Path independence for authentication in large-scale systems
Proceedings of the 4th ACM conference on Computer and communications security
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Resilient Authentication Using Path Independence
IEEE Transactions on Computers
The right type of trust for distributed systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
Trust: benefits, models, and mechanisms
Secure Internet programming
Automated cross-organisational trust establishment on extranets
ITVE '01 Proceedings of the workshop on Information technology for virtual enterprises
Trust Management and Whether to Delegate
Revised Papers from the 9th International Workshop on Security Protocols
Revised Papers from the 8th International Workshop on Security Protocols
Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys
FC '99 Proceedings of the Third International Conference on Financial Cryptography
On the Complexity of Public-Key Certificate Validation
ISC '01 Proceedings of the 4th International Conference on Information Security
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Formalising key distribution in the presence of trust using object-Z
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
Attack-Resistance of Computational Trust Models
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Ant-Based Adaptive Trust Evidence Distribution in MANET
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
Engineering human trust in mobile system collaborations
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering
The role of trust in distributed design
Artificial Intelligence for Engineering Design, Analysis and Manufacturing
How to incorporate revocation status information into the trust metrics for public-key certification
Proceedings of the 2005 ACM symposium on Applied computing
Dependable Dynamic Source Routing without a trusted third party
ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
Semantic constraints for trust transitivity
APCCM '05 Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling - Volume 43
Authentification par la méfiance dans les systèmes pervasifs
UbiMob '05 Proceedings of the 2nd French-speaking conference on Mobility and ubiquity computing
Propagation Models for Trust and Distrust in Social Networks
Information Systems Frontiers
Establishing recommendation trust relationships for internetwares
ACM SIGSOFT Software Engineering Notes
P2P reputation management: probabilistic estimation vs. social networks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Trust-enhanced visibility for personalized document recommendations
Proceedings of the 2006 ACM symposium on Applied computing
BambooTrust: practical scalable trust management for global public computing
Proceedings of the 2006 ACM symposium on Applied computing
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
MSBR: a multi-path routing approach based on end-to-end reliability
Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
Inferring binary trust relationships in Web-based social networks
ACM Transactions on Internet Technology (TOIT)
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Investigating interactions of trust and interest similarity
Decision Support Systems
A survey of trust in computer science and the Semantic Web
Web Semantics: Science, Services and Agents on the World Wide Web
Attack-resistant trust metrics for public key certification
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Countering web spam with credibility-based link analysis
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
Toward measuring network security using attack graphs
Proceedings of the 2007 ACM workshop on Quality of protection
Research on the Recommending Method Used in C2C Online Trading
WI-IATW '07 Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops
Vulnerability analysis of certificate graphs
International Journal of Security and Networks
Building trust in peer-to-peer systems: a review
International Journal of Security and Networks
Network service sharing infrastructure: service authentication and authorization revocation
ICCOM'05 Proceedings of the 9th WSEAS International Conference on Communications
Challenges and architectural approaches for authenticating mobile users
Proceedings of the 1st international workshop on Software architectures and mobility
Private Information: To Reveal or not to Reveal
ACM Transactions on Information and System Security (TISSEC)
Adjustable Trust Model for Access Control
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
KAF: Kalman Filter Based Adaptive Maintenance for Dependability of Composite Services
CAiSE '08 Proceedings of the 20th international conference on Advanced Information Systems Engineering
Modeling Dynamics of Relative Trust of Competitive Information Agents
CIA '08 Proceedings of the 12th international workshop on Cooperative Information Agents XII
Measuring network security using dynamic bayesian network
Proceedings of the 4th ACM workshop on Quality of protection
ALPACA: a lightweight platform for analyzing claim acceptability
Proceedings of the 2nd ACM workshop on Information credibility on the web
Self-optimization of secure web services
Computer Communications
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
An interoperable context sensitive model of trust
Journal of Intelligent Information Systems
Requirements of federated trust management for service-oriented architectures
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Towards a precise semantics for authenticity and trust
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Trust Management Model and Evaluation Method for Online Travel
Computer Supported Cooperative Work in Design IV
Implementing Decisional Trust: A FIRST APPROACH FOR SMART RELIABLE SYSTEMS
Cybernetics and Systems
Dynamics, Robustness and Fragility of Trust
Formal Aspects in Security and Trust
Inter-cluster routing authentication for ad hoc networks by a hierarchical key scheme
Journal of Computer Science and Technology
Efficient Information Propagation in Service Routing for Next Generation Network
RSKT '09 Proceedings of the 4th International Conference on Rough Sets and Knowledge Technology
Average Transitive Trustworthy Degrees for Trustworthy Networks
RSKT '09 Proceedings of the 4th International Conference on Rough Sets and Knowledge Technology
