Trust enhanced ubiquitous payment without too much privacy loss
Proceedings of the 2004 ACM symposium on Applied computing
Engineering human trust in mobile system collaborations
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering
Trust for ubiquitous, transparent collaboration
Wireless Networks - Special issue: Pervasive computing and communications
Consumer perceptions of privacy, security and trust in ubiquitous commerce
Personal and Ubiquitous Computing
Smart dust, friend or foe?: replacing identity with configuration trust
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Military communications systems and technologies
Delivering real-world ubiquitous location systems
Communications of the ACM - The disappearing computer
Interacting with trust in ambient intelligence
UbiMob '04 Proceedings of the 1st French-speaking conference on Mobility and ubiquity computing
Semantic constraints for trust transitivity
APCCM '05 Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling - Volume 43
A framework for concrete reputation-systems with applications to history-based access control
Proceedings of the 12th ACM conference on Computer and communications security
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
Personal and Ubiquitous Computing
Architectural support for trust models in decentralized applications
Proceedings of the 28th international conference on Software engineering
Peer-to-peer collaborative spam detection
Crossroads
Decentralized trust management for ad-hoc peer-to-peer networks
Proceedings of the 4th international workshop on Middleware for Pervasive and Ad-Hoc Computing (MPAC 2006)
A survey of autonomic communications
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Properties and mechanisms of self-organizing MANET and P2P systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Socio-technical defense against voice spamming
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
A survey of trust and reputation systems for online service provision
Decision Support Systems
A Bayesian Model for Event-based Trust
Electronic Notes in Theoretical Computer Science (ENTCS)
Simplification and analysis of transitive trust networks
Web Intelligence and Agent Systems
Certain trust: a trust model for users and agents
Proceedings of the 2007 ACM symposium on Applied computing
From trading to eCommunity management: Responding to social and contractual challenges
Information Systems Frontiers
A reputation system based on computing with words
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Dynamic trust assessment of software services
2nd international workshop on Service oriented software engineering: in conjunction with the 6th ESEC/FSE joint meeting
A service-centric approach to access control and monitoring based on distributed trust
CASCON '07 Proceedings of the 2007 conference of the center for advanced studies on Collaborative research
The complexity of fixed point models of trust in distributed networks
Theoretical Computer Science
MobiPass: a passport for mobile business
Personal and Ubiquitous Computing
A logical framework for history-based access control and reputation systems
Journal of Computer Security
Reconciling privacy and security in pervasive computing: the case for pseudonymous group membership
Proceedings of the 5th international workshop on Middleware for pervasive and ad-hoc computing: held at the ACM/IFIP/USENIX 8th International Middleware Conference
Bayesian memory-based reputation system
Proceedings of the 3rd international conference on Mobile multimedia communications
Risk Based Authorisation for Mobile Ad Hoc Networks
AIMS '07 Proceedings of the 1st international conference on Autonomous Infrastructure, Management and Security: Inter-Domain Management
VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges
DIMVA '08 Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Context-Dependent Reputation Management for Soft Security in Multi Agent Systems
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
Extending Bayesian trust models regarding context-dependence and user friendly representation
Proceedings of the 2009 ACM symposium on Applied Computing
A new evidential trust model for open communities
Computer Standards & Interfaces
Integrating Dirichlet reputation into usage control
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Trading in risk: using markets to improve access control
Proceedings of the 2008 workshop on New security paradigms
An analysis of the exponential decay principle in probabilistic trust models
Theoretical Computer Science
Trust Management Using Networks of Volunteers in Ubiquitous Computing Environments
NEW2AN '09 and ruSMART '09 Proceedings of the 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and Second Conference on Smart Spaces
Evidence processing and privacy issues in evidence-based reputation systems
Computer Standards & Interfaces
Trust based security auto-configuration for smart assisted living environments
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
Application Security Models for Mobile Agent Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
A probabilistic reputation model based on transaction ratings
Information Sciences: an International Journal
From simulations to theorems: a position paper on research in the field of computational trust
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
Program partitioning using dynamic trust models
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
Managing risks in RBAC employed distributed environments
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Foundations of security analysis and design IV
Initial trust formation in Virtual Organisations
International Journal of Internet Technology and Secured Transactions
Trust and distrust in adaptive inter-enterprise collaboration management
Journal of Theoretical and Applied Electronic Commerce Research
Network trust management in emergency situations
Journal of Computer and System Sciences
A rule-based policy language for selective trust propagation in social networks
Databases and Social Networks
Architecture and implementation of a trust model for pervasive applications
Journal of Mobile Multimedia
Reputation evaluation for choosing a trustworthy counterparty in C2C e-commerce
Electronic Commerce Research and Applications
Gathering experience in trust-based interactions
iTrust'06 Proceedings of the 4th international conference on Trust Management
TATA: towards anonymous trusted authentication
iTrust'06 Proceedings of the 4th international conference on Trust Management
Autonomic and trusted computing paradigms
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Bayesian network based trust management
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Extracting trust from domain analysis: a case study on the wikipedia project
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
An abstract model for incentive-enhanced trust in p2p networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Pseudonymity in the light of evidence-based trust
SP'04 Proceedings of the 12th international conference on Security Protocols
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Smart devices for next generation mobile services
CASSIS'04 Proceedings of the 2004 international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices
Non-cryptographic methods for improving real time transmission security and integrity
Annales UMCS, Informatica - Security Systems
A classification of trust systems
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
iTrust'05 Proceedings of the Third international conference on Trust Management
iTrust'05 Proceedings of the Third international conference on Trust Management
Towards an evaluation methodology for computational trust systems
iTrust'05 Proceedings of the Third international conference on Trust Management
Risk models for trust-based access Control(TBAC)
iTrust'05 Proceedings of the Third international conference on Trust Management
Combining trust and risk to reduce the cost of attacks
iTrust'05 Proceedings of the Third international conference on Trust Management
On the use of formal specifications as part of running programs
Software Engineering for Multi-Agent Systems IV
Transfer of trust in event-based reputation systems
Theoretical Computer Science
Trust management issues for ad hoc and self-organized networks
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
International Journal of Systems and Service-Oriented Engineering
Comparative trust management with applications: Bayesian approaches emphasis
Future Generation Computer Systems
Hi-index | 0.00 |
The SECURE project is investigating the design of security mechanisms for pervasive computing based on the human notion of trust. Our work addresses how entities that encounter each other in unfamiliar pervasive computing environments can overcome initial suspicion to allow secure collaboration to take place.