|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7373 occurrences of 2496 keywords
|
|
|
Results
Found 28405 publication records. Showing 28395 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
24 | Hao Ma 0001, Irwin King, Michael R. Lyu |
Learning to recommend with social trust ensemble. |
SIGIR |
2009 |
DBLP DOI BibTeX RDF |
social trust ensemble, social network, recommender systems, matrix factorization |
24 | Supriya Singh, Clive Morley |
Young Australians' privacy, security and trust in internet banking. |
OZCHI |
2009 |
DBLP DOI BibTeX RDF |
generation X, generation Y, security, privacy, trust, Australia, internet banking |
24 | Yannis Stelios, Nikos Papayanoulas, Panagiotis Trakadas, Sotiris Maniatis, Helen-Catherine Leligou, Theodore B. Zahariadis |
A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks. |
MOBILIGHT |
2009 |
DBLP DOI BibTeX RDF |
Wireless sensor networks, trust management, secure routing |
24 | Waleed W. Smari, Jian Zhu, Patrice Clemente |
Trust and privacy in attribute based access control for collaboration environments. |
iiWAS |
2009 |
DBLP DOI BibTeX RDF |
privacy, collaboration, access control, trust, attributes, collaboration environments |
24 | Reid Kerr, Robin Cohen |
Smart cheaters do prosper: defeating trust and reputation systems. |
AAMAS (2) |
2009 |
DBLP BibTeX RDF |
electronic marketplaces, trust and reputation |
24 | Ji Ma 0001, Mehmet A. Orgun |
Formalising theories of trust for authentication protocols. |
Inf. Syst. Frontiers |
2008 |
DBLP DOI BibTeX RDF |
Trust theory, Agents, Authentication protocols, Belief logic |
24 | Ralph Holz, Heiko Niedermayer, Peter Hauck, Georg Carle |
Trust-Rated Authentication for Domain-Structured Distributed Systems. |
EuroPKI |
2008 |
DBLP DOI BibTeX RDF |
Trust-Rating, Distributed Systems, Peer-to-Peer, Authentication, Protocols, PKI, Multi-Domain |
24 | Mariano Ceccato, Jasvir Nagra, Paolo Tonella |
Distributing Trust Verification to Increase Application Performance. |
PDP |
2008 |
DBLP DOI BibTeX RDF |
remote trust, smartcard, tamper resistant |
24 | Carlo Argiolas, Nicoletta Dessì, Maria Grazia Fugini |
Modeling Trust Relationships in Collaborative Engineering Projects. |
UNISCON |
2008 |
DBLP DOI BibTeX RDF |
engineering projects, Security, Web services, trust, grid services |
24 | Patricia Victor, Chris Cornelis, Ankur Teredesai, Martine De Cock |
Whom should I trust?: the impact of key figures on cold start recommendations. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
recommender system, trust network, cold start problem |
24 | Sruthi Bandhakavi, William H. Winsborough, Marianne Winslett |
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages. |
CSF |
2008 |
DBLP DOI BibTeX RDF |
Lanugage Based Security, Information Flow, Trust Management |
24 | Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy S. El-Soudani |
A Survey on Trust and Reputation Schemes in Ad Hoc Networks. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
security, Ad hoc networks, trust, reputation |
24 | Leonardo de Oliveira, Carlos Maziero |
A Trust Model Applied to E-mail Servers. |
CSE |
2008 |
DBLP DOI BibTeX RDF |
distributed systems, trust management, e-mail |
24 | Eugen Staab, Volker Fusenig, Thomas Engel 0001 |
Towards Trust-Based Acquisition of Unverifiable Information. |
CIA |
2008 |
DBLP DOI BibTeX RDF |
Information acquisition, trust |
24 | Tao Sun, Mieso K. Denko |
Performance Evaluation of Trust Management in Pervasive Computing. |
AINA |
2008 |
DBLP DOI BibTeX RDF |
Performance Evaluation, Pervasive Computing, Trust Management |
24 | Holger Billhardt, Ramón Hermoso, Sascha Ossowski, Roberto Centeno |
Trust-based service provider selection in open environments. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