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
Social network-based trust in prioritized default logic
AAAI'06 proceedings of the 21st national conference on Artificial intelligence - Volume 2
Enforcing access control in Web-based social networks
ACM Transactions on Information and System Security (TISSEC)
Max-Minimum Algorithm for Trust Transitivity in Trustworthy Networks
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
A Metric Model for Trustworthiness of Softwares
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
An Adaptive Agent Model Estimating Human Trust in Information Sources
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 02
Incorporating trust and reputation in the DSR protocol for dependable routing
Computer Communications
P2P reputation management: Probabilistic estimation vs. social networks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
A weighted closeness-based trust combination model
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Probabilistic prediction of peers' performance in P2P networks
Engineering Applications of Artificial Intelligence
Using probabilistic argumentation for key validation in public-key cryptography
International Journal of Approximate Reasoning
Managing trust and reputation in the XenoServer open platform
iTrust'03 Proceedings of the 1st international conference on Trust management
Trust-based protection of software component users and designers
iTrust'03 Proceedings of the 1st international conference on Trust management
Statistical trustability (conceptual work)
iTrust'03 Proceedings of the 1st international conference on Trust management
A closer look at PKI: security and efficiency
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
A process-oriented model for authentication on the basis of a coloured Petri net
BPM'03 Proceedings of the 2003 international conference on Business process management
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
Measuring the overall security of network configurations using attack graphs
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
A new reputation mechanism against dishonest recommendations in P2P systems
WISE'07 Proceedings of the 8th international conference on Web information systems engineering
ICRep: an incentive compatible reputation mechanism for P2P systems
WISA'07 Proceedings of the 8th international conference on Information security applications
Using trust-based information aggregation for predicting security level of systems
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Quantifying and qualifying trust: spectral decomposition of trust networks
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
A novel probabilistic trust evaluation algorithm
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
A formal approach towards measuring trust in distributed systems
Proceedings of the 2011 ACM Symposium on Applied Computing
Trust-based security level evaluation using Bayesian belief networks
Transactions on computational science X
GRAP: Grey risk assessment based on projection in ad hoc networks
Journal of Parallel and Distributed Computing
ICCCI'11 Proceedings of the Third international conference on Computational collective intelligence: technologies and applications - Volume Part I
An authentication trust metric for federated identity management systems
STM'10 Proceedings of the 6th international conference on Security and trust management
Revealing beliefs influencing trust between members of the czech informatics community
SocInfo'11 Proceedings of the Third international conference on Social informatics
Trust metrics for the SPKI/SDSI authorisation framework
ATVA'11 Proceedings of the 9th international conference on Automated technology for verification and analysis
Appraisal and reporting of security assurance at operational systems level
Journal of Systems and Software
Evaluating peer behaviour in distributed participatory sensing
WSEAS Transactions on Computers
Enforcing trust in pervasive computing with trusted computing technology
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Point-based trust: define how much privacy is worth
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Estimating the relative trustworthiness of information sources in security solution evaluation
iTrust'06 Proceedings of the 4th international conference on Trust Management
Implementing credential networks
iTrust'06 Proceedings of the 4th international conference on Trust Management
CBTM: a trust model with uncertainty quantification and reasoning for pervasive computing
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Toward trust management in autonomic and coordination applications
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
A dynamic trust model based on feedback control mechanism for p2p applications
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Trust model based on similarity measure of vectors in p2p networks
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
Maximizing utility of mobile agent based e-commerce applications with trust enhanced security
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
A trust model based on bayesian approach
AWIC'05 Proceedings of the Third international conference on Advances in Web Intelligence
Semantic web recommender systems
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
SONR: A reliable reputation system of self-organized network
Journal of Network and Computer Applications
Combining provenance with trust in social networks for semantic web content filtering
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Computing of trust in ad-hoc networks
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
A time-frame based trust model for p2p systems
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Optimal trust mining and computing on keyed mapreduce
ESSoS'12 Proceedings of the 4th international conference on Engineering Secure Software and Systems
Building autonomic and secure service oriented architectures with MAWeS
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
A trust evolution model for P2P networks
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Formal analysis of secure bootstrap in trusted computing
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Journal of Systems and Software
Web Intelligence and Agent Systems
Hi-index | 0.00 |