Security functions for a file repository
ACM SIGOPS Operating Systems Review
Personal security agent: KQML-based PKI
AGENTS '98 Proceedings of the second international conference on Autonomous agents
Designing a generic payment service
IBM Systems Journal
History-based access control for mobile code
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Generalized certificate revocation
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
On the decidability of accessibility problems (extended abstract)
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Enabling technologies for role based online decision engines
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
XML document security based on provisional authorization
Proceedings of the 7th ACM conference on Computer and communications security
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet
Proceedings of the 7th ACM conference on Computer and communications security
Cross-domain one-shot authorization using smart cards
Proceedings of the 7th ACM conference on Computer and communications security
Implementing a distributed firewall
Proceedings of the 7th ACM conference on Computer and communications security
OceanStore: an architecture for global-scale persistent storage
ACM SIGPLAN Notices
On specifying security policies for web documents with an XML-based language
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A rule-based framework for role based delegation
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
OceanStore: an architecture for global-scale persistent storage
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Trust: benefits, models, and mechanisms
Secure Internet programming
The role of trust management in distributed systems security
Secure Internet programming
Distributed access-rights management with delegation certificates
Secure Internet programming
Secure Internet programming
History-based access control for mobile code
Secure Internet programming
Distributed credential chain discovery in trust management: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
An authorization model for a public key management service
ACM Transactions on Information and System Security (TISSEC)
ACM Transactions on Information and System Security (TISSEC)
Towards usage control models: beyond traditional access control
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Automated cross-organisational trust establishment on extranets
ITVE '01 Proceedings of the workshop on Information technology for virtual enterprises
Deferring trust in fluid replication
EW 9 Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system
Design and implementation of the idemix anonymous credential system
Proceedings of the 9th ACM conference on Computer and communications security
A uniform framework for regulating service access and information release on the web
Journal of Computer Security
Delegation logic: A logic-based approach to distributed authorization
ACM Transactions on Information and System Security (TISSEC)
IEEE Internet Computing
Agents, trust, and information access on the semantic web
ACM SIGMOD Record
Collective Value of QoS: A Performance Measure Framework for Distributed Heterogeneous Networks
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Towards Policy-Driven Agent Development and Management
MATA '00 Proceedings of the Second International Workshop on Mobile Agents for Telecommunication Applications
Scalable Resource Control in Active Networks
IWAN '00 Proceedings of the Second International Working Conference on Active Networks
Certificate Distribution with Local Autonomy
IWAN '00 Proceedings of the Second International Working Conference on Active Networks
Practical Network Applications on a Lightweight Active Management Environment
IWAN '01 Proceedings of the IFIP-TC6 Third International Working Conference on Active Networks
DATALOG with Constraints: A Foundation for Trust Management Languages
PADL '03 Proceedings of the 5th International Symposium on Practical Aspects of Declarative Languages
An Axiomatic Basis for Reasoning about Trust in PKIs
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Authorization Based on Evidence and Trust
DaWaK 2000 Proceedings of the 4th International Conference on Data Warehousing and Knowledge Discovery
Policy-Based Resource Management
CAiSE '99 Proceedings of the 11th International Conference on Advanced Information Systems Engineering
Selling Bits: A Matter of Creating Consumer Value
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
MIERA: Method for Inter-Enterprise Role-Based Authorization
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Transactional Security for a Distributed Reputation Management System
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Relying Party Credentials Framework
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
The Set and Function Approach to Modeling Authorization in Distributed Systems
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Trust-Based Security Model and Enforcement Mechanism for Web Service Technology
TES '02 Proceedings of the Third International Workshop on Technologies for E-Services
Optimistic Trust with Realistic eNvestigators (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
Overview of the AT&T Labs Trust-Management Project (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
KeyNote: Trust Management for Public-Key Infrastructures (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
The Resurrecting Duckling - What Next?
