|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7373 occurrences of 2496 keywords
|
|
|
Results
Found 28405 publication records. Showing 28395 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
24 | Hao Ma 0001, Irwin King, Michael R. Lyu |
Learning to recommend with social trust ensemble. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: Proceedings of the 32nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2009, Boston, MA, USA, July 19-23, 2009, pp. 203-210, 2009, ACM, 978-1-60558-483-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
social trust ensemble, social network, recommender systems, matrix factorization |
24 | Supriya Singh, Clive Morley |
Young Australians' privacy, security and trust in internet banking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OZCHI ![In: Proceedings of the 21st Australasian Computer-Human Interaction Conference, OZCHI 2009: Open 24/7, Melbourne, Australia, November 23-27, 2009, pp. 121-128, 2009, ACM, 978-1-60558-854-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
generation X, generation Y, security, privacy, trust, Australia, internet banking |
24 | Yannis Stelios, Nikos Papayanoulas, Panagiotis Trakadas, Sotiris Maniatis, Helen-Catherine Leligou, Theodore B. Zahariadis |
A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOBILIGHT ![In: Mobile Lightweight Wireless Systems, First International ICST Conference, MOBILIGHT 2009, Athens, Greece, May 18-20, 2009, Revised Selected Papers, pp. 85-92, 2009, Springer, 978-3-642-03818-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Wireless sensor networks, trust management, secure routing |
24 | Waleed W. Smari, Jian Zhu, Patrice Clemente |
Trust and privacy in attribute based access control for collaboration environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 49-55, 2009, ACM, 978-1-60558-660-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, collaboration, access control, trust, attributes, collaboration environments |
24 | Reid Kerr, Robin Cohen |
Smart cheaters do prosper: defeating trust and reputation systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS (2) ![In: 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), Budapest, Hungary, May 10-15, 2009, Volume 2, pp. 993-1000, 2009, IFAAMAS, 978-0-9817381-7-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
electronic marketplaces, trust and reputation |
24 | Ji Ma 0001, Mehmet A. Orgun |
Formalising theories of trust for authentication protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 10(1), pp. 19-32, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Trust theory, Agents, Authentication protocols, Belief logic |
24 | Ralph Holz, Heiko Niedermayer, Peter Hauck, Georg Carle |
Trust-Rated Authentication for Domain-Structured Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 74-88, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Trust-Rating, Distributed Systems, Peer-to-Peer, Authentication, Protocols, PKI, Multi-Domain |
24 | Mariano Ceccato, Jasvir Nagra, Paolo Tonella |
Distributing Trust Verification to Increase Application Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: 16th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2008), 13-15 February 2008, Toulouse, France, pp. 604-610, 2008, IEEE Computer Society, 978-0-7695-3089-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
remote trust, smartcard, tamper resistant |
24 | Carlo Argiolas, Nicoletta Dessì, Maria Grazia Fugini |
Modeling Trust Relationships in Collaborative Engineering Projects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UNISCON ![In: Information Systems and e-Business Technologies, 2nd International United Information Systems Conference, UNISCON 2008, Klagenfurt, Austria, April 22-25, 2008, Proceedings, pp. 555-566, 2008, Springer, 978-3-540-78941-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
engineering projects, Security, Web services, trust, grid services |
24 | Patricia Victor, Chris Cornelis, Ankur Teredesai, Martine De Cock |
Whom should I trust?: the impact of key figures on cold start recommendations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 2014-2018, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
recommender system, trust network, cold start problem |
24 | Sruthi Bandhakavi, William H. Winsborough, Marianne Winslett |
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008, pp. 33-47, 2008, IEEE Computer Society, 978-0-7695-3182-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Lanugage Based Security, Information Flow, Trust Management |
24 | Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy S. El-Soudani |
