IEEE Transactions on Software Engineering - Special issue on computer security and privacy
REFEREE: trust management for Web applications
Selected papers from the sixth international conference on World Wide Web
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
The right type of trust for distributed systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Communications of the ACM
Specification-based anomaly detection: a new approach for detecting network intrusions
Proceedings of the 9th ACM conference on Computer and communications security
Designing and Evaluating E-Business Models
IEEE Intelligent Systems
"Trust me, I'm an online vendor": towards a model of trust for e-commerce system design
CHI '00 Extended Abstracts on Human Factors in Computing Systems
Automated Management of Inter-Organisational Applications
EDOC '02 Proceedings of the 6th International Enterprise Distributed Object Computing Conference
The Ponder Policy Specification Language
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
KeyNote: Trust Management for Public-Key Infrastructures (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
Specifying and Analysing Trust for Internet Applications
I3E '02 Proceedings of the IFIP Conference on Towards The Knowledge Society: E-Commerce, E-Business, E-Government
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
A Computational Model of Trust and Reputation for E-businesses
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7 - Volume 7
A Policy Language for a Pervasive Computing Environment
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Trust-Adapted Enforcement of Security Policies in Distributed Component-Structured Applications
ISCC '01 Proceedings of the Sixth IEEE Symposium on Computers and Communications
Using internal sensors for computer intrusion detection
Using internal sensors for computer intrusion detection
Using Trust for Secure Collaboration in Uncertain Environments
IEEE Pervasive Computing
A trust matrix model for electronic commerce
iTrust'03 Proceedings of the 1st international conference on Trust management
Hardware security appliances for trust
iTrust'03 Proceedings of the 1st international conference on Trust management
Simulating the effect of reputation systems on E-markets
iTrust'03 Proceedings of the 1st international conference on Trust management
Trust propagation in small worlds
iTrust'03 Proceedings of the 1st international conference on Trust management
Statistical trustability (conceptual work)
iTrust'03 Proceedings of the 1st international conference on Trust management
Implementation of an agent-oriented trust management infrastructure based on a hybrid PKI model
iTrust'03 Proceedings of the 1st international conference on Trust management
Challenges for trust, fraud and deception research in multi-agent systems
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
A sense of self for Unix processes
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
From trading to eCommunity management: Responding to social and contractual challenges
Information Systems Frontiers
A survey of trust in computer science and the Semantic Web
Web Semantics: Science, Services and Agents on the World Wide Web
A Scalable Evidence Based Self-Managing Framework for Trust Management
Electronic Notes in Theoretical Computer Science (ENTCS)
Dynamic trust assessment of software services
2nd international workshop on Service oriented software engineering: in conjunction with the 6th ESEC/FSE joint meeting
Towards content trust of web resources
Web Semantics: Science, Services and Agents on the World Wide Web
ACM Transactions on Information and System Security (TISSEC)
Subjective logic based trust model for mobile ad hoc networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A lightweight buyer's trust model for micropayment systems
WSEAS Transactions on Information Science and Applications
Agents Selecting Trustworthy Recommendations in Mobile Virtual Communities
Trust in Agent Societies
Fuzzy computational models for trust and reputation systems
Electronic Commerce Research and Applications
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
Modelling autonomic and dynamic trust decision-making mechanism for large-scale open environments
International Journal of Computer Applications in Technology
Start Trusting Strangers? Bootstrapping and Prediction of Trust
WISE '09 Proceedings of the 10th International Conference on Web Information Systems Engineering
Determining the Trustworthiness of New Electronic Contracts
ESAW '09 Proceedings of the 10th International Workshop on Engineering Societies in the Agents World X
Trust in RFID-enabled Supply-Chain Management
International Journal of Security and Networks
RISE'06 Proceedings of the 3rd international conference on Rapid integration of software engineering techniques
Trust algorithms in P2P file sharing networks
International Journal of Internet Technology and Secured Transactions
Trust and distrust in adaptive inter-enterprise collaboration management
Journal of Theoretical and Applied Electronic Commerce Research
Towards a decision model based on trust and security risk management
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
The pervasive trust foundation for security in next generation networks
Proceedings of the 2010 workshop on New security paradigms
A risk-aware resource service decision strategy for global computing
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
ADMA'10 Proceedings of the 6th international conference on Advanced data mining and applications - Volume Part II
Modeling and negotiating service quality
Service research challenges and solutions for the future internet
Incentivizing responsible networking via introduction-based routing
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
A taxonomy of trust oriented approaches for services computing
Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services
Addressing common vulnerabilities of reputation systems for electronic commerce
Journal of Theoretical and Applied Electronic Commerce Research
Trust assessment: a personalized, distributed, and secure approach
Concurrency and Computation: Practice & Experience
A framework for trusted services
ICSOC'12 Proceedings of the 10th international conference on Service-Oriented Computing
Context-aware web services for security control and privacy preservation in an RFID supply chain
International Journal of Information Technology and Management
A survey of trust in social networks
ACM Computing Surveys (CSUR)
Users' attachment in trust networks: reputation vs. effort
International Journal of Bio-Inspired Computation
Trust management of services in cloud environments: Obstacles and solutions
ACM Computing Surveys (CSUR)
Computers and Industrial Engineering
Building trust from context similarity measures
Computer Standards & Interfaces
Adaptiveness and social-compliance in trust management within virtual communities
Web Intelligence and Agent Systems - Web Intelligence and Communities
Hi-index | 0.00 |
Trust is an important tool in human life, as it enables people to cope with the uncertainty caused by the free will of others. Uncertainty and uncontrollability are also issues in computer-assisted collaboration and electronic commerce in particular. A computational model of trust and its implementation can alleviate this problem. This survey is directed to an audience wishing to familiarize themselves with the field, for example to locate a research target or implement a trust management system. It concentrates on providing a general overview of the state of the art, combined with examples of things to take into consideration both when modelling trust in general and building a solution for a certain phase in trust management, be it trust relationship initialization, updating trust based on experience or determining what trust should have an effect on.