trust mechanisms, multiagent systems, service-oriented computing |
24 | Lars E. Olson 0001, Michael J. Rosulek, Marianne Winslett |
Harvesting credentials in trust negotiation as an honest-but-curious adversary. |
WPES |
2007 |
DBLP DOI BibTeX RDF |
privacy, protocol, vulnerability, trust negotiation |
24 | Kenya Freeman Oduor, Christopher S. Campbell |
Deciding when to trust automation in a policy-based city management game: policity. |
CHIMIT |
2007 |
DBLP DOI BibTeX RDF |
IT service delivery, policy-based interaction, services research, algorithms, reliability, trust, human factors, automation, productivity, information technology management, decision aids |
24 | Wei Zhang 0198, Yanchun Zhu |
A Trust-Based Model Using Learning FCM for Partner Selection in the Virtual Enterprises. |
ICIC (1) |
2007 |
DBLP DOI BibTeX RDF |
Learning FCM, Trust, Virtual enterprise, Partner selection |
24 | David T. Nguyen, John F. Canny |
Multiview: improving trust in group video conferencing through spatial faithfulness. |
CHI |
2007 |
DBLP DOI BibTeX RDF |
spatial faithfulness, CSCW, trust, CMC, video conferencing, eye contact, prisoner's dilemma, gaze awareness, social dilemmas |
24 | Mingjun Sun, Guosun Zeng, Lulai Yuan, Wei Wang 0033 |
A Trust-Oriented Heuristic Scheduling Algorithm for Grid Computing. |
PaCT |
2007 |
DBLP DOI BibTeX RDF |
Sufferage algorithm, Grid computing, job scheduling, trust model |
24 | Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda |
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security. |
DEXA Workshops |
2007 |
DBLP DOI BibTeX RDF |
Threats and Attacks, Security, Trust, Mobile P2P |
24 | Chun-Chia Wang, Lawrence Y. Deng, Yung-Hui Chen |
A Petri Net-based Approach to Trust Development and Activity Understanding in Virtual University. |
ICALT |
2007 |
DBLP DOI BibTeX RDF |
Scaffolding Theory, Trust Development, Activity Understanding, E-Learning, Virtual University |
24 | Tassos Dimitriou, Ghassan Karame, Ioannis T. Christou |
SuperTrust: a secure and efficient framework for handling trust in super-peer networks. |
PODC |
2007 |
DBLP DOI BibTeX RDF |
security, privacy, trust, anonymity, P2P, super-peer |
24 | Lan Nie, Baoning Wu, Brian D. Davison 0001 |
Winnowing wheat from the chaff: propagating trust to sift spam from the web. |
SIGIR |
2007 |
DBLP DOI BibTeX RDF |
trust, authority, spam, web search engine |
24 | Yao Wang 0009, Julita Vassileva |
A Review on Trust and Reputation for Web Service Selection. |
ICDCS Workshops |
2007 |
DBLP DOI BibTeX RDF |
Trust, reputation, web service selection |
24 | Rodrigo Roman, M. Carmen Fernández Gago, Javier López 0001 |
Featuring trust and reputation management systems for constrained hardware devices. |
Autonomics |
2007 |
DBLP DOI BibTeX RDF |
sensor networks, trust management |
24 | Li Jin, Zhengding Lu |
ASITL: Adaptive Secure Interoperation Using Trust-Level. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Trust-level, Access Control, Secure Interoperation |
24 | Vincent C. Hu, Karen Scarfone, Serban I. Gavrila, David F. Ferraiolo |
A trust domain management schema for multiple grid environments. |
Infoscale |
2007 |
DBLP DOI BibTeX RDF |
access control, grid, policy, trust management |
24 | Andreas Klenk, Frank Petri, Benoit Radier, Mikaël Salaün, Georg Carle |
Automated Trust Negotiation in Autonomic Environments. |
IWSOS |
2007 |
DBLP DOI BibTeX RDF |
stateless automated trust negotiation, attribute-based access control |
24 | Steven Reece, Alex Rogers, Stephen J. Roberts, Nicholas R. Jennings |
Rumours and reputation: evaluating multi-dimensional trust within a decentralised reputation system. |
AAMAS |
2007 |
DBLP DOI BibTeX RDF |
multi-dimensional trust, rumour propogation, Dirichlet distribution |
