Results 1 - 10
of
4,825
Decentralized Trust Management
- In Proceedings of the 1996 IEEE Symposium on Security and Privacy
, 1996
"... We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, an ..."
Abstract
-
Cited by 1025 (24 self)
- Add to MetaCart
approach to trust management, based on a simple language for specifying trusted actions and trust relationships. It also describes a prototype implementation of a new trust management system, called PolicyMaker, that will facilitate the development of security features in a wide range of network services
Developing Trusting Relationships Through
, 2015
"... In this paper, we analyze the formation of trusting relationships among people through communication. To foster trusting relationships, individuals must disclose private and personal information. However, disclosing such information has both costs and benefits; therefore, both parties must decide on ..."
Abstract
- Add to MetaCart
In this paper, we analyze the formation of trusting relationships among people through communication. To foster trusting relationships, individuals must disclose private and personal information. However, disclosing such information has both costs and benefits; therefore, both parties must decide
2.2 CONVENTIONAL TRUST RELATIONSHIPS.......................................................................................2
, 2003
"... 2. INTRODUCTION...............................................................................................................................2 2.1 TRUST RELATIONSHIPS..................................................................................................................2 ..."
Abstract
- Add to MetaCart
2. INTRODUCTION...............................................................................................................................2 2.1 TRUST RELATIONSHIPS..................................................................................................................2
Trusting Relationships in the NATO Alliance
"... Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download a ..."
Abstract
- Add to MetaCart
Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal? Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Download date: 17. maj. 2016
Trust Relationship Modeling for Software Assurance
, 2010
"... Software assurance, as practiced through the Common Criteria, is a mixture of processes, heuristics, and lessons learned from earlier failures. At the other end of the spectrum, formal methods establish rigorous mathematical properties of portions of code. By themselves, neither of these practices a ..."
Abstract
- Add to MetaCart
are scalable to software systems with millions or billions of lines of code. We propose a framework that enables the collection and analysis of many disparate types of information to be applied to the issue of software assurance. Trust relationship modeling enables stakeholders to decompose the overall
General Methodology for Analysis and Modeling of Trust Relationships in Distributed Computing
"... Abstract—In this paper, we discuss a general methodology for analysis and modeling of trust relationships in distributed computing. We discuss the classification of trust relationships, categorize trust relationships into two layers and provide a hierarchy of trust relationships based on a formal de ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract—In this paper, we discuss a general methodology for analysis and modeling of trust relationships in distributed computing. We discuss the classification of trust relationships, categorize trust relationships into two layers and provide a hierarchy of trust relationships based on a formal
Secure routing for structured peer-to-peer overlay networks
, 2002
"... Structured peer-to-peer overlay networks provide a sub-strate for the construction of large-scale, decentralized applications, including distributed storage, group com-munication, and content distribution. These overlays are highly resilient; they can route messages correctly even when a large fract ..."
Abstract
-
Cited by 473 (12 self)
- Add to MetaCart
without pre-existing trust relationships wish to pool their resources. This paper studies attacks aimed at preventing correct message delivery in structured peer-to-peer overlays and presents defenses to these attacks. We describe and eval-uate techniques that allow nodes to join the overlay, to maintain
Inferring Trust Relationships in Web-Based Social Networks
- ACM Transactions on Internet Technology
, 2005
"... The growth of web-based social networking and the properties of those networks have created great potential for producing intelligent software that integrates a user's social network and preferences. Our research looks particularly at assigning trust in web-based social nets and investigates ho ..."
Abstract
-
Cited by 39 (0 self)
- Add to MetaCart
relationships between individuals that are not directly connected in the network. Both algorithms are shown theoretically and through simulation to produce calculated trust values that are highly accurate.. We then present TrustMail, a prototype email client that uses variations on these algorithms to score
Bridging Trust Relationships with Web Service Enhancements
"... With the development of web technology and distributed systems, online collaborations are becoming more common and more demanding. Web services now provide standard mechanisms to enable online interactions. Yet security, privacy and trust-related protection mechanisms for web services need additiona ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
protection for privacy and trust. A trust establishment mechanism for web services must therefore ensure privacy and owner control at all times due to the subjectivity of trust relationships. This paper describes an indirect trust establishment mechanism to bridge and build new trust relationships from
Results 1 - 10
of
4,825