Optimality of multi-domain protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Towards acceptable key escrow systems
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
Path independence for authentication in large-scale systems
Proceedings of the 4th ACM conference on Computer and communications security
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Resilient Authentication Using Path Independence
IEEE Transactions on Computers
The right type of trust for distributed systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
A fuzzy model of reputation in multi-agent systems
Proceedings of the fifth international conference on Autonomous agents
Trust: benefits, models, and mechanisms
Secure Internet programming
Automated cross-organisational trust establishment on extranets
ITVE '01 Proceedings of the workshop on Information technology for virtual enterprises
Trust in Secure Communication Systems - The Concept, Representations, and Reasoning Techniques
AI '02 Proceedings of the 15th Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
An Axiomatic Basis for Reasoning about Trust in PKIs
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Logical Foundations for Reasoning about Trust in Secure Digital Communication
AI '01 Proceedings of the 14th Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
Belief Revision Process Based on Trust: Agents Evaluating Reputation of Information Sources
Proceedings of the workshop on Deception, Fraud, and Trust in Agent Societies held during the Autonomous Agents Conference: Trust in Cyber-societies, Integrating the Human and Artificial Perspectives
Revised Papers from the 8th International Workshop on Security Protocols
Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Trust Relationships in a Mobile Agent System
MA '01 Proceedings of the 5th International Conference on Mobile Agents
Measuring Behaviour-Based Trust between Negotiating Agents
CIA '02 Proceedings of the 6th International Workshop on Cooperative Information Agents VI
Location Stamps for Digital Signatures: A New Service for Mobile Telephone Networks
ICN '01 Proceedings of the First International Conference on Networking-Part 2
Preserving Privacy in Distributed Delegation with Fast Certificates
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Reasoning about the role of information systems in trusting decisions
ISTA '01 Proceedings of the 2001 international conference on Information systems technology and its applications - Volume P-2
Guarding the next Internet frontier: countering denial of information attacks
Proceedings of the 2002 workshop on New security paradigms
Ant-Based Adaptive Trust Evidence Distribution in MANET
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Authentication protocols for ad hoc networks: taxonomy and research issues
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Journal of the American Society for Information Science and Technology
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Integrating trust reasonings into node behavior in olsr
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Formalising theories of trust for authentication protocols
Information Systems Frontiers
Autonomic trust reasoning enables misbehavior detection in OLSR
Proceedings of the 2008 ACM symposium on Applied computing
Proceedings of the 1st international conference on Autonomic computing and communication systems
PLUS: parameterised localised trust management-based security framework for sensor networks
International Journal of Sensor Networks
Adjustable Trust Model for Access Control
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
ALPACA: a lightweight platform for analyzing claim acceptability
Proceedings of the 2nd ACM workshop on Information credibility on the web
Analytic Tableaux for Verifying Agent Beliefs
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
An interoperable context sensitive model of trust
Journal of Intelligent Information Systems
Modal tableaux for verifying stream authentication protocols
Autonomous Agents and Multi-Agent Systems
Journal of Systems Architecture: the EUROMICRO Journal
Theories of Trust for Communication Protocols
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
Average Transitive Trustworthy Degrees for Trustworthy Networks
RSKT '09 Proceedings of the 4th International Conference on Rough Sets and Knowledge Technology
Max-Minimum Algorithm for Trust Transitivity in Trustworthy Networks
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Analysis of authentication protocols in agent-based systems using labeled tableaux
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on cybernetics and cognitive informatics
Application Security Models for Mobile Agent Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
Using probabilistic argumentation for key validation in public-key cryptography
International Journal of Approximate Reasoning
A process-oriented model for authentication on the basis of a coloured Petri net
BPM'03 Proceedings of the 2003 international conference on Business process management
A service-oriented trust management framework
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
An introduction to the role based trust management framework RT
Foundations of security analysis and design IV
The impact of dynamic adversarial attacks on the stability of heterogeneous multimedia networks
Computer Communications
Using trust-based information aggregation for predicting security level of systems
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Security policies in distributed CSCW and workflow systems
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Trust-based security level evaluation using Bayesian belief networks
Transactions on computational science X
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Trust as a key to improving recommendation systems
iTrust'05 Proceedings of the Third international conference on Trust Management
A formal definition for trust in distributed systems
ISC'05 Proceedings of the 8th international conference on Information Security
SONR: A reliable reputation system of self-organized network
Journal of Network and Computer Applications
Hi-index | 0.00 |
The notion of trust is fundamental in inter-domain Authentication protocols. The goal of this paper is to Develop an effective formalism for explicit expressions oftrust relations between entities involved in authenticationprotocols. Different relevant types of trust are identifiedand classified. A formalism for expressing trust relations is presented along with an algorithm for deriving trust relations from recommendations. The advantages of that approach are demonstrated by analyzing and comparing the trust relation requirements of a few known authentication protocols.