Understanding Trust Management Systems
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
A survey of trust and reputation systems for online service provision
Decision Support Systems
A Socio-cognitive Approach to Modeling Policies in Open Environments
POLICY '07 Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks
PEACE-VO: A Secure Policy-Enabled Collaboration Framework for Virtual Organizations
SRDS '07 Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems
A three-layered model to implement data privacy policies
Computer Standards & Interfaces
A Practical Solution to Trusted Computing Platform Testing
APTC '08 Proceedings of the 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference
Trust Management in Emergency Networks
AINA '09 Proceedings of the 2009 International Conference on Advanced Information Networking and Applications
SUNNY: a new algorithm for trust inference in social networks using probabilistic confidence models
AAAI'07 Proceedings of the 22nd national conference on Artificial intelligence - Volume 2
Electronic Notes in Theoretical Computer Science (ENTCS)
Autonomic Trust Extraction for Trustworthy Service Discovery in Urban Computing
DASC '09 Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
Semantics based information trust computation and propagation algorithm for semantic web
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Trust management systems for wireless sensor networks: Best practices
Computer Communications
Review: A survey on security issues in service delivery models of cloud computing
Journal of Network and Computer Applications
A Model of Security Information Flow on Entities for Trust Computation
CIT '10 Proceedings of the 2010 10th IEEE International Conference on Computer and Information Technology
Trustworthiness Tendency Incremental Extraction Using Information Gain
WI-IAT '10 Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 02
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
Secure knowledge management: confidentiality, trust, and privacy
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Trust management and trust theory revision
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
A formal apparatus for modeling trust in computing environments
Mathematical and Computer Modelling: An International Journal
Defense of trust management vulnerabilities in distributed networks
IEEE Communications Magazine
On trust models and trust evaluation metrics for ad hoc networks
IEEE Journal on Selected Areas in Communications
Security similarity based trust in cyber space
Knowledge-Based Systems
A Web Service trust evaluation model based on small-world networks
Knowledge-Based Systems
Hi-index | 0.00 |
The issue of trust is a research problem in emerging open environments, such as ubiquitous networks. Such environments are highly dynamic and they contain diverse number of services and autonomous entities. Entities in open environments have different security needs from services. Trust computations related to the security systems of services necessitate information that meets needs of each entity. Obtaining such information is a challenging issue for entities. In this paper, we propose a model for extracting trust information from the security system of a service based on the needs of an entity. We formally represent security policies and security systems to extract trust information according to needs of an entity. The formal representation ensures an entity to extract trust information about a security property of a service and trust information about whole security system of the service. The proposed model is applied to Dental Clinic Patient Service as a case study with two scenarios. The scenarios are analyzed experimentally with simulations. The experimental evaluation shows that the proposed model provides trust information related to the security system of a service based on the needs of an entity and it is applicable in emerging open environments.