A Survey on Trust and Reputation Schemes in Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 881-886, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, Ad hoc networks, trust, reputation |
24 | Leonardo de Oliveira, Carlos Maziero |
A Trust Model Applied to E-mail Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE ![In: Proceedings of the 11th IEEE International Conference on Computational Science and Engineering, CSE 2008, São Paulo, SP, Brazil, July 16-18, 2008, pp. 436-443, 2008, IEEE Computer Society, 978-0-7695-3193-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
distributed systems, trust management, e-mail |
24 | Eugen Staab, Volker Fusenig, Thomas Engel 0001 |
Towards Trust-Based Acquisition of Unverifiable Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIA ![In: Cooperative Information Agents XII, 12th International Workshop, CIA 2008, Prague, Czech Republic, September 10-12, 2008. Proceedings, pp. 41-54, 2008, Springer, 978-3-540-85833-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Information acquisition, trust |
24 | Tao Sun, Mieso K. Denko |
Performance Evaluation of Trust Management in Pervasive Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, GinoWan, Okinawa, Japan, March 25-28, 2008, pp. 386-394, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Performance Evaluation, Pervasive Computing, Trust Management |
24 | Holger Billhardt, Ramón Hermoso, Sascha Ossowski, Roberto Centeno |
Trust-based service provider selection in open environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 1375-1380, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
trust mechanisms, multiagent systems, service-oriented computing |
24 | Lars E. Olson 0001, Michael J. Rosulek, Marianne Winslett |
Harvesting credentials in trust negotiation as an honest-but-curious adversary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007, pp. 64-67, 2007, ACM, 978-1-59593-883-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, protocol, vulnerability, trust negotiation |
24 | Kenya Freeman Oduor, Christopher S. Campbell |
Deciding when to trust automation in a policy-based city management game: policity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHIMIT ![In: Proceedings of the 1st ACM Symposium on Computer Human Interaction for Management of Information Technology, CHIMIT 2007, Cambridge, Massachusetts, USA, March 30-31, 2007, pp. 2, 2007, ACM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
IT service delivery, policy-based interaction, services research, algorithms, reliability, trust, human factors, automation, productivity, information technology management, decision aids |
24 | Wei Zhang 0198, Yanchun Zhu |
A Trust-Based Model Using Learning FCM for Partner Selection in the Virtual Enterprises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, Third International Conference on Intelligent Computing, ICIC 2007, Qingdao, China, August 21-24, 2007, Proceedings, pp. 690-701, 2007, Springer, 978-3-540-74170-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Learning FCM, Trust, Virtual enterprise, Partner selection |
24 | David T. Nguyen, John F. Canny |
Multiview: improving trust in group video conferencing through spatial faithfulness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2007 Conference on Human Factors in Computing Systems, CHI 2007, San Jose, California, USA, April 28 - May 3, 2007, pp. 1465-1474, 2007, ACM, 978-1-59593-593-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
spatial faithfulness, CSCW, trust, CMC, video conferencing, eye contact, prisoner's dilemma, gaze awareness, social dilemmas |
24 | Mingjun Sun, Guosun Zeng, Lulai Yuan, Wei Wang 0033 |
A Trust-Oriented Heuristic Scheduling Algorithm for Grid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PaCT ![In: Parallel Computing Technologies, 9th International Conference, PaCT 2007, Pereslavl-Zalessky, Russia, September 3-7, 2007, Proceedings, pp. 608-614, 2007, Springer, 978-3-540-73939-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Sufferage algorithm, Grid computing, job scheduling, trust model |
24 | Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda |
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 3-7 September 2007, Regensburg, Germany, pp. 779-783, 2007, IEEE Computer Society, 0-7695-2932-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Threats and Attacks, Security, Trust, Mobile P2P |
24 | Chun-Chia Wang, Lawrence Y. Deng, Yung-Hui Chen |
A Petri Net-based Approach to Trust Development and Activity Understanding in Virtual University. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALT ![In: Proceedings of the 7th IEEE International Conference on Advanced Learning Technologies, ICALT 2007, Niigata, Japan, July 18-20, 2007, pp. 98-102, 2007, IEEE Computer Society, 978-0-7695-2916-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Scaffolding Theory, Trust Development, Activity Understanding, E-Learning, Virtual University |
