Fuzzy queries in multimedia database systems
PODS '98 Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
The Combinatorics of Network Reliability
The Combinatorics of Network Reliability
The mechanics of trust: a framework for research and design
International Journal of Human-Computer Studies
Rule Based Expert Systems: The Mycin Experiments of the Stanford Heuristic Programming Project (The Addison-Wesley series in artificial intelligence)
Automated trust negotiation using cryptographic credentials
Proceedings of the 12th ACM conference on Computer and communications security
Trust network analysis with subjective logic
ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48
A survey of trust and reputation systems for online service provision
Decision Support Systems
Design and Semantics of a Decentralized Authorization Language
CSF '07 Proceedings of the 20th IEEE Computer Security Foundations Symposium
Propagating multitrust within trust networks
Proceedings of the 2008 ACM symposium on Applied computing
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Optimal Trust Network Analysis with Subjective Logic
SECURWARE '08 Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies
Predicting tie strength with social media
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Security risk management using internal controls
Proceedings of the first ACM workshop on Information security governance
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Flexible secure inter-domain interoperability through attribute conversion
Information Sciences: an International Journal
Decentralized semantic threat graphs
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Hi-index | 0.00 |
A Trust Management model that provides a measure of the degree to which a principal is trusted for some action is proposed. At the heart of the model is the notion that triangular norms and conorms provide a natural and consistent interpretation for trust aggregation across delegation chains. It is argued that specifying how trust is aggregated is as important as specifying a degree of trust value in an attribute certificate and, therefore, in stating the degree to which a principal trusts another, the principal should also state how that trust may aggregate across delegation chains. The model is illustrated and has been implemented using a modified, but backwards-compatible, version of the KeyNote Trust Management system.