Role-Based Access Control Models
Computer
A calculus for cryptographic protocols
Information and Computation
Communication and Concurrency
Analysis of security protocols as open systems
Theoretical Computer Science
Symbolic Semantics and Analysis for Crypto-CCS with (Almost) Generic Inference Systems
MFCS '02 Proceedings of the 27th International Symposium on Mathematical Foundations of Computer Science
An Introduction to Automated Trust Establishment
Informatik bewegt: Informatik 2002 - 32. Jahrestagung der Gesellschaft für Informatik e.v. (GI)
Distributed credential chain discovery in trust management
Journal of Computer Security
Towards Practical Automated Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
Simplification and analysis of transitive trust networks
Web Intelligence and Agent Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
Towards an integrated formal analysis for security and trust
FMOODS'05 Proceedings of the 7th IFIP WG 6.1 international conference on Formal Methods for Open Object-Based Distributed Systems
An abstract model of a trusted platform
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Trust models and applications in communication and multi-agent systems
International Journal of Knowledge-based and Intelligent Engineering Systems - Selected papers of KES2012-Part 2 of 2
Hi-index | 0.00 |
In this paper, we present our line of research for defining an integrated framework for the specification and analysis of security and trust in complex and dynamic scenarios. We aim at showing how the same machinery applied for the formal verification of security protocols may be useful to model and analyze trust management procedures.