Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Trust Relationships in Secure Systems-A Distributed Authentication Perspective
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
A framework for concrete reputation-systems with applications to history-based access control
Proceedings of the 12th ACM conference on Computer and communications security
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
Trust management with delegation in grouped peer-to-peer communities
Proceedings of the eleventh ACM symposium on Access control models and technologies
MUE '07 Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering
A calculus of trustworthy ad hoc networks
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
An Effective Model for Indirect Trust Computation in Pervasive Computing Environment
Wireless Personal Communications: An International Journal
Hi-index | 0.01 |
The purpose of this work is to give a service provider or a resource holder the opportunity to evaluate the trustworthiness of each potential client, react to the client's activity by adapting access policies to the actual risk level, and derive user's access rights from his previous behavior, recommendations from third party and the actual circumstances. It is supposed that the system is able to observe and to log the activity of each client and use this information to estimate correspondent trust values.