Results 1 - 10
of
94,077
A trust management model for Body Sensor Networks
"... Abstract-Body Sensor Networks (BSNs) are used for diverse applications ranging from monitoring for medical purposes, sport coaching to computer gaming. A foreseen usage scenario for a BSN is the installation of third-party monitoring applications. Existing applications can also be extended by downl ..."
Abstract
- Add to MetaCart
by downloading and installing new components dynamically. Dependability and security properties must be preserved under these changes while the user of the BSN must have a transparent view on data usage and installed software. To that end we propose an efficient trust management model and we investigate policies
PTM: A Pervasive Trust Management Model for Dynamic Open Environments
- IN: FIRST WORKSHOP ON PERVASIVE SECURITY, PRIVACY AND TRUST PSPT’04 IN CONJUNTION WITH MOBIQUITOUS
, 2004
"... Trust is considered as a fundamental aspect for interdomain relationships. We have reviewed existing trust models and their drawbacks when they are applied to pervasive environments. We present PTM, a new decentralised trust management model for pervasive computing environments. PTM overcomes the ch ..."
Abstract
-
Cited by 19 (3 self)
- Add to MetaCart
Trust is considered as a fundamental aspect for interdomain relationships. We have reviewed existing trust models and their drawbacks when they are applied to pervasive environments. We present PTM, a new decentralised trust management model for pervasive computing environments. PTM overcomes
Requirements Engineering for Trust Management: Model, Methodology, and Reasoning
- of the 3rd International i* Workshop – istar08
, 2006
"... A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizational level, as opposed to an IT system level, and mapping these into security and trust management policies is still an open probl ..."
Abstract
-
Cited by 12 (6 self)
- Add to MetaCart
A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizational level, as opposed to an IT system level, and mapping these into security and trust management policies is still an open
Trust Management Model and Architecture for Context-Aware Service Platforms
"... Abstract. The entities participating in a context-aware service platform need to establish and manage trust relationships in order to assert different trust aspects including identity provisioning, privacy enforcement, and context information provisioning. Current trust management models address the ..."
Abstract
-
Cited by 12 (2 self)
- Add to MetaCart
Abstract. The entities participating in a context-aware service platform need to establish and manage trust relationships in order to assert different trust aspects including identity provisioning, privacy enforcement, and context information provisioning. Current trust management models address
Runtime Processes and Trust Management Model in MANET and GRID
"... Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for business integration scenarios, Federated Identity Management emerged as a possibility t ..."
Abstract
- Add to MetaCart
Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for business integration scenarios, Federated Identity Management emerged as a possibility
Decentralized Trust Management
- In Proceedings of the 1996 IEEE Symposium on Security and Privacy
, 1996
"... We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, an ..."
Abstract
-
Cited by 1025 (24 self)
- Add to MetaCart
We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies
PTM: A Pervasive Trust Management Model for Dynamic Open Environments∗
"... Trust is considered as a fundamental aspect for inter-domain relationships. We have reviewed existing trust models and their drawbacks when they are applied to per-vasive environments. We present PTM, a new decen-tralised trust management model for pervasive comput-ing environments. PTM overcomes th ..."
Abstract
- Add to MetaCart
Trust is considered as a fundamental aspect for inter-domain relationships. We have reviewed existing trust models and their drawbacks when they are applied to per-vasive environments. We present PTM, a new decen-tralised trust management model for pervasive comput-ing environments. PTM overcomes
An Hybrid Trust Management Model For MAS Based Trading Society
"... The widespread use of the Internet signals the need for a better understanding of trust as a basis for secure on-line interaction. In this paper we provide and discuss existing works on trust management models in the area of Multi Agent Systems and highlight the shortcomings. Our proposed model i ..."
Abstract
- Add to MetaCart
The widespread use of the Internet signals the need for a better understanding of trust as a basis for secure on-line interaction. In this paper we provide and discuss existing works on trust management models in the area of Multi Agent Systems and highlight the shortcomings. Our proposed model
The EigenTrust Algorithm for Reputation Management in P2P Networks
- in Proceedings of the 12th International World Wide Web Conference (WWW 2003
, 2003
"... Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience with P2P networks such as Gnutella shows, the anonymous, open nature of these networks offers an almost ideal environment for the spread of self ..."
Abstract
-
Cited by 997 (23 self)
- Add to MetaCart
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience with P2P networks such as Gnutella shows, the anonymous, open nature of these networks offers an almost ideal environment for the spread of self-replicating inauthentic files.
Results 1 - 10
of
94,077