A framework for dynamic program analyzers
OOPSLA '93 Proceedings of the eighth annual conference on Object-oriented programming systems, languages, and applications
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Falcon: on-line monitoring and steering of large-scale parallel programs
FRONTIERS '95 Proceedings of the Fifth Symposium on the Frontiers of Massively Parallel Computation (Frontiers'95)
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
DOLPHIN: An Autonomous Indoor Positioning System in Ubiquitous Computing Environment
WSTFES '03 Proceedings of the IEEE Workshop on Software Technologies for Future Embedded Systems
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Monitoring and Controlling Internet Based E-Services
WIAPP '01 Proceedings of the Second IEEE Workshop on Internet Applications (wiapp '01)
Monitoring Web Service Requirements
RE '03 Proceedings of the 11th IEEE International Conference on Requirements Engineering
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Smart monitors for composed services
Proceedings of the 2nd international conference on Service oriented computing
A Taxonomy and Catalog of Runtime Software-Fault Monitoring Tools
IEEE Transactions on Software Engineering
Integrity constraints in trust management
Proceedings of the tenth ACM symposium on Access control models and technologies
Peer-to-peer access control architecture using trusted computing technology
Proceedings of the tenth ACM symposium on Access control models and technologies
A taxonomy of grid monitoring systems
Future Generation Computer Systems
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
Personal and Ubiquitous Computing
MonitoringWeb Service Networks in a Model-based Approach
ECOWS '05 Proceedings of the Third European Conference on Web Services
The monitorability of service-level agreements for application-service provision
WOSP '07 Proceedings of the 6th international workshop on Software and performance
Reliable QoS monitoring based on client feedback
Proceedings of the 16th international conference on World Wide Web
Towards security monitoring patterns
Proceedings of the 2007 ACM symposium on Applied computing
ATM: an automatic trust monitoring algorithm for service software
Proceedings of the 2009 ACM symposium on Applied Computing
Evaluating Trust-Based Access Control for Social Interaction
UBICOMM '09 Proceedings of the 2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
Z-based agents for service oriented computing
AAMAS'07/SOCASE'07 Proceedings of the 2007 AAMAS international workshop and SOCASE 2007 conference on Service-oriented computing: agents, semantics, and engineering
TrustAC: trust-based access control for pervasive devices
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Hi-index | 0.00 |
In recent years, with the rapid proliferation of new computing technologies, a variety of new computing environments have been introduced, such as decentralisation and mobility. The traditional security mechanisms are seen to be inadequate for these new environments. Trust is applied as a "soft security" to cope with new security concerns. Much research on trust systems has been carried out, it is important to identify the reliability of computational trust in different computing scenarios in order to make an enhancement. The reliability of trust systems for securing social interaction is demonstrated by showing the performance of the three trust-based systems under various scenarios in a pervasive computing environment. The focus of this paper is on enhancing trust-based systems and proposing a novel monitor model which supplements existing trust models.