Techniques for trusted software engineering
Proceedings of the 20th international conference on Software engineering
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Developing Electronic Trust Policies Using a Risk Management Model
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Reasoning about the role of information systems in trusting decisions
ISTA '01 Proceedings of the 2001 international conference on Information systems technology and its applications - Volume P-2
A State-Transition Model of Trust Management and Access Control
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Requirements for Policy Languages for Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Towards content trust of web resources
Web Semantics: Science, Services and Agents on the World Wide Web
Featuring trust and reputation management systems for constrained hardware devices
Proceedings of the 1st international conference on Autonomic computing and communication systems
Trust on the world wide web: a survey
Foundations and Trends in Web Science
AURA: a programming language for authorization and audit
Proceedings of the 13th ACM SIGPLAN international conference on Functional programming
A Model for Trust Metrics Analysis
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Program partitioning using dynamic trust models
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
Privacy-preserving trust verification
Proceedings of the 15th ACM symposium on Access control models and technologies
The impact of dynamic adversarial attacks on the stability of heterogeneous multimedia networks
Computer Communications
Trust and distrust in adaptive inter-enterprise collaboration management
Journal of Theoretical and Applied Electronic Commerce Research
The pervasive trust foundation for security in next generation networks
Proceedings of the 2010 workshop on New security paradigms
ABUSE: PKI for real-world email trust
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Rule-based trust assessment on the semantic web
RuleML'2011 Proceedings of the 5th international conference on Rule-based reasoning, programming, and applications
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Specifying legal risk scenarios using the CORAS threat modelling language
iTrust'05 Proceedings of the Third international conference on Trust Management
iTrust'05 Proceedings of the Third international conference on Trust Management
An approach to trust management challenges for critical infrastructures
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
Analysis and modelling of trust in distributed information systems
ICISS'05 Proceedings of the First international conference on Information Systems Security
Hi-index | 0.00 |