Communication and concurrency
Role-Based Access Control Models
Computer
Analysis of security protocols as open systems
Theoretical Computer Science
DATALOG with Constraints: A Foundation for Trust Management Languages
PADL '03 Proceedings of the 5th International Symposium on Practical Aspects of Declarative Languages
Distributed credential chain discovery in trust management
Journal of Computer Security
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Describing and Reasoning on Web Services using Process Algebra
ICWS '04 Proceedings of the IEEE International Conference on Web Services
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
Fine-grained and History-based Access Control with Trust Management for Autonomic Grid Services
ICAS '06 Proceedings of the International Conference on Autonomic and Autonomous Systems
Simplification and analysis of transitive trust networks
Web Intelligence and Agent Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
An introduction to trust negotiation
iTrust'03 Proceedings of the 1st international conference on Trust management
Towards an integrated formal analysis for security and trust
FMOODS'05 Proceedings of the 7th IFIP WG 6.1 international conference on Formal Methods for Open Object-Based Distributed Systems
Signed and weighted trust credentials in fraglets
Proceedings of the 3rd International Conference on Bio-Inspired Models of Network, Information and Computing Sytems
An Implementation of Role-Base Trust Management Extended with Weights on Mobile Devices
Electronic Notes in Theoretical Computer Science (ENTCS)
Fine grained access control with trust and reputation management for globus
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Hybrid trust and reputation management for sensor networks
Wireless Networks
Hi-index | 0.00 |
In this paper, we continue our line of research for defining an integrated framework for the specification and analysis of security and trust, aimed at providing the basis for the modeling and analysis of security and trust aspects of emergent dynamic coalitions (e.g., mobile ad hoc networks, peer to peer systems, web services). In particular, we consider two well-known languages: 1) the Role-based Trust-management framework (RT) and, in particular, its most basic language RT"0, and 2) the transitive trust model, for defining trust and recommendation relationships. First, we show an encoding of the transitive trust model into part of RT"0; then, this subset is mapped into the inference construct of the Crypto-CCS process algebra. Also, we introduce in the languages operators dealing with levels of trust. The relationships among these languages could allow us to model and analyze trust and recommendation issues in distributed systems by means of standard formal techniques, based on inference systems.