Internet Privacy Enhanced Mail
Communications of the ACM - Special issue on internetworking
The official PGP user's guide
Path independence for authentication in large-scale systems
Proceedings of the 4th ACM conference on Computer and communications security
Associating Metrics to Certification Paths
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Toward acceptable metrics of authentication
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Resilient Authentication Using Path Independence
IEEE Transactions on Computers
Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
Trust: benefits, models, and mechanisms
Secure Internet programming
Experiences Deploying a Large-Scale Emergent Network
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Attack-Resistance of Computational Trust Models
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Robust incentive techniques for peer-to-peer networks
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
Propagation Models for Trust and Distrust in Social Networks
Information Systems Frontiers
Inferring binary trust relationships in Web-based social networks
ACM Transactions on Internet Technology (TOIT)
Investigating interactions of trust and interest similarity
Decision Support Systems
Modeling deceptive information dissemination using a holistic approach
Proceedings of the 2007 ACM symposium on Applied computing
Trust Mass, Volume and Density - a Novel Approach to Reasoning about Trust
Electronic Notes in Theoretical Computer Science (ENTCS)
Social ties and their relevance to churn in mobile telecom networks
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Vulnerability analysis of certificate graphs
International Journal of Security and Networks
Trust network-based filtering of aggregated claims
International Journal of Metadata, Semantics and Ontologies
Trust on the world wide web: a survey
Foundations and Trends in Web Science
Trust-based evolutionary game model assisting AODV routing against selfishness
Journal of Network and Computer Applications
MobiRate: making mobile raters stick to their word
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
A Model for Trust Metrics Analysis
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Towards a precise semantics for authenticity and trust
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Dynamics, Robustness and Fragility of Trust
Formal Aspects in Security and Trust
Sybil-resilient online content voting
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Evaluation of the iterative multiplication strategy for trust propagation in pervasive environments
Proceedings of the 2009 international conference on Pervasive services
Using trust for collaborative filtering in eCommerce
Proceedings of the 11th International Conference on Electronic Commerce
Trust and nuanced profile similarity in online social networks
ACM Transactions on the Web (TWEB)
Social network-based trust in prioritized default logic
AAAI'06 proceedings of the 21st national conference on Artificial intelligence - Volume 2
Trust Enhanced Authorization for Mobile Agents
EC-Web 2009 Proceedings of the 10th International Conference on E-Commerce and Web Technologies
Tutorial on using social trust for recommender systems
Proceedings of the third ACM conference on Recommender systems
Trust relationship prediction using online product review data
Proceedings of the 1st ACM international workshop on Complex networks meet information & knowledge management
Case study: trust establishment in personal area networks
ISWPC'09 Proceedings of the 4th international conference on Wireless pervasive computing
Semantic Web Service Composition in Social Environments
ISWC '09 Proceedings of the 8th International Semantic Web Conference
Trust- and Location-Based Recommendations for Tourism
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I
ManyNets: an interface for multiple network analysis and visualization
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Using probabilistic confidence models for trust inference in Web-based social networks
ACM Transactions on Internet Technology (TOIT)
FaceTrust: assessing the credibility of online personas via social networks
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
On device identity establishment and verification
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Social Network Analysis and Mining for Business Applications
ACM Transactions on Intelligent Systems and Technology (TIST)
Quantifying and qualifying trust: spectral decomposition of trust networks
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
Foundations and Trends in Information Retrieval
A novel probabilistic trust evaluation algorithm
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Architecture and implementation of a trust model for pervasive applications
Journal of Mobile Multimedia
Incentivizing responsible networking via introduction-based routing
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Collusion in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Controlling privacy with trust-aware link prediction in online social networks
Proceedings of the Third International Conference on Internet Multimedia Computing and Service
Trust metrics for the SPKI/SDSI authorisation framework
ATVA'11 Proceedings of the 9th international conference on Automated technology for verification and analysis
The design, generation, and utilisation of a semantically rich personalised model of trust
iTrust'06 Proceedings of the 4th international conference on Trust Management
Semantic web recommender systems
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
Combining provenance with trust in social networks for semantic web content filtering
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Collaborative service evaluation with the TwoHop trust framework
Security and Communication Networks
A group trust metric for identifying people of trust in online social networks
Expert Systems with Applications: An International Journal
Applying Trust Metrics Based on User Interactions to Recommendation in Social Networks
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Trust based recommendation systems
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Campaign extraction from social media
ACM Transactions on Intelligent Systems and Technology (TIST) - Special Section on Intelligent Mobile Knowledge Discovery and Management Systems and Special Issue on Social Web Mining
Leveraging Social Feedback to Verify Online Identity Claims
ACM Transactions on the Web (TWEB)
Hi-index | 0.00 |
This paper investigates the role of trust metrics in attack-resistant public key certification. We present an analytical framework for understanding the effectiveness of trust metrics in resisting attacks, including a characterization of the space of possible attacks. Within this framework, we establish the theoretical best case for a trust metric. Finally, we present a practical trust metric based on network flow that meets this theoretical bound.