Revised Papers from the 8th International Workshop on Security Protocols
Revised Papers from the 8th International Workshop on Security Protocols
Trust: A Collision of Paradigms
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Offline Micropayments without Trusted Hardware
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance
FC '99 Proceedings of the Third International Conference on Financial Cryptography
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Preserving Privacy in Distributed Delegation with Fast Certificates
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Supporting E-commerce in Wireless Networks
IMWS '01 Revised Papers from the NSF Workshop on Developing an Infrastructure for Mobile and Wireless Systems
Developing Electronic Trust Policies Using a Risk Management Model
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
A secure infrastructure for service discovery and access in pervasive computing
Mobile Networks and Applications - Security in mobile computing environments
Distributed credential chain discovery in trust management
Journal of Computer Security
Manageable access control for CORBA
Journal of Computer Security - Special issue on ESORICS 2000
On context in authorization policy
Proceedings of the eighth ACM symposium on Access control models and technologies
A Logic-based Knowledge Representation for Authorization with Delegation
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
A Logic for SDSI's Linked Local Name Spaces: Preliminary Version
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Authorization Methods for E-Commerce Applications
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Guarding the next Internet frontier: countering denial of information attacks
Proceedings of the 2002 workshop on New security paradigms
A State-Transition Model of Trust Management and Access Control
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Policies in Accountable Contracts
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
The Specification and Enforcement of Advanced Security Policies
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Payment technologies for E-commerce
Towards a formal notion of trust
Proceedings of the 5th ACM SIGPLAN international conference on Principles and practice of declaritive programming
A rule-based framework for role-based delegation and revocation
ACM Transactions on Information and System Security (TISSEC)
How much is "enough"? Risk in Trust-Based Access Control
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Attack-Resistance of Computational Trust Models
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
SHARP: an architecture for secure resource peering
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Relying Party Credentials Framework
Electronic Commerce Research
Certificate-based access control policies description language
Artificial intelligence and security in computing systems
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
An approach to certificate path discovery in mobile Ad Hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Towards a credential-based implementation of compound access control policies
Proceedings of the ninth ACM symposium on Access control models and technologies
Role-based cascaded delegation
Proceedings of the ninth ACM symposium on Access control models and technologies
Using trust and risk in role-based access control policies
Proceedings of the ninth ACM symposium on Access control models and technologies
Trust Negotiations: Concepts, Systems, and Languages
Computing in Science and Engineering
Foolproof Security Measures and Challenges Within
Wireless Personal Communications: An International Journal
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
Efficient attribute authentication with applications to ad hoc networks
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Local vs Global Policies and Centralized vs Decentralized Control in Virtual Communities of Agents
WI '04 Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence
Real-Time Databases and Data Services
Real-Time Systems
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Engineering human trust in mobile system collaborations
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering
Co-Operation in the Digital Age — Engendering Trust in Electronic Environments
BT Technology Journal
Using certified policies to regulate E-commerce transactions
ACM Transactions on Internet Technology (TOIT)
Autonomous trust construction in multi-agent systems: a graph theory methodology
Advances in Engineering Software
Integrity constraints in trust management
Proceedings of the tenth ACM symposium on Access control models and technologies
Beyond proof-of-compliance: security analysis in trust management
Journal of the ACM (JACM)
Reputation-based trust management
Journal of Computer Security - Special issue on WITS'03
Efficient support for enterprise delegation policies
Proceedings of the 2005 ACM symposium on Applied computing
Component based trust management in the context of a virtual organization
Proceedings of the 2005 ACM symposium on Applied computing
Timed constraint programming: a declarative approach to usage control
PPDP '05 Proceedings of the 7th ACM SIGPLAN international conference on Principles and practice of declarative programming
Policy-hiding access control in open environment
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
Tussle in cyberspace: defining tomorrow's internet
IEEE/ACM Transactions on Networking (TON)
Towards multilateral secure digital rights distribution infrastructures
Proceedings of the 5th ACM workshop on Digital rights management
Propagation Models for Trust and Distrust in Social Networks
Information Systems Frontiers
Secure event types in content-based, multi-domain publish/subscribe systems
