Authoritative sources in a hyperlinked environment
Journal of the ACM (JACM)
DATALOG with Constraints: A Foundation for Trust Management Languages
PADL '03 Proceedings of the 5th International Symposium on Practical Aspects of Declarative Languages
Distributed credential chain discovery in trust management
Journal of Computer Security
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Distributed Pagerank: A Distributed Reputation Model for Open Peer-to-Peer Networks
SAINT-W '04 Proceedings of the 2004 Symposium on Applications and the Internet-Workshops (SAINT 2004 Workshops)
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
POLICY '04 Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks
A framework for concrete reputation-systems with applications to history-based access control
Proceedings of the 12th ACM conference on Computer and communications security
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
A Distributed Tabling Algorithm for Rule Based Policy Systems
POLICY '06 Proceedings of the Seventh IEEE International Workshop on Policies for Distributed Systems and Networks
Anatomy: simple and effective privacy preservation
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
ACM SIGMOD Record
A survey of trust and reputation systems for online service provision
Decision Support Systems
Towards an Approach for Hybrid Trust Model
POLICY '07 Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks
A survey of trust in computer science and the Semantic Web
Web Semantics: Science, Services and Agents on the World Wide Web
QuanTM: a quantitative trust management system
Proceedings of the Second European Workshop on System Security
Towards a dynamic and composable model of trust
Proceedings of the 14th ACM symposium on Access control models and technologies
Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03
An introduction to trust negotiation
iTrust'03 Proceedings of the 1st international conference on Trust management
Core TuLiP logic programming for trust management
ICLP'07 Proceedings of the 23rd international conference on Logic programming
POLIPO: policies & ontologies for interoperability, portability, and autonomy
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
A conceptual model for attribute aggregation
Future Generation Computer Systems
Poster: protecting information in systems of systems
Proceedings of the 18th ACM conference on Computer and communications security
Addressing common vulnerabilities of reputation systems for electronic commerce
Journal of Theoretical and Applied Electronic Commerce Research
A privacy preserving authorisation system for the cloud
Journal of Computer and System Sciences
Hi-index | 0.00 |
In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different participants trust each other. As trust may depend on many different factors, in a flexible framework for Trust Management (TM) trust must be computed by combining different types of information. In this paper we describe the TAS3 TM framework which integrates independent TM systems into a single trust decision point. The TM framework supports intricate combinations whilst still remaining easily extensible. It also provides a unified trust evaluation interface to the (authorization framework of the) services. We demonstrate the flexibility of the approach by integrating three distinct TM paradigms: reputation-based TM, credential-based TM, and Key Performance Indicator TM. Finally, we discuss privacy concerns in TM systems and the directions to be taken for the definition of a privacy-friendly TM architecture.