24 | Tassos Dimitriou, Ghassan Karame, Ioannis T. Christou |
SuperTrust: a secure and efficient framework for handling trust in super-peer networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, PODC 2007, Portland, Oregon, USA, August 12-15, 2007, pp. 374-375, 2007, ACM, 978-1-59593-616-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, privacy, trust, anonymity, P2P, super-peer |
24 | Lan Nie, Baoning Wu, Brian D. Davison 0001 |
Winnowing wheat from the chaff: propagating trust to sift spam from the web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: SIGIR 2007: Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Amsterdam, The Netherlands, July 23-27, 2007, pp. 869-870, 2007, ACM, 978-1-59593-597-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
trust, authority, spam, web search engine |
24 | Yao Wang 0009, Julita Vassileva |
A Review on Trust and Reputation for Web Service Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), June 25-29, 2007, Toronto, Ontario, Canada, pp. 25, 2007, IEEE Computer Society, 0-7695-2881-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Trust, reputation, web service selection |
24 | Rodrigo Roman, M. Carmen Fernández Gago, Javier López 0001 |
Featuring trust and reputation management systems for constrained hardware devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autonomics ![In: Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, Autonomics 2007, 28-30 October 2007, Rome, Italy, pp. 6, 2007, ACM, 978-963-9799-09-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
sensor networks, trust management |
24 | Li Jin, Zhengding Lu |
ASITL: Adaptive Secure Interoperation Using Trust-Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 117-128, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Trust-level, Access Control, Secure Interoperation |
24 | Vincent C. Hu, Karen Scarfone, Serban I. Gavrila, David F. Ferraiolo |
A trust domain management schema for multiple grid environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infoscale ![In: Proceedings of the 2nf International Conference on Scalable Information Systems, Infoscale 2007, Suzhou, China, June 6-8, 2007, pp. 17, 2007, ACM, 978-1-59593-757-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
access control, grid, policy, trust management |
24 | Andreas Klenk, Frank Petri, Benoit Radier, Mikaël Salaün, Georg Carle |
Automated Trust Negotiation in Autonomic Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSOS ![In: Self-Organizing Systems, Second International Workshop, IWSOS 2007, The Lake District, UK, September 11-13, 2007, Proceedings, pp. 272-279, 2007, Springer, 978-3-540-74916-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
stateless automated trust negotiation, attribute-based access control |
24 | Steven Reece, Alex Rogers, Stephen J. Roberts, Nicholas R. Jennings |
Rumours and reputation: evaluating multi-dimensional trust within a decentralised reputation system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), Honolulu, Hawaii, USA, May 14-18, 2007, pp. 165, 2007, IFAAMAS, 978-81-904262-7-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multi-dimensional trust, rumour propogation, Dirichlet distribution |
24 | Yathiraj B. Udupi, Munindar P. Singh |
InterPol: a policy framework for managing trust and privacy in referral networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), Honolulu, Hawaii, USA, May 14-18, 2007, pp. 170, 2007, IFAAMAS, 978-81-904262-7-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, p2p, trust, policy, referrals |
24 | Colin English, Sotirios Terzis, Paddy Nixon |
Towards self-protecting ubiquitous systems: monitoring trust-based interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 10(1), pp. 50-54, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Interaction monitoring, Trust, Self-protection |
24 | William H. Winsborough, Ninghui Li |
Safety in automated trust negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 9(3), pp. 352-390, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Access control, safety, strategy, credentials, attribute-based access control, automated trust negotiation |
24 | Yuan Wang, Feng Xu 0007, Jian Lü 0001 |
Establishing recommendation trust relationships for internetwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 31(1), pp. 1-5, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
trust, recommendation, internetware |
24 | Jianshu Weng, Chunyan Miao, Angela Goh |
Improving collaborative filtering with trust-based metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 1860-1864, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