SEM '05 Proceedings of the 5th international workshop on Software engineering and middleware
Security in WebCom: addressing naming issues for a web services architecture
SWS '04 Proceedings of the 2004 workshop on Secure web service
ACM Transactions on Computer-Human Interaction (TOCHI)
Towards a dynamic multi-policy dissemination control model: (DMDCON)
ACM SIGMOD Record
On classifying access control implementations for distributed systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
Integrating presence inference into trust management for ubiquitous systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
Architectural support for trust models in decentralized applications
Proceedings of the 28th international conference on Software engineering
Towards content trust of web resources
Proceedings of the 15th international conference on World Wide Web
Inferring dynamic credentials for rôle-based trust management
Proceedings of the 8th ACM SIGPLAN international conference on Principles and practice of declarative programming
Resolving islands of security problem for DNSSEC
Proceedings of the 2006 international conference on Wireless communications and mobile computing
An ontology of trust: formal semantics and transitivity
ICEC '06 Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet
Trust network analysis with subjective logic
ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48
A method for access authorisation through delegation networks
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Attribute-Based Access Control with Hidden Policies and Hidden Credentials
IEEE Transactions on Computers
Protecting file systems with transient authentication
Wireless Networks
Enforcing cooperative resource sharing in untrusted P2P computing environments
Mobile Networks and Applications
Flexible network monitoring with FLAME
Computer Networks: The International Journal of Computer and Telecommunications Networking - Active networks
A theoretical inter-organizational trust-based security model
The Knowledge Engineering Review
Methods and limitations of security policy reconciliation
ACM Transactions on Information and System Security (TISSEC)
Safety in automated trust negotiation
ACM Transactions on Information and System Security (TISSEC)
On Relating and Integrating Two Trust Management Frameworks
Electronic Notes in Theoretical Computer Science (ENTCS)
Trust management services in relational databases
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Towards secure information sharing using role-based delegation
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Enforcing provisioning and authorization policy in the Antigone system
Journal of Computer Security
Automating security configuration for the Grid
Scientific Programming - International Symposium of Parallel and Distributed Computing & International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogenous Networks
Simplification and analysis of transitive trust networks
Web Intelligence and Agent Systems
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Improving host security with system call policies
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Certificate-based access control for widely distributed resources
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Adaptive Trust Negotiation and Access Control for Grids
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
A survey of trust in computer science and the Semantic Web
Web Semantics: Science, Services and Agents on the World Wide Web
A posteriori compliance control
Proceedings of the 12th ACM symposium on Access control models and technologies
Towards a framework for handling disputes in payment systems
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Token-mediated certification and electronic commerce
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Unified support for heterogeneous security policies in distributed systems
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Building systems that flexibly control downloaded executable context
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Implementing internet key exchange (IKE)
ATEC '00 Proceedings of the annual conference on USENIX Annual Technical Conference
Engineering Trust Management into Software Models
MISE '07 Proceedings of the International Workshop on Modeling in Software Engineering
An End-To-End Approach to Distributed Policy Language Implementation
Electronic Notes in Theoretical Computer Science (ENTCS)
On the Decidability of the Safety Problem for Access Control Policies
Electronic Notes in Theoretical Computer Science (ENTCS)
A Uniform Framework for Security and Trust Modeling and Analysis with Crypto-CCS
Electronic Notes in Theoretical Computer Science (ENTCS)
A type discipline for authorization policies
ACM Transactions on Programming Languages and Systems (TOPLAS) - Special Issue ESOP'05
Preserving data privacy in outsourcing data aggregation services
ACM Transactions on Internet Technology (TOIT) - Special Issue on the Internet and Outsourcing
On optimizing compatible security policies in wireless networks
EURASIP Journal on Wireless Communications and Networking
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
Provisions and obligations in policy management and security applications
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Type-based cryptographic operations
Journal of Computer Security - Special issue on CSFW15
On the deployment of a real scalable delegation service
Information Security Tech. Report
Trust management for trusted computing platforms in web services
Proceedings of the 2007 ACM workshop on Scalable trusted computing
Access control for the services oriented architecture
Proceedings of the 2007 ACM workshop on Secure web services
Security-by-contract for web services
Proceedings of the 2007 ACM workshop on Secure web services