24 | Yathiraj B. Udupi, Munindar P. Singh |
InterPol: a policy framework for managing trust and privacy in referral networks. |
AAMAS |
2007 |
DBLP DOI BibTeX RDF |
privacy, p2p, trust, policy, referrals |
24 | Colin English, Sotirios Terzis, Paddy Nixon |
Towards self-protecting ubiquitous systems: monitoring trust-based interactions. |
Pers. Ubiquitous Comput. |
2006 |
DBLP DOI BibTeX RDF |
Interaction monitoring, Trust, Self-protection |
24 | William H. Winsborough, Ninghui Li |
Safety in automated trust negotiation. |
ACM Trans. Inf. Syst. Secur. |
2006 |
DBLP DOI BibTeX RDF |
Access control, safety, strategy, credentials, attribute-based access control, automated trust negotiation |
24 | Yuan Wang, Feng Xu 0007, Jian Lü 0001 |
Establishing recommendation trust relationships for internetwares. |
ACM SIGSOFT Softw. Eng. Notes |
2006 |
DBLP DOI BibTeX RDF |
trust, recommendation, internetware |
24 | Jianshu Weng, Chunyan Miao, Angela Goh |
Improving collaborative filtering with trust-based metrics. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
trust, collaborative filtering |
24 | Daniele Quercia, Manish Lad, Stephen Hailes, Licia Capra, Saleem Bhatti |
STRUDEL: supporting trust in the dynamic establishment of peering coalitions. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
distributed reputation systems, distributed trust models, mesh networks |
24 | Evangelos Kotsovinos, Aled Williams |
BambooTrust: practical scalable trust management for global public computing. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
honesty detection, peer-to-peer systems, trust management, incentives, reputation systems |
24 | Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch |
Traust: a trust negotiation-based authorization service for open systems. |
SACMAT |
2006 |
DBLP DOI BibTeX RDF |
credentials, trust negotiation, attribute-based access control |
24 | Leila Takayama, Eser Kandogan |
Trust as an underlying factor of system administrator interface choice. |
CHI Extended Abstracts |
2006 |
DBLP DOI BibTeX RDF |
trust, graphical user interfaces, system administration, command-line interfaces |
24 | Jeff Polakow, Christian Skalka |
Specifying distributed trust management in LolliMon. |
PLAS |
2006 |
DBLP DOI BibTeX RDF |
trust management logic, distributed authorization |
24 | Guangxue Yue, Fei Yu 0001, Yi-jun Chen, Ronghui Wu, Ji-yao An, Renfa Li |
Access Control Model for P2P File-Sharing Systems Based on Trust and Recommendation. |
SKG |
2006 |
DBLP DOI BibTeX RDF |
Access Control, Peer-to-Peer networks, Contribution, Trust and reputation |
24 | Nabil R. Adam, Ahmet Kozanoglu, Aabhas V. Paliwal, Mahmoud Youssef |
Mutual trust in open environment for cascaded web services. |
SWS |
2006 |
DBLP DOI BibTeX RDF |
cascading web services, security, trust, auditing |
24 | Georgios Pitsilis, Lindsay F. Marshall |
A Trust-enabled P2P Recommender System. |
WETICE |
2006 |
DBLP DOI BibTeX RDF |
Recommender Systems, Trust Modelling, P2P systems, Subjective Logic |
24 | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia |
Point-Based Trust: Define How Much Privacy Is Worth. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
private multi-party computation, Trust management, knapsack problem |
24 | Thomas Repantis, Vana Kalogeraki |
Decentralized trust management for ad-hoc peer-to-peer networks. |
MPAC |
2006 |
DBLP DOI BibTeX RDF |
trust, reputation, peer-to-peer networks, ad-hoc, decentralized, unstructured |
24 | Carles Sierra, John K. Debenham |
Trust and honour in information-based agency. |
AAMAS |
2006 |
DBLP DOI BibTeX RDF |
trust, multiagent systems |
24 | Nicholas I. M. Gould, Dominique Orban, Annick Sartenaer, Philippe L. Toint |
Sensitivity of trust-region algorithms to their parameters. |