trust, collaborative filtering |
24 | Daniele Quercia, Manish Lad, Stephen Hailes, Licia Capra, Saleem Bhatti |
STRUDEL: supporting trust in the dynamic establishment of peering coalitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 1870-1874, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
distributed reputation systems, distributed trust models, mesh networks |
24 | Evangelos Kotsovinos, Aled Williams |
BambooTrust: practical scalable trust management for global public computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 1893-1897, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
honesty detection, peer-to-peer systems, trust management, incentives, reputation systems |
24 | Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch |
Traust: a trust negotiation-based authorization service for open systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 39-48, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
credentials, trust negotiation, attribute-based access control |
24 | Leila Takayama, Eser Kandogan |
Trust as an underlying factor of system administrator interface choice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, CHI 2006, Montréal, Québec, Canada, April 22-27, 2006, pp. 1391-1396, 2006, ACM, 978-1-59593-298-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
trust, graphical user interfaces, system administration, command-line interfaces |
24 | Jeff Polakow, Christian Skalka |
Specifying distributed trust management in LolliMon. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, PLAS 2006, Ottawa, Ontario, Canada, June 10, 2006, pp. 37-46, 2006, ACM, 1-59593-374-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
trust management logic, distributed authorization |
24 | Guangxue Yue, Fei Yu 0001, Yi-jun Chen, Ronghui Wu, Ji-yao An, Renfa Li |
Access Control Model for P2P File-Sharing Systems Based on Trust and Recommendation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SKG ![In: 2006 International Conference on Semantics, Knowledge and Grid (SKG 2006), 1-3 November 2006, Guilin, China, pp. 74, 2006, IEEE Computer Society, 0-7695-2673-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Access Control, Peer-to-Peer networks, Contribution, Trust and reputation |
24 | Nabil R. Adam, Ahmet Kozanoglu, Aabhas V. Paliwal, Mahmoud Youssef |
Mutual trust in open environment for cascaded web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006, pp. 107-108, 2006, ACM, 1-59593-546-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cascading web services, security, trust, auditing |
24 | Georgios Pitsilis, Lindsay F. Marshall |
A Trust-enabled P2P Recommender System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 15th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2006), 26-28 June 2006, Manchester, United Kingdom, pp. 59-64, 2006, IEEE Computer Society, 0-7695-2623-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Recommender Systems, Trust Modelling, P2P systems, Subjective Logic |
24 | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia |
Point-Based Trust: Define How Much Privacy Is Worth. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 190-209, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
private multi-party computation, Trust management, knapsack problem |
24 | Thomas Repantis, Vana Kalogeraki |
Decentralized trust management for ad-hoc peer-to-peer networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MPAC ![In: Proceedings of the 4th International Workshop on Middleware for Pervasive and Ad-hoc Computing (MPAC 2006), held at the ACM/IFIP/USENIX 7th International Middleware Conference, November 27 - December 1, 2006, Melbourne, Australia, pp. 6, 2006, ACM, 1-59593-421-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
trust, reputation, peer-to-peer networks, ad-hoc, decentralized, unstructured |
24 | Carles Sierra, John K. Debenham |
Trust and honour in information-based agency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), Hakodate, Japan, May 8-12, 2006, pp. 1225-1232, 2006, ACM, 1-59593-303-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
trust, multiagent systems |
24 | Nicholas I. M. Gould, Dominique Orban, Annick Sartenaer, Philippe L. Toint |
Sensitivity of trust-region algorithms to their parameters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
4OR ![In: 4OR 3(3), pp. 227-241, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Unconstrained programming, algorithmic parameters, trust-region methods |
24 | Zaid Dwaikat, Francesco Parisi-Presicce |
Risky trust: risk-based analysis of software systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(4), pp. 1-7, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