Proceedings of the 1st international conference on Bio inspired models of network, information and computing systems
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
The complexity of fixed point models of trust in distributed networks
Theoretical Computer Science
Towards content trust of web resources
Web Semantics: Science, Services and Agents on the World Wide Web
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
ACM Transactions on Information and System Security (TISSEC)
Trust-enhanced Security in Location-based Adaptive Authentication
Electronic Notes in Theoretical Computer Science (ENTCS)
Access control policies and languages
International Journal of Computational Science and Engineering
An improved trust model in agent-mediated e-commerce
International Journal of Intelligent Systems Technologies and Applications
International Journal of Information Technology and Management
Reputation-based framework for high integrity sensor networks
ACM Transactions on Sensor Networks (TOSN)
UMLtrust: towards developing trust-aware software
Proceedings of the 2008 ACM symposium on Applied computing
Propagating multitrust within trust networks
Proceedings of the 2008 ACM symposium on Applied computing
Offline count-limited certificates
Proceedings of the 2008 ACM symposium on Applied computing
Proceedings of the 1st international conference on Autonomic computing and communication systems
Featuring trust and reputation management systems for constrained hardware devices
Proceedings of the 1st international conference on Autonomic computing and communication systems
Trusting the Trust-Model in mobile wireless ad-hoc network settings
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Usage control platformization via trustworthy SELinux
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Two-level trust-based decision model for information assurance in a virtual organization
Decision Support Systems
Trust on the world wide web: a survey
Foundations and Trends in Web Science
Detecting and resolving policy misconfigurations in access-control systems
Proceedings of the 13th ACM symposium on Access control models and technologies
Using First-Order Logic to Reason about Policies
ACM Transactions on Information and System Security (TISSEC)
Authorization in trust management: Features and foundations
ACM Computing Surveys (CSUR)
Decentralized access control in distributed file systems
ACM Computing Surveys (CSUR)
PLUS: parameterised localised trust management-based security framework for sensor networks
International Journal of Sensor Networks
Securing distributed systems with information flow control
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
Trust-based evolutionary game model assisting AODV routing against selfishness
Journal of Network and Computer Applications
Enabling attribute delegation in ubiquitous environments
Mobile Networks and Applications
Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Need to Know: Questions and the Paradox of Epistemic Obligation
DEON '08 Proceedings of the 9th international conference on Deontic Logic in Computer Science
On the Applicability of Trusted Computing in Distributed Authorization Using Web Services
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Evaluating the Wisdom of Crowds in Assessing Phishing Websites
Financial Cryptography and Data Security
A Model for Trust Metrics Analysis
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Path-Based Access Control for Enterprise Networks
ISC '08 Proceedings of the 11th international conference on Information Security
A trust-based security system for ubiquitous and pervasive computing environments
Computer Communications
Web Semantics: Science, Services and Agents on the World Wide Web
Towards Role Based Trust Management without Distributed Searching of Credentials
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Protecting Information Sharing in Distributed Collaborative Environment
Advanced Web and NetworkTechnologies, and Applications
TrustMAS: Trusted Communication Platform for Multi-Agent Systems
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
Security in Distributed Applications
Advances in Software Engineering
Requirements of federated trust management for service-oriented architectures
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Managing trust in services oriented architectures
AIC'08 Proceedings of the 8th conference on Applied informatics and communications
Trust Management Model and Evaluation Method for Online Travel
Computer Supported Cooperative Work in Design IV
QuanTM: a quantitative trust management system
Proceedings of the Second European Workshop on System Security
Journal of Systems Architecture: the EUROMICRO Journal
Incorporating accountability into internet email
Proceedings of the 2009 ACM symposium on Applied Computing
Optimal Privacy-Aware Path in Hippocratic Databases
DASFAA '09 Proceedings of the 14th International Conference on Database Systems for Advanced Applications
Dynamics, Robustness and Fragility of Trust
Formal Aspects in Security and Trust
Formal Aspects in Security and Trust
Delegating Privileges over Finite Resources: A Quota Based Delegation Approach
Formal Aspects in Security and Trust
Computer Networks: The International Journal of Computer and Telecommunications Networking
Towards a dynamic and composable model of trust
Proceedings of the 14th ACM symposium on Access control models and technologies
DynamicTrust: three-dimensional dynamic computing model of trust in peer-to-peer networks
Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation
Theories of Trust for Communication Protocols
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
A trust-based approach to estimating the confidence of the software system in open environments
Journal of Computer Science and Technology
Security automation considered harmful?
