The AWK programming language
Authentication in the Taos operating system
ACM Transactions on Computer Systems (TOCS) - Special issue on operating systems principles
Tcl and the Tk toolkit
An Architectural Approach for Decentralized Trust Management
IEEE Internet Computing
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
Designing secure e-commerce with role-based access control
International Journal of Web Engineering and Technology
Relationship-based access control: protection model and policy language
Proceedings of the first ACM conference on Data and application security and privacy
Dynamic trust enhanced security model for trusted platform based services
Future Generation Computer Systems
Detecting and resolving policy misconfigurations in access-control systems
ACM Transactions on Information and System Security (TISSEC)
Nexus authorization logic (NAL): Design rationale and applications
ACM Transactions on Information and System Security (TISSEC)
Using hierarchal change mining to manage network security policy evolution
Hot-ICE'11 Proceedings of the 11th USENIX conference on Hot topics in management of internet, cloud, and enterprise networks and services
A formal approach towards measuring trust in distributed systems
Proceedings of the 2011 ACM Symposium on Applied Computing
Types for security in a mobile world
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
Programming cryptographic protocols
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
Program synthesis in administration of higher-order permissions
Proceedings of the 16th ACM symposium on Access control models and technologies
Relationship-based access control policies and their policy languages
Proceedings of the 16th ACM symposium on Access control models and technologies
An authorization scheme for version control systems
Proceedings of the 16th ACM symposium on Access control models and technologies
Trust management - from pervasive computing environments to mathematical economy and sociology
TELE-INFO'11/MINO'11/SIP'11 Proceedings of the 10th WSEAS international conference on Telecommunications and informatics and microelectronics, nanoelectronics, optoelectronics, and WSEAS international conference on Signal processing
SensorTrust: A resilient trust model for wireless sensing systems
Pervasive and Mobile Computing
A context-aware reputation-based model of trust for open multi-agent environments
Canadian AI'11 Proceedings of the 24th Canadian conference on Advances in artificial intelligence
HealthSec'11 Proceedings of the 2nd USENIX conference on Health security and privacy
Rule-based trust assessment on the semantic web
RuleML'2011 Proceedings of the 5th international conference on Rule-based reasoning, programming, and applications
Trust management methodologies for the web
RW'11 Proceedings of the 7th international conference on Reasoning web: semantic technologies for the web of data
Policy analysis for Administrative Role-Based Access Control
Theoretical Computer Science
Aggregating trust using triangular norms in the keynote trust management system
STM'10 Proceedings of the 6th international conference on Security and trust management
Opacity analysis in trust management systems
ISC'11 Proceedings of the 14th international conference on Information security
Social-Compliance in Trust Management within Virtual Communities
WI-IAT '11 Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 03
Trust management languages and complexity
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part II
Extracting trust information from security system of a service
Journal of Network and Computer Applications
Towards flexible credential negotiation protocols
Proceedings of the 11th international conference on Security Protocols
Argumentation for access control
AI*IA'05 Proceedings of the 9th conference on Advances in Artificial Intelligence
Trust establishment in ad hoc and sensor networks
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Enforcing trust in pervasive computing with trusted computing technology
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
A framework for flexible access control in digital library systems
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
A dynamic trust model based on naive bayes classifier for ubiquitous environments
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Temporal logic-based specification and verification of trust models
iTrust'06 Proceedings of the 4th international conference on Trust Management
Trust-based route selection in dynamic source routing
iTrust'06 Proceedings of the 4th international conference on Trust Management
Virtual fingerprinting as a foundation for reputation in open systems
iTrust'06 Proceedings of the 4th international conference on Trust Management
Towards automated evaluation of trust constraints
iTrust'06 Proceedings of the 4th international conference on Trust Management
Provision of trusted identity management using trust credentials
iTrust'06 Proceedings of the 4th international conference on Trust Management
A novel protocol for communicating reputation in p2p networks
iTrust'06 Proceedings of the 4th international conference on Trust Management
Trust, privacy and security in e-business: requirements and solutions
PCI'05 Proceedings of the 10th Panhellenic conference on Advances in Informatics
Trust management with safe privilege propagation
APPT'05 Proceedings of the 6th international conference on Advanced Parallel Processing Technologies
The application of collaborative filtering for trust management in p2p communities
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Distributed access control for grid environments using trust management approach
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Soutei, a logic-based trust-management system
FLOPS'06 Proceedings of the 8th international conference on Functional and Logic Programming
Answer set programming for distributed authorization: the language, computations, and application
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
Managing theories of trust in agent based systems
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
A formalization of distributed authorization with delegation
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Synergy: a policy-driven, trust-aware information dissemination framework
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Toward trust management in autonomic and coordination applications
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Extracting trust from domain analysis: a case study on the wikipedia project
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Dynamic-Role based access control framework across multi-domains in grid environment
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
Research of security architecture for p2p network based on trust management system
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
Distributed credential chain discovery in trust-management with parameterized roles
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
ID-Based access control and authority delegations
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Toward a broader view of security protocols
SP'04 Proceedings of the 12th international conference on Security Protocols
Towards a mechanism for discretionary overriding of access control
SP'04 Proceedings of the 12th international conference on Security Protocols
TARF: a trust-aware routing framework for wireless sensor networks
EWSN'10 Proceedings of the 7th European conference on Wireless Sensor Networks
