Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
SpamAssassin
A survey of trust and reputation systems for online service provision
Decision Support Systems
A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Using Trust for Secure Collaboration in Uncertain Environments
IEEE Pervasive Computing
A service-centric model for intrusion detection in next-generation networks
Computer Standards & Interfaces
Trust-based route selection in dynamic source routing
iTrust'06 Proceedings of the 4th international conference on Trust Management
Secure Border Gateway Protocol (S-BGP)
IEEE Journal on Selected Areas in Communications
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
A service-oriented approach to dynamic refinement of security enforcement is described in this paper. This is based on a closed loop feedback system where live distributed trust measures are used to adapt access control settings in a changing threat environment. A general trust overlay architecture and model are presented. Some specific application scenarios are discussed, in particular spam filtering and distributed intrusion detection in mobile ad hoc networks. It is shown using simulations of some specific scenarios that this dynamic system is robust and has the potential to enhance security and access control efficiency.