trust, risk analysis, distrust |
24 | Ninghui Li, John C. Mitchell, William H. Winsborough |
Beyond proof-of-compliance: security analysis in trust management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 52(3), pp. 474-514, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Access control, logic programs, trust management, safety analysis, distributed system security |
24 | Rafae Bhatti, Elisa Bertino, Arif Ghafoor |
A Trust-Based Context-Aware Access Control Model for Web-Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Parallel Databases ![In: Distributed Parallel Databases 18(1), pp. 83-105, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Web services, XML, Role-Based Access Control, Trust Management |
24 | Jiangtao Li 0001, Ninghui Li, William H. Winsborough |
Automated trust negotiation using cryptographic credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 46-57, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, access control, automated trust negotiation, digital credentials |
24 | John O'Donovan, Barry Smyth |
Trust in recommender systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IUI ![In: Proceedings of the 10th International Conference on Intelligent User Interfaces, IUI 2005, San Diego, California, USA, January 10-13, 2005, pp. 167-174, 2005, ACM, 1-58113-894-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
profile similarity, trust, recommender systems, collaborative filtering, reputation |
24 | Jeremy J. Carroll, Christian Bizer, Patrick J. Hayes, Patrick Stickler |
Named graphs, provenance and trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 14th international conference on World Wide Web, WWW 2005, Chiba, Japan, May 10-14, 2005, pp. 613-622, 2005, ACM, 1-59593-046-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
semantic Web, trust, RDF, provenance |
24 | Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travis Leithead, Kent E. Seamons |
Adaptive trust negotiation and access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 139-146, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
access control, denial of service, adaptive systems, trust negotiation |
24 | Sandro Etalle, William H. Winsborough |
Integrity constraints in trust management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 1-10, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
access control, integrity, trust management, distributed system security |
24 | Stavros Antifakos, Nicky Kern, Bernt Schiele, Adrian Schwaninger |
Towards improving trust in context-aware systems by displaying system confidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile HCI ![In: Proceedings of the 7th Conference on Human-Computer Interaction with Mobile Devices and Services, Mobile HCI 2005, 2005, Salzburg, Austria, September 19-22, 2005, pp. 9-14, 2005, ACM, 1-59593-089-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
system confidence, trust, uncertainty, context-aware systems |
24 | Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas |
A quantitative trust establishment framework for reliable data packet delivery in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005, pp. 1-10, 2005, ACM, 1-59593-227-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
routing, mobile ad hoc networks, trust establishment |
24 | Gang Yin, Huaimin Wang, Tao Liu, Dian-xi Shi, Ming-Feng Chen |
Distributed Access Control for Grid Environments Using Trust Management Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Parallel and Distributed Processing and Applications - ISPA 2005 Workshops, ISPA 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings, pp. 485-495, 2005, Springer, 3-540-29770-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Access Control, Grid, Trust Management, VO |
24 | E. Michael Gertz, Philip E. Gill |
A primal-dual trust region algorithm for nonlinear optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Math. Program. ![In: Math. Program. 100(1), pp. 49-94, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
interior methods, nonlinear optimization, trust-region methods, primal-dual methods, constrained minimization |
24 | Thomas B. Quillinan, Brian C. Clayton, Simon N. Foley |
GridAdmin: Decentralising Grid Administration Using Trust Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPDC/HeteroPar ![In: 3rd International Symposium on Parallel and Distributed Computing (ISPDC 2004), 3rd International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogenous Networks (HeteroPar 2004), 5-7 July 2004, Cork, Ireland, pp. 184-192, 2004, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Decentralised Administration, Security, Grid, Trust Management |
