Compliance Checking in the PolicyMaker Trust Management System
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
ConChord: Cooperative SDSI Certificate Storage and Name Resolution
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Trust-Based Security Model and Enforcement Mechanism for Web Service Technology
TES '02 Proceedings of the Third International Workshop on Technologies for E-Services
A Practical Distributed Authorization System for GARA
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
A Unified Scheme for Resource Protection in Automated Trust Negotiation
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A State-Transition Model of Trust Management and Access Control
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
X-FEDERATE: A Policy Engineering Framework for Federated Access Management
IEEE Transactions on Software Engineering
A Model for Trust Metrics Analysis
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Path-Based Access Control for Enterprise Networks
ISC '08 Proceedings of the 11th international conference on Information Security
Compact and Anonymous Role-Based Authorization Chain
ACM Transactions on Information and System Security (TISSEC)
TrustMAS: Trusted Communication Platform for Multi-Agent Systems
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
Trust Management Model and Evaluation Method for Online Travel
Computer Supported Cooperative Work in Design IV
Delegating Privileges over Finite Resources: A Quota Based Delegation Approach
Formal Aspects in Security and Trust
The pervasive trust foundation for security in next generation networks
Proceedings of the 2010 workshop on New security paradigms
Independently verifiable decentralized role-based delegation
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Practitioner's challenges in designing trust into online systems
Journal of Theoretical and Applied Electronic Commerce Research
Nexus authorization logic (NAL): Design rationale and applications
ACM Transactions on Information and System Security (TISSEC)
A formal approach towards measuring trust in distributed systems
Proceedings of the 2011 ACM Symposium on Applied Computing
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Proceedings of the 16th ACM symposium on Access control models and technologies
Enforcing trust in pervasive computing with trusted computing technology
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Virtual fingerprinting as a foundation for reputation in open systems
iTrust'06 Proceedings of the 4th international conference on Trust Management
A novel protocol for communicating reputation in p2p networks
iTrust'06 Proceedings of the 4th international conference on Trust Management
Synergy: a policy-driven, trust-aware information dissemination framework
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Toward trust management in autonomic and coordination applications
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Trust lifecycle management in a global computing environment
GC'04 Proceedings of the 2004 IST/FET international conference on Global Computing
Supporting dynamically changing authorizations in pervasive communication systems
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
iTrust'05 Proceedings of the Third international conference on Trust Management
iTrust'05 Proceedings of the Third international conference on Trust Management
On the importance of composability of ad hoc mobile middleware and trust management
ISAS'05 Proceedings of the Second international conference on Service Availability
A formal definition for trust in distributed systems
ISC'05 Proceedings of the 8th international conference on Information Security
An approach to trust management challenges for critical infrastructures
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
Bring efficient connotation expressible policies to trust management
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Analysis and modelling of trust in distributed information systems
ICISS'05 Proceedings of the First international conference on Information Systems Security
A distributed authorization system with mobile usage control policies
EUROCAST'11 Proceedings of the 13th international conference on Computer Aided Systems Theory - Volume Part I
PlexC: a policy language for exposure control
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Rule-based policy representation and reasoning for the semantic web
RW'07 Proceedings of the Third international summer school conference on Reasoning Web
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
A social network-based trust-aware propagation model for P2P systems
Knowledge-Based Systems
Trust management of services in cloud environments: Obstacles and solutions
ACM Computing Surveys (CSUR)
A formal distributed network monitoring approach for enhancing trust management systems
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems
Adaptiveness and social-compliance in trust management within virtual communities
Web Intelligence and Agent Systems - Web Intelligence and Communities
Hi-index | 0.00 |
This paper discusses the rationale for designing a simple trust-management system for public-key infrastructures, called KeyNote. The motivating principles are expressibility, simplicity, and extensibility. We believe that none of the existing public-key infrastructure proposals provide as good a combination of these three factors.