Results 1 - 10
of
144,147
Understanding trust management systems
- In Proc. IEEE Symposium on Security and Privacy
, 2001
"... This paper presents a mathematical framework for expressing trust management systems. The framework makes it easier to understand existing systems and to compare them to one another, as well as to design new systems. The framework defines the semantics of a trust management engine via a least fixpoi ..."
Abstract
-
Cited by 85 (0 self)
- Add to MetaCart
This paper presents a mathematical framework for expressing trust management systems. The framework makes it easier to understand existing systems and to compare them to one another, as well as to design new systems. The framework defines the semantics of a trust management engine via a least
Opacity analysis in trust management systems
- Proceedings of the 14th Information Security Conference (ISC2011
, 2011
"... Abstract Trust management systems are vulnerable to so-called probing attacks, which enable an adversary to gain knowledge about confidential facts in the system. We present the first method for deciding if an adversary can gain knowledge about confidential information in a Datalog-based policy. 1 ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
Abstract Trust management systems are vulnerable to so-called probing attacks, which enable an adversary to gain knowledge about confidential facts in the system. We present the first method for deciding if an adversary can gain knowledge about confidential information in a Datalog-based policy. 1
Compliance Checking in the PolicyMaker Trust Management System
, 1998
"... . Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that receives a signed request for action is forced to answer the central question "Is the key used to sign this request ..."
Abstract
-
Cited by 94 (2 self)
- Add to MetaCart
management system. At the heart of a trust management system is an algorithm for compliance checking.The inputs ...
Decentralized Trust Management
- In Proceedings of the 1996 IEEE Symposium on Security and Privacy
, 1996
"... We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, an ..."
Abstract
-
Cited by 1025 (24 self)
- Add to MetaCart
, and deferring trust to third parties. Existing systems that support security in networked applications, including X.509 and PGP, address only narrow subsets of the overall trust management problem and often do so in a manner that is appropriate to only one application. This paper presents a comprehensive
Mobitrust: Trust management system in mobile social computing
- In CIT
, 2010
"... Abstract-Due to the rapid development of mobile computing technology and social network service, mobile social network emerges as a new network paradigm, which significantly facilitates the communication and resource sharing between mobile clients/users that are socially interconnected. However, th ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
, the functionality and security of such networks would be potentially undermined without an effective trust management scheme. Although many trust management systems have been proposed, few of them can be applied to mobile social networks because of the unique network and communication characteristics. This paper
Compliance Checking in the PolicyMaker Trust Management System
, 1998
"... Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that receives a signed request for action is forced to answer the central question "Is the key used to sign this request ..."
Abstract
- Add to MetaCart
, the PolicyMaker trust management system. At the heart of a trust management system is an algorithm for compliance checking. Th...
Reducing the Dependence of Trust-Management Systems on PKI
"... Abstract Trust-management systems address the authorization problem in distributed systems by defining aformal language for expressing authorization and access-control policies, and relying on an algorithm to determine when a specific request can be granted. For authorization in distributed systems, ..."
Abstract
- Add to MetaCart
Abstract Trust-management systems address the authorization problem in distributed systems by defining aformal language for expressing authorization and access-control policies, and relying on an algorithm to determine when a specific request can be granted. For authorization in distributed systems
Reducing the Dependence of Trust-Management Systems on PKI
, 2005
"... Trust-management systems address the authorization problem in distributed systems by defining a formal language for expressing authorization and access-control policies, and relying on an algorithm to determine when a specific request can be granted. For authorization in distributed systems, trust ..."
Abstract
- Add to MetaCart
Trust-management systems address the authorization problem in distributed systems by defining a formal language for expressing authorization and access-control policies, and relying on an algorithm to determine when a specific request can be granted. For authorization in distributed systems
Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems
"... Abstract. Trust management systems provide a flexible way for performing decentralized security management. However, most trust management systems only support monotonic policies. Compared with nonmonotonic policies, monotonic ones are less flexible and cannot express policies such as “Chinese wall ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract. Trust management systems provide a flexible way for performing decentralized security management. However, most trust management systems only support monotonic policies. Compared with nonmonotonic policies, monotonic ones are less flexible and cannot express policies such as “Chinese wall
A Reputation-based Trust Management System for P2P Networks
- In Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004
, 2004
"... The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper, we propose a reputation-based trust management system for P2P networks that aims to build confidence among the good members of the community and identify the malicious on ..."
Abstract
-
Cited by 53 (0 self)
- Add to MetaCart
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper, we propose a reputation-based trust management system for P2P networks that aims to build confidence among the good members of the community and identify the malicious
Results 1 - 10
of
144,147