The official PGP user's guide
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
A Subjective Metric of Authentication
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Highly reliable trust establishment scheme in ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Developing a Model for Trust Management in Pervasive Devices
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
Decentralized trust management for ad-hoc peer-to-peer networks
Proceedings of the 4th international workshop on Middleware for Pervasive and Ad-Hoc Computing (MPAC 2006)
FTDCS '07 Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems
An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment
COMPSAC '07 Proceedings of the 31st Annual International Computer Software and Applications Conference - Volume 01
A Trust-based Middleware for Providing Security to Ad-Hoc Peer-to-Peer Applications
PERCOM '08 Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications
Using Trust for Secure Collaboration in Uncertain Environments
IEEE Pervasive Computing
An Autonomic Multimedia and Information Service Gateway for Mobile Devices
International Journal of Distributed Sensor Networks
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
Journal of Systems and Software
A self-certified and Sybil-free framework for secure digital identity domain buildup
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
TrustAC: trust-based access control for pervasive devices
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Defense of trust management vulnerabilities in distributed networks
IEEE Communications Magazine
Future trust management framework for mobile ad hoc networks
IEEE Communications Magazine
IEEE Communications Magazine
On trust models and trust evaluation metrics for ad hoc networks
IEEE Journal on Selected Areas in Communications
A Metric-Based Approach to Assess Risk for "On Cloud" Federated Identity Management
Journal of Network and Systems Management
Wireless Personal Communications: An International Journal
An Effective Model for Indirect Trust Computation in Pervasive Computing Environment
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
In the last years, trust management has become a fundamental basis for facilitating the cooperation between different users in peer-to-peer (P2P) multimedia applications within autonomic networks. In these networks and applications, trust management should fulfill certain requirements (i.e. decentralisation, dynamism, simplicity, interoperability, etc.) for being functional. In this paper, we propose an evolutionary model of trust management that captures dynamic entities' behaviour over time. Likewise, we explain protection mechanisms against several attacks, which are based on the cooperative behaviour of the entities, trust relationship properties, and trust rules. Finally, we successfully validate our model from several scenarios and compare it with other proposals in this field.