NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Design of a trust model for a secure multi-agent marketplace
Proceedings of the fifth international conference on Autonomous agents
Exploring Trust in Flexible Working Using a New Model
BT Technology Journal
E-Commerce Trust Metrics and Models
IEEE Internet Computing
"Trust me, I'm an online vendor": towards a model of trust for e-commerce system design
CHI '00 Extended Abstracts on Human Factors in Computing Systems
A Computational Model of Trust and Reputation for E-businesses
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7 - Volume 7
Toward a Generic Model of Trust for Electronic Commerce
International Journal of Electronic Commerce
IEEE Network: The Magazine of Global Internetworking
An overview of PKI trust models
IEEE Network: The Magazine of Global Internetworking
Bridging disjoint trusted domains into a trustworthy system
AIC'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Informatics and Communications - Volume 7
Practitioner's challenges in designing trust into online systems
Journal of Theoretical and Applied Electronic Commerce Research
Enhancing trust in mobile enterprise networking
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Hi-index | 0.00 |
Trust is playing an important role in communications and transactions. Based on different reasons of trust, different trusted domains, possibly disjoint, are formed in mobile communications, preventing complete systems from working properly. What is lacked therein is a bridge that can link domains, across trust gaps to establish a complete trusted mobile communication system. In this paper, the authors propose a generic method to analyze and model a mobile communication system into a number of trusted domains. In order to overcome the trust gaps among the originally disjoint domains, the authors further propose three approaches to bridge different domains and demonstrate the use of mobile Personal Trusted Devices, such as mobile handsets to act as the said bridge.