User-tailorable systems: pressing the issues with buttons
CHI '90 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Trust management on the World Wide Web
WWW7 Proceedings of the seventh international conference on World Wide Web 7
Trust and risk in Internet commerce
Trust and risk in Internet commerce
Communications of the ACM
Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
Specifying and Analysing Trust for Internet Applications
I3E '02 Proceedings of the IFIP Conference on Towards The Knowledge Society: E-Commerce, E-Business, E-Government
Context-Awareness in Wearable and Ubiquitous Computing
ISWC '97 Proceedings of the 1st IEEE International Symposium on Wearable Computers
A Survey of Context-Aware Mobile Computing Research
A Survey of Context-Aware Mobile Computing Research
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Policy-Based Network Management: Solutions for the Next Generation (The Morgan Kaufmann Series in Networking)
The Design of a New Context-Aware Policy Model for Autonomic Networking
ICAC '08 Proceedings of the 2008 International Conference on Autonomic Computing
Advances in Biologically Inspired Information Systems: Models, Methods, and Tools
Advances in Biologically Inspired Information Systems: Models, Methods, and Tools
iTrust'05 Proceedings of the Third international conference on Trust Management
A DSL for specifying autonomic security management strategies
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Hi-index | 0.00 |
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models obsolete. In addition, current security mechanisms are not sufficiently robust to protect each management system and/or subsystem from web-based intrusions, malware, and hacking attacks. This paper presents research challenges in autonomic management to provide self-protection mechanisms and tools by using trust and reputation concepts based on policy-based management to decentralize management decisions. This work also uses user-based reputation mechanisms to help enforce trust management in pervasive and communications services. The scope of this research is founded in social models, where the application of trust and reputation applied in communication systems helps detect potential users as well as hackers attempting to corrupt management operations and services. These so-called "cheating services" act as "attacks", altering the performance and the security in communication systems by consumption of computing or network resources unnecessarily.