Randomized algorithms
Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
The role of trust management in distributed systems security
Secure Internet programming
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Modeling public key infrastructures in the real world
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Towards a precise semantics for authenticity and trust
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Evaluating trust and authenticity with caution
iTrust'06 Proceedings of the 4th international conference on Trust Management
Hi-index | 0.00 |
Credential networks have recently been introduced as a general model for distributed authenticity and trust management in open networks. This paper focuses on issues related to the implementation of credential networks. It presents a system called Caution, which consists of a simple language to define credential networks and an underlying machinery to perform the evaluation. The paper also describes the necessary algorithms in further details.