A reputation-based trust model for peer-to-peer ecommerce communities [Extended Abstract]
Proceedings of the 4th ACM conference on Electronic commerce
Integrity Management in Component Based Systems
EUROMICRO '04 Proceedings of the 30th EUROMICRO Conference
Enhancing Grid Security with Trust Management
SCC '04 Proceedings of the 2004 IEEE International Conference on Services Computing
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences - Volume 07
A Multi-Property Trust Model for Reconfiguring Component Software
QSIC '05 Proceedings of the Fifth International Conference on Quality Software
Methodology to bridge different domains of trust in mobile communications
iTrust'03 Proceedings of the 1st international conference on Trust management
Autonomic trust management in a component based software system
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Information theoretic framework of trust modeling and evaluation for ad hoc networks
IEEE Journal on Selected Areas in Communications
On trust models and trust evaluation metrics for ad hoc networks
IEEE Journal on Selected Areas in Communications
An overview of PKI trust models
IEEE Network: The Magazine of Global Internetworking
An adaptive trust control model for a trustworthy component software platform
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.00 |
With the rapid growth of digital computing and networking technologies, trust becomes an important aspect in the establishment of a secure digital system. Based on different reasons of trust, different trusted domains, possibly disjoint, are formed in a digital system, preventing the complete system from working improperly. What lacks therein are bridges that can link domains, across trust gaps to establish a complete trusted system. In this paper, we apply a methodology for establishing a trustworthy system through bridging disjoint domains of trust together. We illustrate how to analyze and design a trustworthy system by applying the methodology into a concrete example with regard to establishing a trustworthy middleware platform for component software.