A calculus of trustworthy ad hoc networks
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
LP with flexible grouping and aggregates using modes
LOPSTR'09 Proceedings of the 19th international conference on Logic-Based Program Synthesis and Transformation
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
A cooperative web framework of jini into OSGi-based open home gateway
ICESS'04 Proceedings of the First international conference on Embedded Software and Systems
OACerts: oblivious attribute certificates
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
A formal privacy system and its application to location based services
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Policies, models, and languages for access control
DNIS'05 Proceedings of the 4th international conference on Databases in Networked Information Systems
A security infrastructure for trust management in multi-agent systems
Trusting Agents for Trusting Electronic Societies
A type discipline for authorization policies
ESOP'05 Proceedings of the 14th European conference on Programming Languages and Systems
Trust of medical devices, applications, and users in pervasive healthcare
Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments
Specifying distributed authorization with delegation using logic programming
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Trust lifecycle management in a global computing environment
GC'04 Proceedings of the 2004 IST/FET international conference on Global Computing
Modeling public key infrastructures in the real world
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
iTrust'05 Proceedings of the Third international conference on Trust Management
iTrust'05 Proceedings of the Third international conference on Trust Management
Towards a generic trust model – comparison of various trust update algorithms
iTrust'05 Proceedings of the Third international conference on Trust Management
Combining trust and risk to reduce the cost of attacks
iTrust'05 Proceedings of the Third international conference on Trust Management
CLIMA'04 Proceedings of the 5th international conference on Computational Logic in Multi-Agent Systems
Towards more controllable and practical delegation
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Semantic access control model: a formal specification
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Peer-to-Peer authentication with a distributed single sign-on service
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
Journal of Network and Computer Applications
Security model oriented attestation on dynamically reconfigurable component-based systems
Journal of Network and Computer Applications
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
Journal of Network and Computer Applications
Security analysis and validation for access control in multi-domain environment based on risk
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
“Fair” authentication in pervasive computing
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
On the use of formal specifications as part of running programs
Software Engineering for Multi-Agent Systems IV
A statistical mechanics approach to trust management in autonomic networks
International Journal of Systems, Control and Communications
Transfer of trust in event-based reputation systems
Theoretical Computer Science
Privacy in the electronic society
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Cryptographic protocol to establish trusted history of interactions
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
An approach to trust management challenges for critical infrastructures
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
Bring efficient connotation expressible policies to trust management
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
A semantic web framework for interleaving policy reasoning and external service discovery
RuleML'05 Proceedings of the First international conference on Rules and Rule Markup Languages for the Semantic Web
VTrust: a trust management system based on a vector model of trust
ICISS'05 Proceedings of the First international conference on Information Systems Security
Analysis and modelling of trust in distributed information systems
ICISS'05 Proceedings of the First international conference on Information Systems Security
SPEAR: design of a secured peer-to-peer architecture
ICISS'05 Proceedings of the First international conference on Information Systems Security
An adaptive and Socially-Compliant Trust Management System for virtual communities
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Trust in collaborative web applications
Future Generation Computer Systems
A formalisation and evaluation of certificate policies
Computer Communications
PlexC: a policy language for exposure control
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Security and Communication Networks
Proceedings of the 14th Annual International Conference on Electronic Commerce
Decentralized semantic threat graphs
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Mixed-Strategy game based trust management for clustered wireless sensor networks
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
TBA: a hybrid of logic and extensional access control systems
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
Hails: protecting data privacy in untrusted web applications
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
Towards a methodology for designing e-government control procedures
EGOV'07 Proceedings of the 6th international conference on Electronic Government
A trust-centered approach for building e-voting systems
EGOV'07 Proceedings of the 6th international conference on Electronic Government
Towards trustworthy resource selection: a fuzzy reputation aggregation approach
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Research on security management in active network node operating systems
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
DEAL: A Distributed Authorization Language for Ambient Intelligence
International Journal of Ambient Computing and Intelligence
Nephele: Scalable Access Control for Federated File Services
Journal of Grid Computing
Toward a cyber-physical topology language: applications to NERC CIP audit
Proceedings of the first ACM workshop on Smart energy grid security
Hardware and embedded security in the context of internet of things
Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles
Trust management of services in cloud environments: Obstacles and solutions
ACM Computing Surveys (CSUR)
A formal distributed network monitoring approach for enhancing trust management systems
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems
Future Generation Computer Systems
Formal verification of security properties in trust management policy
Journal of Computer Security
Hi-index | 0.00 |
We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, and deferring trust to third parties. Existing systems that support security in networked applications, including X.509 and PGP, address only narrow subsets of the overall trust management problem and often do so in a manner that is appropriate to only one application. This paper presents a comprehensive approach to trust management, based on a simple language for specifying trusted actions and trust relationships. It also describes a prototype implementation of a new trust management system, called Policy Maker, that will facilitate the development of security features in a wide range of network services.