Towards usage control models: beyond traditional access control
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Delegation logic: A logic-based approach to distributed authorization
ACM Transactions on Information and System Security (TISSEC)
Dynamic access control: preserving safety and trust for network defense operations
Proceedings of the eighth ACM symposium on Access control models and technologies
Analysis of SPKI/SDSI Certificates Using Model Checking
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Trust for Ubiquitous, Transparent Collaboration
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Formalising key distribution in the presence of trust using object-Z
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
Towards a formal notion of trust
Proceedings of the 5th ACM SIGPLAN international conference on Principles and practice of declaritive programming
Trust Dynamics for Collaborative Global Computing
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
A logical reconstruction of SPKI
Journal of Computer Security - Special issue on CSFW14
An access control framework for business processes for web services
Proceedings of the 2003 ACM workshop on XML security
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
Engineering human trust in mobile system collaborations
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering
Trust for ubiquitous, transparent collaboration
Wireless Networks - Special issue: Pervasive computing and communications
Integrity constraints in trust management
Proceedings of the tenth ACM symposium on Access control models and technologies
Beyond proof-of-compliance: security analysis in trust management
Journal of the ACM (JACM)
A posteriori compliance control
Proceedings of the 12th ACM symposium on Access control models and technologies
Journal of Computer Security - Special issue on CSFW15
The complexity of fixed point models of trust in distributed networks
Theoretical Computer Science
A complete fuzzy logical system to deal with trust management systems
Fuzzy Sets and Systems
Interactive access control for autonomic systems: From theory to implementation
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Authorization in trust management: Features and foundations
ACM Computing Surveys (CSUR)
Modelling autonomic and dynamic trust decision-making mechanism for large-scale open environments
International Journal of Computer Applications in Technology
Maintaining control while delegating trust: Integrity constraints in trust management
ACM Transactions on Information and System Security (TISSEC)
Evidence processing and privacy issues in evidence-based reputation systems
Computer Standards & Interfaces
Trust Evolution Policies for Security in Collaborative Ad Hoc Applications
Electronic Notes in Theoretical Computer Science (ENTCS)
Automated verification of security policies in mobile code
IFM'07 Proceedings of the 6th international conference on Integrated formal methods
An introduction to the role based trust management framework RT
Foundations of security analysis and design IV
A privacy preservation model for facebook-style social network systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Evidence-based trust: A mathematical model geared for multiagent systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Relationship-based access control: protection model and policy language
Proceedings of the first ACM conference on Data and application security and privacy
Relationship-based access control policies and their policy languages
Proceedings of the 16th ACM symposium on Access control models and technologies
Extracting trust information from security system of a service
Journal of Network and Computer Applications
Enforcing security policies for distributed objects applications
Proceedings of the 11th international conference on Security Protocols
Toward trust management in autonomic and coordination applications
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Modeling public key infrastructures in the real world
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
WAC'04 Proceedings of the First international IFIP conference on Autonomic Communication
Combining trust and risk to reduce the cost of attacks
iTrust'05 Proceedings of the Third international conference on Trust Management
On the use of formal specifications as part of running programs
Software Engineering for Multi-Agent Systems IV
Transfer of trust in event-based reputation systems
Theoretical Computer Science
Weighted pushdown systems and trust-management systems
TACAS'06 Proceedings of the 12th international conference on Tools and Algorithms for the Construction and Analysis of Systems
DART: A Distributed Analysis Of Reputation And Trust Framework
Computational Intelligence
Hi-index | 0.00 |
Abstract: This paper presents a mathematical framework for expressing trust management systems. The framework makes it easier to understand existing systems and to compare them to one another, as well as to design new systems. The framework defines the semantics of a trust management engine via a least fixpoint in a lattice, which, in some situations, leads to an efficient implementation. To demonstrate its flexibility, we present KeyNote and SPKI as instantiations of the framework.