The official PGP user's guide
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
A new paradigm for trusted systems
NSPW '92-93 Proceedings on the 1992-1993 workshop on New security paradigms
A credibility-based model of computer system security
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
The right type of trust for distributed systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
Practical Intranet Security: Overview of the State of the Art and Available Technologies
Practical Intranet Security: Overview of the State of the Art and Available Technologies
Towards a New Authorisation Paradigm for Extranets
ACISP '00 Proceedings of the 5th Australasian Conference on Information Security and Privacy
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Trust Relationships in Secure Systems-A Distributed Authentication Perspective
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Secure Client Agent Environment (SCAE) for World Wide Web
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Secure resource sharing on cross-organization collaboration using a novel trust method
Robotics and Computer-Integrated Manufacturing
Network service sharing infrastructure: service authentication and authorization revocation
ICCOM'05 Proceedings of the 9th WSEAS International Conference on Communications
A reputation system for electronic negotiations
Computer Standards & Interfaces
Efficient Information Propagation in Service Routing for Next Generation Network
RSKT '09 Proceedings of the 4th International Conference on Rough Sets and Knowledge Technology
Agent-based privilege negotiation for E-commerce on world wide web
ICWE'03 Proceedings of the 2003 international conference on Web engineering
A fuzzy trust evaluation method for knowledge sharing in virtual enterprises
Computers and Industrial Engineering
A requirements-driven trust framework for secure interoperation in open environments
iTrust'06 Proceedings of the 4th international conference on Trust Management
A trust assignment model based on alternate actions payoff
iTrust'06 Proceedings of the 4th international conference on Trust Management
Knowledge kanban system for virtual research and development
Robotics and Computer-Integrated Manufacturing
Hi-index | 0.00 |
Trust management is an important aspect of information security in an organisation. It involves the complexity of relationships among people, computers and the organisational system. It becomes even more complex in the virtual enterprise environment where cross-organisational activities are involved. This paper presents a new paradigm for establishing trust across multiple organisations for external users on extranets. In our approach, the authorities of organisations administer their local users and at the same time can act as trust agents for distributing trust management information for other users in the virtual enterprise. Trust is propagated in the form of trust tokens through the web of trust. After collecting these trust tokens as recommendations, a new users can submit them to his destined organisation in order to acquire secure trust relation. By representing trust with a quantitative and comparable value, an automated mechanism for composing trust tokens is demonstrated.