4OR |
2005 |
DBLP DOI BibTeX RDF |
Unconstrained programming, algorithmic parameters, trust-region methods |
24 | Zaid Dwaikat, Francesco Parisi-Presicce |
Risky trust: risk-based analysis of software systems. |
ACM SIGSOFT Softw. Eng. Notes |
2005 |
DBLP DOI BibTeX RDF |
trust, risk analysis, distrust |
24 | Ninghui Li, John C. Mitchell, William H. Winsborough |
Beyond proof-of-compliance: security analysis in trust management. |
J. ACM |
2005 |
DBLP DOI BibTeX RDF |
Access control, logic programs, trust management, safety analysis, distributed system security |
24 | Rafae Bhatti, Elisa Bertino, Arif Ghafoor |
A Trust-Based Context-Aware Access Control Model for Web-Services. |
Distributed Parallel Databases |
2005 |
DBLP DOI BibTeX RDF |
Web services, XML, Role-Based Access Control, Trust Management |
24 | Jiangtao Li 0001, Ninghui Li, William H. Winsborough |
Automated trust negotiation using cryptographic credentials. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
privacy, access control, automated trust negotiation, digital credentials |
24 | John O'Donovan, Barry Smyth |
Trust in recommender systems. |
IUI |
2005 |
DBLP DOI BibTeX RDF |
profile similarity, trust, recommender systems, collaborative filtering, reputation |
24 | Jeremy J. Carroll, Christian Bizer, Patrick J. Hayes, Patrick Stickler |
Named graphs, provenance and trust. |
WWW |
2005 |
DBLP DOI BibTeX RDF |
semantic Web, trust, RDF, provenance |
24 | Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travis Leithead, Kent E. Seamons |
Adaptive trust negotiation and access control. |
SACMAT |
2005 |
DBLP DOI BibTeX RDF |
access control, denial of service, adaptive systems, trust negotiation |
24 | Sandro Etalle, William H. Winsborough |
Integrity constraints in trust management. |
SACMAT |
2005 |
DBLP DOI BibTeX RDF |
access control, integrity, trust management, distributed system security |
24 | Stavros Antifakos, Nicky Kern, Bernt Schiele, Adrian Schwaninger |
Towards improving trust in context-aware systems by displaying system confidence. |
Mobile HCI |
2005 |
DBLP DOI BibTeX RDF |
system confidence, trust, uncertainty, context-aware systems |
24 | Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas |
A quantitative trust establishment framework for reliable data packet delivery in MANETs. |
SASN |
2005 |
DBLP DOI BibTeX RDF |
routing, mobile ad hoc networks, trust establishment |
24 | Gang Yin, Huaimin Wang, Tao Liu, Dian-xi Shi, Ming-Feng Chen |
Distributed Access Control for Grid Environments Using Trust Management Approach. |
ISPA Workshops |
2005 |
DBLP DOI BibTeX RDF |
Access Control, Grid, Trust Management, VO |
24 | E. Michael Gertz, Philip E. Gill |
A primal-dual trust region algorithm for nonlinear optimization. |
Math. Program. |
2004 |
DBLP DOI BibTeX RDF |
interior methods, nonlinear optimization, trust-region methods, primal-dual methods, constrained minimization |
24 | Thomas B. Quillinan, Brian C. Clayton, Simon N. Foley |
GridAdmin: Decentralising Grid Administration Using Trust Management. |
ISPDC/HeteroPar |
2004 |
DBLP DOI BibTeX RDF |
Decentralised Administration, Security, Grid, Trust Management |
24 | Günter Gans, Matthias Jarke, Stefanie Kethers, Gerhard Lakemeyer |
Continuous requirements management for organisation networks: a (dis)trust-based approach. |
Requir. Eng. |
2003 |
DBLP DOI BibTeX RDF |
ConGolog, Inter-organisational systems, Viewpoint resolution, Trust, Requirements engineering, Conceptual modelling, Metadata management, Telos |
24 | Nancy A. Van House |
Trust and epistemic communities in biodiversity data sharing. |
JCDL |
2002 |
DBLP DOI BibTeX RDF |
epistemic cultures, trust, communities of practice, users, credibility, biodiversity |
