Path independence for authentication in large-scale systems
Proceedings of the 4th ACM conference on Computer and communications security
Resilient Authentication Using Path Independence
IEEE Transactions on Computers
Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
Regulating service access and information release on the Web
Proceedings of the 7th ACM conference on Computer and communications security
Fine grained access control for SOAP E-services
Proceedings of the 10th international conference on World Wide Web
Trust: benefits, models, and mechanisms
Secure Internet programming
An authorization model for a public key management service
ACM Transactions on Information and System Security (TISSEC)
COCA: A secure distributed online certification authority
ACM Transactions on Computer Systems (TOCS)
A uniform framework for regulating service access and information release on the web
Journal of Computer Security
Delegation logic: A logic-based approach to distributed authorization
ACM Transactions on Information and System Security (TISSEC)
An Axiomatic Basis for Reasoning about Trust in PKIs
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Outbound Authentication for Programmable Secure Coprocessors
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys
FC '99 Proceedings of the Third International Conference on Financial Cryptography
On the Complexity of Public-Key Certificate Validation
ISC '01 Proceedings of the 4th International Conference on Information Security
Security of Electronic Business Applications - Structure and Quantification
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
A Logic-based Knowledge Representation for Authorization with Delegation
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Attack-Resistance of Computational Trust Models
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Indra: A peer-to-peer approach to network intrusion detection and prevention
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Technologies for Trust in Electronic Commerce
Electronic Commerce Research
Is hierarchical public-key certification the next target for hackers?
Communications of the ACM - Interactive immersion in 3D graphics
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
How to incorporate revocation status information into the trust metrics for public-key certification
Proceedings of the 2005 ACM symposium on Applied computing
Propagation Models for Trust and Distrust in Social Networks
Information Systems Frontiers
Operating System Level Support for Resource Sharing Across Multiple Domains
HPCASIA '05 Proceedings of the Eighth International Conference on High-Performance Computing in Asia-Pacific Region
Inferring binary trust relationships in Web-based social networks
ACM Transactions on Internet Technology (TOIT)
Investigating interactions of trust and interest similarity
Decision Support Systems
On interdomain routing security and pretty secure BGP (psBGP)
ACM Transactions on Information and System Security (TISSEC)
Attack-resistant trust metrics for public key certification
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Vulnerability analysis of certificate graphs
International Journal of Security and Networks
VegaFS: file sharing crossing multiple domains
International Journal of High Performance Computing and Networking
A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures
Journal of Computer Security
A reputation system for electronic negotiations
Computer Standards & Interfaces
Trust-Rated Authentication for Domain-Structured Distributed Systems
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Towards a precise semantics for authenticity and trust
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Formal Modelling of PKI Based Authentication
Electronic Notes in Theoretical Computer Science (ENTCS)
A calculus of trust and its application to PKI and identity management
Proceedings of the 8th Symposium on Identity and Trust on the Internet
Dynamics, Robustness and Fragility of Trust
Formal Aspects in Security and Trust
TEREC: Trust Evaluation and Reputation Exchange for Cooperative Intrusion Detection in MANETs
CNSR '09 Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference
Trust Enhanced Authorization for Mobile Agents
EC-Web 2009 Proceedings of the 10th International Conference on E-Commerce and Web Technologies
Reasoning with Uncertain and Conflicting Opinions in Open Reputation Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
Reasoning about attribute authenticity in a web environment
AAAI'07 Proceedings of the 22nd national conference on Artificial intelligence - Volume 2
Case study: trust establishment in personal area networks
ISWPC'09 Proceedings of the 4th international conference on Wireless pervasive computing
Survivable keying for wireless ad hoc networks
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Using probabilistic argumentation for key validation in public-key cryptography
International Journal of Approximate Reasoning
Managing trust and reputation in the XenoServer open platform
iTrust'03 Proceedings of the 1st international conference on Trust management
Trusting collaboration in global computing systems
iTrust'03 Proceedings of the 1st international conference on Trust management
Distributed instrusion prevention in active and extensible networks
IWAN'04 Proceedings of the 6th IFIP TC6 international working conference on Active networks
A closer look at PKI: security and efficiency
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
A process-oriented model for authentication on the basis of a coloured Petri net
BPM'03 Proceedings of the 2003 international conference on Business process management
Program partitioning using dynamic trust models
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
A model for distribution and revocation of certificates
ICGT'10 Proceedings of the 5th international conference on Graph transformations
Quantifying and qualifying trust: spectral decomposition of trust networks
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
The need for interoperable reputation systems
iNetSec'10 Proceedings of the 2010 IFIP WG 11.4 international conference on Open research problems in network security
MundoMessage: enabling trustworthy ubiquitous emergency communication
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
A formal approach towards measuring trust in distributed systems
Proceedings of the 2011 ACM Symposium on Applied Computing
Incentivizing responsible networking via introduction-based routing
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Investigating the openPGP web of trust
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Trust metrics for the SPKI/SDSI authorisation framework
ATVA'11 Proceedings of the 9th international conference on Automated technology for verification and analysis
Designing a secure storage repository for sharing scientific datasets using public clouds
Proceedings of the second international workshop on Data intensive computing in the clouds
Transitive trust in mobile scenarios
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Trust-based route selection in dynamic source routing
iTrust'06 Proceedings of the 4th international conference on Trust Management
Implementing credential networks
iTrust'06 Proceedings of the 4th international conference on Trust Management
Use of a validation authority to provide risk management for the PKI relying party
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Chord-PKI: A distributed trust infrastructure based on P2P networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Towards enhancing trust on chinese e-commerce
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Modeling public key infrastructures in the real world
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Modeling long-term signature validation for resolution of dispute
TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications
Certification validation: back to the past
EuroPKI'11 Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications
Formal analysis of secure bootstrap in trusted computing
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
International Journal of Systems and Service-Oriented Engineering
Certification validation: Back to the past
Computers & Mathematics with Applications
Hi-index | 0.00 |