Availability and reliability modeling for computer systems
Advances in computers
Constructions and Properties of k out of nVisual Secret Sharing Schemes
Designs, Codes and Cryptography
Communications of the ACM
Contrast-optimal k out of n secret sharing schemes in visual cryptography
Theoretical Computer Science - computing and combinatorics
A logic for uncertain probabilities
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Design Patterns: Abstraction and Reuse of Object-Oriented Design
ECOOP '93 Proceedings of the 7th European Conference on Object-Oriented Programming
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
KeyNote: Trust Management for Public-Key Infrastructures (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Information Assurance Measures and Metrics " State of Practice and Proposed Taxonomy
HICSS '03 Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 9 - Volume 9
TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources
Autonomous Agents and Multi-Agent Systems
A survey of trust and reputation systems for online service provision
Decision Support Systems
Trust structures: Denotational and operational semantics
International Journal of Information Security
Trust-based service provider selection in open environments
Proceedings of the 2007 ACM symposium on Applied computing
Towards a taxonomy for information security metrics
Proceedings of the 2007 ACM workshop on Quality of protection
Computing Exact Outcomes of Multi-parameter Attack Trees
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
Extending Bayesian trust models regarding context-dependence and user friendly representation
Proceedings of the 2009 ACM symposium on Applied Computing
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Determine the Resilience of Evaluated Internet Voting Systems
RE-VOTE '09 Proceedings of the 2009 First International Workshop on Requirements Engineering for e-Voting Systems
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
Certainlogic: a logic for modeling trust and uncertainty
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Hi-index | 0.01 |
Emerging digital environments and infrastructures, such as distributed security services and distributed computing services, have generated new options of communication, information sharing, and resource utilization in past years. However, when distributed services are used, the question arises of to what extent we can trust service providers to not violate security requirements, whether in isolation or jointly. Answering this question is crucial for designing trustworthy distributed systems and selecting trustworthy service providers. This paper presents a novel trust measurement method for distributed systems, and makes use of propositional logic and probability theory. The results of the qualitative part include the specification of a formal trust language and the representation of its terms by means of propositional logic formulas. Based on these formulas, the quantitative part returns trust metrics for the determination of trustworthiness with which given distributed systems are assumed to fulfill a particular security requirement.