• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 144,147
Next 10 →

Understanding trust management systems

by Stephen Weeks - In Proc. IEEE Symposium on Security and Privacy , 2001
"... This paper presents a mathematical framework for expressing trust management systems. The framework makes it easier to understand existing systems and to compare them to one another, as well as to design new systems. The framework defines the semantics of a trust management engine via a least fixpoi ..."
Abstract - Cited by 85 (0 self) - Add to MetaCart
This paper presents a mathematical framework for expressing trust management systems. The framework makes it easier to understand existing systems and to compare them to one another, as well as to design new systems. The framework defines the semantics of a trust management engine via a least

Opacity analysis in trust management systems

by Moritz Y. Becker, Masoud Koleini - Proceedings of the 14th Information Security Conference (ISC2011 , 2011
"... Abstract Trust management systems are vulnerable to so-called probing attacks, which enable an adversary to gain knowledge about confidential facts in the system. We present the first method for deciding if an adversary can gain knowledge about confidential information in a Datalog-based policy. 1 ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract Trust management systems are vulnerable to so-called probing attacks, which enable an adversary to gain knowledge about confidential facts in the system. We present the first method for deciding if an adversary can gain knowledge about confidential information in a Datalog-based policy. 1

Compliance Checking in the PolicyMaker Trust Management System

by Matt Blaze, Joan Feigenbaum, Martin Strauss , 1998
"... . Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that receives a signed request for action is forced to answer the central question "Is the key used to sign this request ..."
Abstract - Cited by 94 (2 self) - Add to MetaCart
management system. At the heart of a trust management system is an algorithm for compliance checking.The inputs ...

Decentralized Trust Management

by Matt Blaze, Joan Feigenbaum, Jack Lacy - In Proceedings of the 1996 IEEE Symposium on Security and Privacy , 1996
"... We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, an ..."
Abstract - Cited by 1025 (24 self) - Add to MetaCart
, and deferring trust to third parties. Existing systems that support security in networked applications, including X.509 and PGP, address only narrow subsets of the overall trust management problem and often do so in a manner that is appropriate to only one application. This paper presents a comprehensive

Mobitrust: Trust management system in mobile social computing

by Juan Li , Zonghua Zhang , Weiyi Zhang - In CIT , 2010
"... Abstract-Due to the rapid development of mobile computing technology and social network service, mobile social network emerges as a new network paradigm, which significantly facilitates the communication and resource sharing between mobile clients/users that are socially interconnected. However, th ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
, the functionality and security of such networks would be potentially undermined without an effective trust management scheme. Although many trust management systems have been proposed, few of them can be applied to mobile social networks because of the unique network and communication characteristics. This paper

Compliance Checking in the PolicyMaker Trust Management System

by Matt Blaze Joan, Joan Feigenbaum, Martin Strauss , 1998
"... Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that receives a signed request for action is forced to answer the central question "Is the key used to sign this request ..."
Abstract - Add to MetaCart
, the PolicyMaker trust management system. At the heart of a trust management system is an algorithm for compliance checking. Th...

Reducing the Dependence of Trust-Management Systems on PKI

by Hao Wang Somesh Jha
"... Abstract Trust-management systems address the authorization problem in distributed systems by defining aformal language for expressing authorization and access-control policies, and relying on an algorithm to determine when a specific request can be granted. For authorization in distributed systems, ..."
Abstract - Add to MetaCart
Abstract Trust-management systems address the authorization problem in distributed systems by defining aformal language for expressing authorization and access-control policies, and relying on an algorithm to determine when a specific request can be granted. For authorization in distributed systems

Reducing the Dependence of Trust-Management Systems on PKI

by Hao Wang, Somesh Jha, Thomas Reps, Stefan Schwoon, Stuart Stubblebine , 2005
"... Trust-management systems address the authorization problem in distributed systems by defining a formal language for expressing authorization and access-control policies, and relying on an algorithm to determine when a specific request can be granted. For authorization in distributed systems, trust ..."
Abstract - Add to MetaCart
Trust-management systems address the authorization problem in distributed systems by defining a formal language for expressing authorization and access-control policies, and relying on an algorithm to determine when a specific request can be granted. For authorization in distributed systems

Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems

by Changyu Dong, Giovanni Russello, Naranker Dulay
"... Abstract. Trust management systems provide a flexible way for performing decentralized security management. However, most trust management systems only support monotonic policies. Compared with nonmonotonic policies, monotonic ones are less flexible and cannot express policies such as “Chinese wall ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract. Trust management systems provide a flexible way for performing decentralized security management. However, most trust management systems only support monotonic policies. Compared with nonmonotonic policies, monotonic ones are less flexible and cannot express policies such as “Chinese wall

A Reputation-based Trust Management System for P2P Networks

by Ali Aydın Selçuk, Ersin Uzun, Mark Re¸sat Pariente - In Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004 , 2004
"... The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper, we propose a reputation-based trust management system for P2P networks that aims to build confidence among the good members of the community and identify the malicious on ..."
Abstract - Cited by 53 (0 self) - Add to MetaCart
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper, we propose a reputation-based trust management system for P2P networks that aims to build confidence among the good members of the community and identify the malicious
Next 10 →
Results 1 - 10 of 144,147
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University