24 | Ulrike Steinbrück, Heike Schaumburg, Sabrina Duda, Thomas Krüger |
A picture says more than a thousand words: photographs as trust builders in e-commerce websites. |
CHI Extended Abstracts |
2002 |
DBLP DOI BibTeX RDF |
b2c relationship, re-embedding, trust, e-commerce, trustworthiness, e-banking |
24 | Zoran Despotovic, Karl Aberer, Manfred Hauswirth |
Trust-Aware Cooperation. |
ICDCS Workshops |
2002 |
DBLP DOI BibTeX RDF |
Reputation Reporting, Safe Exchange, Trust Management |
24 | Ninghui Li, John C. Mitchell, William H. Winsborough |
Design of a Role-Based Trust-Management Framework. |
S&P |
2002 |
DBLP DOI BibTeX RDF |
access control, role-based access control, trust management, distributed system security, attribute-based access control, attribute certificates |
24 | Farag Azzedin, Muthucumaru Maheswaran |
Integrating Trust into Grid Resource Management Systems. |
ICPP |
2002 |
DBLP DOI BibTeX RDF |
security, Grid computing, trust, resource management system |
24 | Dongjun Wu, Yanjun Sun |
The Emergence of Trust in Multi-Agent Bidding: A Computational Approach. |
HICSS |
2001 |
DBLP DOI BibTeX RDF |
Disequilibrium, Multi-Agent Systems, Trust, Game Theory, Coordination, Reinforcement Learning, Bidding |
24 | Jay Schneider, Gerd Kortuem, Joe Jager, Stephen Fickas, Zary Segall |
Disseminating Trust Information in Wearable Communities. |
Pers. Ubiquitous Comput. |
2000 |
DBLP DOI BibTeX RDF |
Social networks, Trust, Wearable computing, Social interaction |
23 | David W. Chadwick, Stijn F. Lievens, Jerry den Hartog, Andreas Pashalidis, Joseph Alhadeff |
My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud. |
IEEE CLOUD |
2011 |
DBLP DOI BibTeX RDF |
Security, Privacy, Trust, Reputation, Audit, Trust Negotiation, Sticky Policies |
23 | Cai Biao, Zhishu Li, Zhen Luo |
Threshold Secret Sharing Based Trust Security in Structured P2P Network. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
trust security, structured trust topology, P2P network, threshold secret sharing |
23 | Zainab M. Aljazzaf, Mark Perry 0001, Miriam A. M. Capretz |
Trust in Web Services. |
SERVICES |
2010 |
DBLP DOI BibTeX RDF |
Trust definition, trust principles, Web Services |
23 | Tanveer A. Zia, Md Zahidul Islam 0001 |
Communal Reputation and Individual Trust (CRIT) in Wireless Sensor Networks. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
Communal reputation, reputation-based trust, trust management, sensor networks security |
23 | Poonam Gera, Kumkum Garg, Manoj Misra |
Trust Based Multi Path DSR Protocol. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
Misbehaving nodes, Dynamic ource routing, Path trust, Trust |
23 | Dong Zhong, Yian Zhu, Wanbao Lei, Jianhua Gu, Yunlan Wang |
Multilevel Trust Management Framework for Pervasive Computing. |
WKDD |
2010 |
DBLP DOI BibTeX RDF |
trust evolution, multilevel trust, pervasive computing |
23 | Shigeichiro Yamasaki |
A Dynamic Trust Estimation Method for 'Persona' from the Human Relationship of Social Web. |
SAINT |
2010 |
DBLP DOI BibTeX RDF |
Trust estimation, Google Page Rank, User centric Authorization, Personalized mashup, Privacy, Trust, Persona, Twitter, Social Web, OpenID, OAuth |
23 | Raihana Ferdous, Vallipuram Muthukkumarasamy, Abdul Sattar 0001 |
Trust Formalization in Mobile Ad-Hoc Networks. |
AINA Workshops |
2010 |
DBLP DOI BibTeX RDF |
trust-formalization, security, routing, mobile ad hoc networks, trust |
23 | Zhenquan Qin, Lei Wang 0005, Mingchu Li, Weifeng Sun |
An Efficient Trust Mechanism in P2P Network. |
IIH-MSP |
2010 |
DBLP DOI BibTeX RDF |
Tw-Trust, time-window based, Trust model |
23 | Guanfeng Liu 0001, Yan Wang 0002, Mehmet A. Orgun, Ee-Peng Lim |
A Heuristic Algorithm for Trust-Oriented Service Provider Selection in Complex Social Networks. |
IEEE SCC |