24 | Günter Gans, Matthias Jarke, Stefanie Kethers, Gerhard Lakemeyer |
Continuous requirements management for organisation networks: a (dis)trust-based approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Requir. Eng. ![In: Requir. Eng. 8(1), pp. 4-22, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
ConGolog, Inter-organisational systems, Viewpoint resolution, Trust, Requirements engineering, Conceptual modelling, Metadata management, Telos |
24 | Nancy A. Van House |
Trust and epistemic communities in biodiversity data sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCDL ![In: ACM/IEEE Joint Conference on Digital Libraries, JCDL 2002, Portland, Oregon, USA, June 14-18, 2002, Proceedings, pp. 231-239, 2002, ACM, 1-58113-513-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
epistemic cultures, trust, communities of practice, users, credibility, biodiversity |
24 | Ulrike Steinbrück, Heike Schaumburg, Sabrina Duda, Thomas Krüger |
A picture says more than a thousand words: photographs as trust builders in e-commerce websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended abstracts of the 2002 Conference on Human Factors in Computing Systems, CHI 2002, Minneapolis, Minnesota, USA, April 20-25, 2002, pp. 748-749, 2002, ACM, 1-58113-454-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
b2c relationship, re-embedding, trust, e-commerce, trustworthiness, e-banking |
24 | Zoran Despotovic, Karl Aberer, Manfred Hauswirth |
Trust-Aware Cooperation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 22nd International Conference on Distributed Computing Systems, Workshops (ICDCSW '02) July 2-5, 2002, Vienna, Austria, Proceedings, pp. 408-409, 2002, IEEE Computer Society, 0-7695-1588-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Reputation Reporting, Safe Exchange, Trust Management |
24 | Ninghui Li, John C. Mitchell, William H. Winsborough |
Design of a Role-Based Trust-Management Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2002 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002, pp. 114-130, 2002, IEEE Computer Society, 0-7695-1543-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
access control, role-based access control, trust management, distributed system security, attribute-based access control, attribute certificates |
24 | Farag Azzedin, Muthucumaru Maheswaran |
Integrating Trust into Grid Resource Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP ![In: 31st International Conference on Parallel Processing (ICPP 2002), 20-23 August 2002, Vancouver, BC, Canada, pp. 47-54, 2002, IEEE Computer Society, 0-7695-1677-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
security, Grid computing, trust, resource management system |
24 | Dongjun Wu, Yanjun Sun |
The Emergence of Trust in Multi-Agent Bidding: A Computational Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 34th Annual Hawaii International Conference on System Sciences (HICSS-34), January 3-6, 2001, Maui, Hawaii, USA, 2001, IEEE Computer Society, 0-7695-0981-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Disequilibrium, Multi-Agent Systems, Trust, Game Theory, Coordination, Reinforcement Learning, Bidding |
24 | Jay Schneider, Gerd Kortuem, Joe Jager, Stephen Fickas, Zary Segall |
Disseminating Trust Information in Wearable Communities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 4(4), pp. 245-248, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Social networks, Trust, Wearable computing, Social interaction |
23 | David W. Chadwick, Stijn F. Lievens, Jerry den Hartog, Andreas Pashalidis, Joseph Alhadeff |
My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE CLOUD ![In: IEEE International Conference on Cloud Computing, CLOUD 2011, Washington, DC, USA, 4-9 July, 2011, pp. 752-753, 2011, IEEE Computer Society, 978-1-4577-0836-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Security, Privacy, Trust, Reputation, Audit, Trust Negotiation, Sticky Policies |
23 | Cai Biao, Zhishu Li, Zhen Luo |
Threshold Secret Sharing Based Trust Security in Structured P2P Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IITSI ![In: Third International Symposium on Intelligent Information Technology and Security Informatics, IITSI 2010, Jinggangshan, China, April 2-4, 2010, pp. 320-323, 2010, IEEE Computer Society, 978-0-7695-4020-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
trust security, structured trust topology, P2P network, threshold secret sharing |
23 | Zainab M. Aljazzaf, Mark Perry 0001, Miriam A. M. Capretz |
