer, 978-3-642-01638-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Agent Architectures and Applications, Trust, Mobile Agents |
29 | Yan Zhang, Wei Wang 0033, Shunying Lü |
Simulating Trust Overlay in P2P Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (1) ![In: Computational Science - ICCS 2007, 7th International Conference Beijing, China, May 27-30, 2007, Proceedings, Part I, pp. 632-639, 2007, Springer, 978-3-540-72583-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, simulator, peer-to-peer, trust, overlay networks |
29 | Daniel Díaz Sánchez, Andrés Marín López, Florina Almenárez |
Enhancing access control for mobile devices with an agnostic trust negotiation decision engine. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
PWC ![In: Personal Wireless Communications, The 12th IFIP International Conference on Personal Wireless Communications (PWC 2007), Prague, Czech Republic, September 2007, pp. 304-315, 2007, Springer, 978-0-387-74158-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
access control, flexible, trust negotiation |
29 | Maria Antikainen, Timo Aaltonen, Jaani Väisänen |
The role of trust in OSS communities - Case Linux Kernel community. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
OSS ![In: Open Source Development, Adoption and Innovation, IFIP Working Group 2.13 on Open Source Software, June 11-14, 2007, Limerick, Ireland, pp. 223-228, 2007, Springer, 978-0-387-72485-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
OSS community, trust, case study, survey, Linux Kernel |
29 | Venkatesan Balakrishnan, Vijay Varadharajan, Phillip Lucs, Udaya Kiran Tupakula |
Trust Enhanced Secure Mobile Ad-Hoc Network Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (2) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 2, May 21-23, 2007, Niagara Falls, Canada, pp. 27-33, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
reputation and trust, Security, mobile ad-hoc networks, intrusion detection, secure routing |
29 | K. Suzanne Barber, Jaesuk Ahn, Suratna Budalakoti, David DeAngelis, Karen Fullam, Chris L. D. Jones, Xin Sui |
Agent trust evaluation and team formation in heterogeneous organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), Honolulu, Hawaii, USA, May 14-18, 2007, pp. 261, 2007, IFAAMAS, 978-81-904262-7-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
team formation, trust evaluation |
29 | Asad Amir Pirzada, Chris McDonald, Amitava Datta |
Performance Comparison of Trust-Based Reactive Routing Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 5(6), pp. 695-710, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, network, Trust, protocol, ad hoc |
29 | Peter Briggs, Barry Smyth |
On the role of trust in collaborative Web search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Rev. ![In: Artif. Intell. Rev. 25(1-2), pp. 97-117, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Trust, User modelling, Collaborative Web search |
29 | Claudia Hess, Klaus Stein, Christoph Schlieder |
Trust-enhanced visibility for personalized document recommendations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 1865-1869, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
trust-enhanced document recommendations, two-layer architecture, recommender system, personalization |
29 | Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W. ElHajj |
TARP: trust-aware routing protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2006, Vancouver, British Columbia, Canada, July 3-6, 2006, pp. 135-140, 2006, ACM, 1-59593-306-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
aware routing, trust, encryption, power, ad hoc |
29 | Daniele Gorla, Matthew Hennessy, Vladimiro Sassone |
Inferring dynamic credentials for rôle-based trust management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPDP ![In: Proceedings of the 8th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, July 10-12, 2006, Venice, Italy, pp. 213-224, 2006, ACM, 1-59593-388-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
logic programming with negation, rôle-based access control, trust-management, inference systems |
29 | Marina Jirotka, Rob Procter, Mark Hartswood, Roger Slack, Andrew Simpson, Catelijne Coopmans, Chris Hinds, Alex Voss |
Collaboration and Trust in Healthcare Innovation: The eDiaMoND Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Support. Cooperative Work. ![In: Comput. Support. Cooperative Work. 14(4), pp. 369-398, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
breast-screening, collaboration, trust, grid, healthcare |
29 | Jordi Sabater, Carles Sierra |
Review on Computational Trust and Reputation Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Rev. ![In: Artif. Intell. Rev. 24(1), pp. 33-60, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
trust, reputation |
29 | Danfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough |
Visualization of Automated Trust Negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005, pp. 8, 2005, IEEE Computer Society, 0-7803-9477-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
interactive protocol visualization, Automated trust negotiation |
29 | Hany A. Samuel, Yasser H. Dakroury, Hussein I. Shahein |
Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 280-292, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Security, Peer-to-Peer Networks, Trust Management, Reputation Systems |
|
|