REFEREE: trust management for Web applications
Selected papers from the sixth international conference on World Wide Web
Communications of the ACM
REGRET: reputation in gregarious societies
Proceedings of the fifth international conference on Autonomous agents
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
Trust and Reputation Model in Peer-to-Peer Networks
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
A Dynamic Trust Model for Mobile Ad Hoc Networks
FTDCS '04 Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems
Expanding Trust Beyond Reputation in Peer-To-Peer Systems
DEXA '04 Proceedings of the Database and Expert Systems Applications, 15th International Workshop
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences - Volume 07
Trust Framework for P2P Networks Using Peer-Profile Based Anomaly Technique
ICDCSW '05 Proceedings of the Second International Workshop on Security in Distributed Computing Systems (SDCS) (ICDCSW'05) - Volume 02
A Reputation-Based Trust Mechanism for Ad Hoc Networks
ISCC '05 Proceedings of the 10th IEEE Symposium on Computers and Communications
A Framework for Trust-based Cluster Head Election in Wireless Sensor Networks
DSSNS '06 Proceedings of the Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems
Cooperative peer groups in NICE
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Trust Management Problem in Distributed Wireless Sensor Networks
RTCSA '06 Proceedings of the 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications
A survey of trust and reputation systems for online service provision
Decision Support Systems
Unleashing public-key cryptography in wireless sensor networks
Journal of Computer Security - On IWAP'05
Reputation-based Trust in Wireless Sensor Networks
MUE '07 Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems
Computer Standards & Interfaces
TRIMS, a privacy-aware trust and reputation model for identity management systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
WSANRep, WSAN Reputation-Based Selection in Open Environments
Wireless Personal Communications: An International Journal
Dynamic camouflage event based malicious node detection architecture
The Journal of Supercomputing
Hi-index | 0.00 |
Research on trust management systems for wireless sensor networks is still at a very early stage and few works have done so far. It seems that for those works which deal with the topic general features of how these systems should be are not clearly identified. In this paper we try to identify the main features that a trust management system should have and justify their importance for future developments.