Capturing Semantics for Information Security and Privacy Assurance
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Model checking security policy model using both UML static and dynamic diagrams
Proceedings of the 4th international conference on Security of information and networks
Journal of Computer and System Sciences
Model checking of security-sensitive business processes
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
Automated analysis of infinite state workflows with access control policies
STM'11 Proceedings of the 7th international conference on Security and Trust Management
Hi-index | 0.00 |
The fairness of reputation and trust management systems is rarely taken into account in their evaluation due to the prevalence of the paradigm of the Prisoner's Dilemma. Yet, considering fairness explicitly leads to a different design of reputation algorithms. ...