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Modelling autonomic and dynamic trust decision-making mechanism for large-scale open environments
International Journal of Computer Applications in Technology
Automated trust negotiation using cryptographic credentials
ACM Transactions on Information and System Security (TISSEC)
Maintaining control while delegating trust: Integrity constraints in trust management
ACM Transactions on Information and System Security (TISSEC)
Trust Enhanced Authorization for Mobile Agents
EC-Web 2009 Proceedings of the 10th International Conference on E-Commerce and Web Technologies
Operational Semantics for DKAL: Application and Analysis
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
An Evolutionary Trust and Distrust Model
Electronic Notes in Theoretical Computer Science (ENTCS)
Evolution and challenges in trust and security in information system infrastructures
Proceedings of the 2nd international conference on Security of information and networks
Proceedings of the 2nd international conference on Security of information and networks
Qualitative trust dynamics algebra for trust management in pervasive computing environments
AIC'09 Proceedings of the 9th WSEAS international conference on Applied informatics and communications
SensorTrust: a resilient trust model for WSNs
Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems
Automatic creation and reconfiguration of network-aware service access paths
Computer Communications
Trust based security auto-configuration for smart assisted living environments
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
Completeness of discovery protocols
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
A weighted closeness-based trust combination model
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Journal of Systems and Software
A reputation-driven scheduler for autonomic and sustainable resource sharing in Grid computing
Journal of Parallel and Distributed Computing
Critical issues in trust management for mobile ad-hoc networks
IRI'09 Proceedings of the 10th IEEE international conference on Information Reuse & Integration
Octopus: an application independent DRM toolkit
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Electronic Notes in Theoretical Computer Science (ENTCS)
Application Security Models for Mobile Agent Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
Trust Evolution Policies for Security in Collaborative Ad Hoc Applications
Electronic Notes in Theoretical Computer Science (ENTCS)
Distributed programming with distributed authorization
Proceedings of the 5th ACM SIGPLAN workshop on Types in language design and implementation
A trust establishment scheme for cluster-based sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Effective trust management through a hybrid logical and relational approach
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Policy-based access control for weakly consistent replication
Proceedings of the 5th European conference on Computer systems
Architecture and algorithms for a distributed reputation system
iTrust'03 Proceedings of the 1st international conference on Trust management
Hardware security appliances for trust
iTrust'03 Proceedings of the 1st international conference on Trust management
Managing trust and reputation in the XenoServer open platform
iTrust'03 Proceedings of the 1st international conference on Trust management
Trust-based protection of software component users and designers
iTrust'03 Proceedings of the 1st international conference on Trust management
Trust management tools for internet applications
iTrust'03 Proceedings of the 1st international conference on Trust management
Experience with the keynote trust management system: applications and future directions
iTrust'03 Proceedings of the 1st international conference on Trust management
Fidelis: a policy-driven trust management framework
iTrust'03 Proceedings of the 1st international conference on Trust management
Authenticated dictionaries for fresh attribute credentials
iTrust'03 Proceedings of the 1st international conference on Trust management
A service-oriented trust management framework
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
Prototyping an armored data vault rights management on Big Brother's computer
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
A secure model for controlling the hubs in P2P wireless network based on trust value
Computer Communications
Empirical analysis of a dynamic social network built from PGP Keyrings
ICML'06 Proceedings of the 2006 conference on Statistical network analysis
Evaluating confidence in context for context-aware security
AmI'07 Proceedings of the 2007 European conference on Ambient intelligence
Program partitioning using dynamic trust models
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
Core TuLiP logic programming for trust management
ICLP'07 Proceedings of the 23rd international conference on Logic programming
Trust management model and architecture for context-aware service platforms