2010 |
DBLP DOI BibTeX RDF |
social network, trust, trust path |
23 | Xinjie Guan, Xili Wan, Junzhou Luo |
A Maximum Entropy Based Multi-dimensional Trust Model. |
NPC Workshops |
2008 |
DBLP DOI BibTeX RDF |
Multi-dimensional Trust, Computational Trust, Distributed Computing, Maximum Entropy |
23 | Bo Chen, Guosun Zeng, Li Li 0008 |
Attribute Delegation Authorization Based on Subjective Trust Evaluation. |
NPC Workshops |
2008 |
DBLP DOI BibTeX RDF |
subjective trust, attribute based delegation authorization, trusted role, trust control, logic system |
23 | Stephen Marsh 0001, Pamela Briggs, Waleed Wagealla |
Considering trust in ambient societies. |
CHI Extended Abstracts |
2004 |
DBLP DOI BibTeX RDF |
ambient trust, clarity of explanation, ubiquitous computing, trust, transitivity |
23 | Yanhui Ding, Qingzhong Li, Feifei Li |
A Novel Method for Evaluating Trustworthiness between Strangers in Large, Dynamic Ad Hoc Networks. |
WKDD |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Yan Wang 0002, Kwei-Jay Lin |
Reputation-Oriented Trustworthy Computing in E-Commerce Environments. |
IEEE Internet Comput. |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Oluwafemi O. Ajayi, Richard O. Sinnott, Anthony Stell |
Towards Decentralised Security Policies for e-Health Collaborations. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Golnaz Elahi, Zeev Lieber, Eric S. K. Yu |
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Vincenza Carchiolo, Alessandro Longheu, Michele Malgeri, Giuseppe Mangioni |
Trusting Evaluation by Social Reputation. |
IDC |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Jianli Hu, Quanyuan Wu, Bin Zhou 0004 |
Distributed and Effective Reputation Mechanism in P2P Systems. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Hongyan Mao, Yixiang Chen |
Research of a Multi-dimension Measurement Trusting Model Based on Markov Chain. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Tatyana Ryutov |
A Socio-cognitive Approach to Modeling Policies in Open Environments. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Ji Gao, John D. Lee |
Extending the decision field theory to model operators' reliance on automation in supervisory control situations. |
IEEE Trans. Syst. Man Cybern. Part A |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Pan Dong, Peidong Zhu, Xicheng Lu |
Brief Announcement: A Synthetic Public Key Management Scheme for Large-Scale MANET. |
SSS |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Larry L. Constantine |
Trusted Interaction: User Control and System Responsibilities in Interaction Design for Information Systems. |
CAiSE |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Huirong Tian, Shihong Zou, Wendong Wang, Shiduan Cheng |
A Group Based Reputation System for P2P Networks. |
ATC |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine |
Reducing the Dependence of SPKI/SDSI on PKI. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
23 | John Marchesini, Sean W. Smith |
Modeling Public Key Infrastructures in the Real World. |
EuroPKI |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone |
Modeling Security Requirements Through Ownership, Permission and Delegation. |
RE |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Anurag Garg, Roberto Battiti, Gianni Costanzi |
Dynamic Self-management of Autonomic Systems: The Reputation, Quality and Credibility (RQC) Scheme. |
WAC |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum |
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System. |
Security Protocols Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Won Shik Na, Jeom Goo Kim, Intae Ryoo |
Perimeter Defence Policy Model of Cascade MPLS VPN Networks. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
|
|