Temporal sequence learning and data reduction for anomaly detection
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
The role of trust management in distributed systems security
Secure Internet programming
A framework for constructing features and models for intrusion detection systems
ACM Transactions on Information and System Security (TISSEC)
A logic for uncertain probabilities
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
The consensus operator for combining beliefs
Artificial Intelligence
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Access Control and Trust in the Use of Widely Distributed Services
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
Towards Practical Automated Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Understanding Trust Management Systems
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Trust Dynamics for Collaborative Global Computing
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Attack-Resistance of Computational Trust Models
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Trust for ubiquitous, transparent collaboration
Wireless Networks - Special issue: Pervasive computing and communications
Using Trust for Secure Collaboration in Uncertain Environments
IEEE Pervasive Computing
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
An artificial immune system architecture for computer securityapplications
IEEE Transactions on Evolutionary Computation
Towards a decision model based on trust and security risk management
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
Towards modeling trust based decisions: a game theoretic approach
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Hi-index | 0.00 |
There have been a number of proposals for trust and reputation-based systems. Some have been implemented, some have been analysed only by simulation. In this paper we first present a general architecture for a trust-based system, placing special emphasis on the management of context information. We investigate the effectiveness of our architecture by simulating distributed attacks on a network that uses trust/ reputation as a basis for access control decisions.