Communications of the ACM
Referee: trust management for Web applications
World Wide Web Journal - Special issue: Web security: a matter of trust
Personalized hypermedia and international privacy
Communications of the ACM - The Adaptive Web
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Trust-X: A Peer-to-Peer Framework for Trust Establishment
IEEE Transactions on Knowledge and Data Engineering
Trusted Computing Platforms: TCPA Technology in Context
Trusted Computing Platforms: TCPA Technology in Context
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Tailoring collaboration according privacy needs in real-identity collaborative systems
CRIWG'09 Proceedings of the 15th international conference on Groupware: design, implementation, and use
Privacy assurance: bridging the gap between preference and practice
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Hi-index | 0.00 |
In this paper we explore a mechanism for, and the limitations of, automation of assessment of trustworthiness of systems. We have implemented a system for checking trust constraints expressed within privacy policies as part of an integrated prototype developed within the EU Framework VI Privacy and Identity Management for Europe (PRIME) project [1]. Trusted computing information [2,3] may be taken into account as part of this analysis. This is the first stage of ongoing research and development within PRIME in this area.