Trust in Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERVICES ![In: 6th World Congress on Services, SERVICES 2010, Miami, Florida, USA, July 5-10, 2010, pp. 189-190, 2010, IEEE Computer Society, 978-0-7695-4129-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Trust definition, trust principles, Web Services |
23 | Tanveer A. Zia, Md Zahidul Islam 0001 |
Communal Reputation and Individual Trust (CRIT) in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland, pp. 347-352, 2010, IEEE Computer Society, 978-0-7695-3965-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Communal reputation, reputation-based trust, trust management, sensor networks security |
23 | Poonam Gera, Kumkum Garg, Manoj Misra |
Trust Based Multi Path DSR Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland, pp. 204-209, 2010, IEEE Computer Society, 978-0-7695-3965-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Misbehaving nodes, Dynamic ource routing, Path trust, Trust |
23 | Dong Zhong, Yian Zhu, Wanbao Lei, Jianhua Gu, Yunlan Wang |
Multilevel Trust Management Framework for Pervasive Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Third International Conference on Knowledge Discovery and Data Mining, WKDD 2010, Phuket, Thailand, 9-10 January 2010, pp. 159-162, 2010, IEEE Computer Society, 978-0-7695-3923-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
trust evolution, multilevel trust, pervasive computing |
23 | Shigeichiro Yamasaki |
A Dynamic Trust Estimation Method for 'Persona' from the Human Relationship of Social Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: Tenth Annual International Symposium on Applications and the Internet, SAINT 2010, Seoul, Korea, 19-23 July, 2010, Proceedings, pp. 300-303, 2010, IEEE Computer Society, 978-1-4244-7526-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Trust estimation, Google Page Rank, User centric Authorization, Personalized mashup, Privacy, Trust, Persona, Twitter, Social Web, OpenID, OAuth |
23 | Raihana Ferdous, Vallipuram Muthukkumarasamy, Abdul Sattar 0001 |
Trust Formalization in Mobile Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, Perth, Australia, 20-13 April 2010, pp. 351-356, 2010, IEEE Computer Society, 978-0-7695-4019-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
trust-formalization, security, routing, mobile ad hoc networks, trust |
23 | Zhenquan Qin, Lei Wang 0005, Mingchu Li, Weifeng Sun |
An Efficient Trust Mechanism in P2P Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings, pp. 731-734, 2010, IEEE Computer Society, 978-1-4244-8378-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Tw-Trust, time-window based, Trust model |
23 | Guanfeng Liu 0001, Yan Wang 0002, Mehmet A. Orgun, Ee-Peng Lim |
A Heuristic Algorithm for Trust-Oriented Service Provider Selection in Complex Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2010 IEEE International Conference on Services Computing, SCC 2010, Miami, Florida, USA, July 5-10, 2010, pp. 130-137, 2010, IEEE Computer Society, 978-0-7695-4126-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
social network, trust, trust path |
23 | Xinjie Guan, Xili Wan, Junzhou Luo |
A Maximum Entropy Based Multi-dimensional Trust Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC Workshops ![In: IFIP International Conference on Network and Parallel Computing, NPC 2008, Shanghai, China, October 18-21, 2008, Workshop Proceedings, pp. 226-232, 2008, IEEE Computer Society, 978-0-7695-3354-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Multi-dimensional Trust, Computational Trust, Distributed Computing, Maximum Entropy |
23 | Bo Chen, Guosun Zeng, Li Li 0008 |
Attribute Delegation Authorization Based on Subjective Trust Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC Workshops ![In: IFIP International Conference on Network and Parallel Computing, NPC 2008, Shanghai, China, October 18-21, 2008, Workshop Proceedings, pp. 42-49, 2008, IEEE Computer Society, 978-0-7695-3354-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
subjective trust, attribute based delegation authorization, trusted role, trust control, logic system |
23 | Stephen Marsh 0001, Pamela Briggs, Waleed Wagealla |
Considering trust in ambient societies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended abstracts of the 2004 Conference on Human Factors in Computing Systems, CHI 2004, Vienna, Austria, April 24 - 29, 2004, pp. 1707-1708, 2004, ACM, 1-58113-703-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
ambient trust, clarity of explanation, ubiquitous computing, trust, transitivity |
23 | Yanhui Ding, Qingzhong Li, Feifei Li |
A Novel Method for Evaluating Trustworthiness between Strangers in Large, Dynamic Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, Moscow, Russia, 23-25 January 2009, pp. 280-283, 2009, IEEE Computer Society, 978-0-7695-3543-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Yan Wang 0002, Kwei-Jay Lin |