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Dynamic access control research for inter-operation in multi-domain environment based on risk
WISA'07 Proceedings of the 8th international conference on Information security applications
Foundations of security analysis and design IV
An introduction to the role based trust management framework RT
Foundations of security analysis and design IV
A method of trust evaluation in multi-agent system
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
A trust management model for PACS-grid
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
SecureBlox: customizable secure distributed data processing
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Rule-based policy representations and reasoning
Semantic techniques for the web
A card requirements language enabling privacy-preserving access control
Proceedings of the 15th ACM symposium on Access control models and technologies
Privacy-preserving trust verification
Proceedings of the 15th ACM symposium on Access control models and technologies
Initial trust formation in Virtual Organisations
International Journal of Internet Technology and Secured Transactions
Detection of radio interference attacks in VANET
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Usable access control in collaborative environments: authorization based on people-tagging
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
A privacy preservation model for facebook-style social network systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Hybrid trust and reputation management for sensor networks
Wireless Networks
SecPAL: Design and semantics of a decentralized authorization language
Journal of Computer Security - Digital Identity Management (DIM 2007)
A trust quantification method based on grey fuzzy theory
Proceedings of the 3rd international conference on Security of information and networks
A flexible architecture for privacy-aware trust management
Journal of Theoretical and Applied Electronic Commerce Research
Trust and distrust in adaptive inter-enterprise collaboration management
Journal of Theoretical and Applied Electronic Commerce Research
Investigating privacy-aware distributed query evaluation
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Credential chain discovery in RTTtrust management language
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
A QoS performance measure framework for distributed heterogeneous networks
EURO-PDP'00 Proceedings of the 8th Euromicro conference on Parallel and distributed processing
The pervasive trust foundation for security in next generation networks
Proceedings of the 2010 workshop on New security paradigms
Independently verifiable decentralized role-based delegation
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Security policies in distributed CSCW and workflow systems
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
A computational framework for certificate policy operations
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
ABUSE: PKI for real-world email trust
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
A framework for trust enabled software asset retrieval
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
A risk-aware resource service decision strategy for global computing
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
A new monitor model for enhancing trust-based systems
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
Practitioner's challenges in designing trust into online systems
Journal of Theoretical and Applied Electronic Commerce Research
AdContRep: a privacy enhanced reputation system for MANET content services
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
Reputation-based role assignment for role-based access control in wireless sensor networks
Computer Communications
A practical generic privacy language
ICISS'10 Proceedings of the 6th international conference on Information systems security
Integrating trust management and access control in data-intensive Web applications
ACM Transactions on the Web (TWEB)
The semantics of role-based trust management languages
CEE-SET'09 Proceedings of the 4th IFIP TC 2 Central and East European conference on Advances in Software Engineering Techniques
A social network-based trust-aware propagation model for P2P systems
Knowledge-Based Systems
Towards a Trust Management Enabled Identity Metasystem
International Journal of Organizational and Collective Intelligence
Hi-index | 0.00 |
We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, and deferring trust to third parties. Existing systems that support security in networked applications, including X.509 and PGP, address only narrow subsets of the overall trust management problem and often do so in a manner that is appropriate to only one application. This paper presents a comprehensive approach to trust management, based on a simple language for specifying trusted actions and trust relationships. It also describes a prototype implementation of a new trust management system, called PolicyMaker, that will facilitate the development of security features in a wide range of network services.