Reputation-Oriented Trustworthy Computing in E-Commerce Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 12(4), pp. 55-59, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Oluwafemi O. Ajayi, Richard O. Sinnott, Anthony Stell |
Towards Decentralised Security Policies for e-Health Collaborations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 165-172, 2008, IEEE Computer Society, 978-0-7695-3329-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Golnaz Elahi, Zeev Lieber, Eric S. K. Yu |
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 661-666, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Vincenza Carchiolo, Alessandro Longheu, Michele Malgeri, Giuseppe Mangioni |
Trusting Evaluation by Social Reputation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDC ![In: Intelligent Distributed Computing, Systems and Applications, Proceedings of the 2nd International Symposium on Intelligent Distributed Computing - IDC 2008, Catania, Italy, 2008, pp. 75-84, 2008, Springer, 978-3-540-85256-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Jianli Hu, Quanyuan Wu, Bin Zhou 0004 |
Distributed and Effective Reputation Mechanism in P2P Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 110-115, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Hongyan Mao, Yixiang Chen |
Research of a Multi-dimension Measurement Trusting Model Based on Markov Chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC (2) ![In: 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops, pp. 71-76, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Tatyana Ryutov |
A Socio-cognitive Approach to Modeling Policies in Open Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 29-38, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Ji Gao, John D. Lee |
Extending the decision field theory to model operators' reliance on automation in supervisory control situations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part A ![In: IEEE Trans. Syst. Man Cybern. Part A 36(5), pp. 943-959, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Pan Dong, Peidong Zhu, Xicheng Lu |
Brief Announcement: A Synthetic Public Key Management Scheme for Large-Scale MANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSS ![In: Stabilization, Safety, and Security of Distributed Systems, 8th International Symposium, SSS 2006, Dallas, TX, USA, November 17-19, 2006, Proceedings, pp. 570-571, 2006, Springer, 978-3-540-49018-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Larry L. Constantine |
Trusted Interaction: User Control and System Responsibilities in Interaction Design for Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAiSE ![In: Advanced Information Systems Engineering, 18th International Conference, CAiSE 2006, Luxembourg, Luxembourg, June 5-9, 2006, Proceedings, pp. 20-30, 2006, Springer, 3-540-34652-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Huirong Tian, Shihong Zou, Wendong Wang, Shiduan Cheng |
A Group Based Reputation System for P2P Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 342-351, 2006, Springer, 3-540-38619-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine |
Reducing the Dependence of SPKI/SDSI on PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, pp. 156-173, 2006, Springer, 3-540-44601-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | John Marchesini, Sean W. Smith |
Modeling Public Key Infrastructures in the Real World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 118-134, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone |
Modeling Security Requirements Through Ownership, Permission and Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RE ![In: 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August - 2 September 2005, Paris, France, pp. 167-176, 2005, IEEE Computer Society, 0-7695-2425-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Anurag Garg, Roberto Battiti, Gianni Costanzi |
Dynamic Self-management of Autonomic Systems: The Reputation, Quality and Credibility (RQC) Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAC ![In: Autonomic Communication, First International IFIP Workshop, WAC 2004, Berlin, Germany, October 18-19, 2004, Revised Selected Papers, pp. 165-178, 2004, Springer, 3-540-27417-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum |
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers, pp. 213-220, 2004, Springer, 3-540-40925-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Won Shik Na, Jeom Goo Kim, Intae Ryoo |
Perimeter Defence Policy Model of Cascade MPLS VPN Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 1026-1034, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
|
|