• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 94,077
Next 10 →

A trust management model for Body Sensor Networks

by Vinh T Bui
"... Abstract-Body Sensor Networks (BSNs) are used for diverse applications ranging from monitoring for medical purposes, sport coaching to computer gaming. A foreseen usage scenario for a BSN is the installation of third-party monitoring applications. Existing applications can also be extended by downl ..."
Abstract - Add to MetaCart
by downloading and installing new components dynamically. Dependability and security properties must be preserved under these changes while the user of the BSN must have a transparent view on data usage and installed software. To that end we propose an efficient trust management model and we investigate policies

PTM: A Pervasive Trust Management Model for Dynamic Open Environments

by Florina Almenárez, Andrés Marín, Celeste Campo, Carlos García R. - IN: FIRST WORKSHOP ON PERVASIVE SECURITY, PRIVACY AND TRUST PSPT’04 IN CONJUNTION WITH MOBIQUITOUS , 2004
"... Trust is considered as a fundamental aspect for interdomain relationships. We have reviewed existing trust models and their drawbacks when they are applied to pervasive environments. We present PTM, a new decentralised trust management model for pervasive computing environments. PTM overcomes the ch ..."
Abstract - Cited by 19 (3 self) - Add to MetaCart
Trust is considered as a fundamental aspect for interdomain relationships. We have reviewed existing trust models and their drawbacks when they are applied to pervasive environments. We present PTM, a new decentralised trust management model for pervasive computing environments. PTM overcomes

Requirements Engineering for Trust Management: Model, Methodology, and Reasoning

by Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone - of the 3rd International i* Workshop – istar08 , 2006
"... A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizational level, as opposed to an IT system level, and mapping these into security and trust management policies is still an open probl ..."
Abstract - Cited by 12 (6 self) - Add to MetaCart
A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizational level, as opposed to an IT system level, and mapping these into security and trust management policies is still an open

Trust Management Model and Architecture for Context-Aware Service Platforms

by Ricardo Neisse, Maarten Wegdam, Marten Van Sinderen, Gabriele Lenzini A, A Telematica Instituut Enschede
"... Abstract. The entities participating in a context-aware service platform need to establish and manage trust relationships in order to assert different trust aspects including identity provisioning, privacy enforcement, and context information provisioning. Current trust management models address the ..."
Abstract - Cited by 12 (2 self) - Add to MetaCart
Abstract. The entities participating in a context-aware service platform need to establish and manage trust relationships in order to assert different trust aspects including identity provisioning, privacy enforcement, and context information provisioning. Current trust management models address

Runtime Processes and Trust Management Model in MANET and GRID

by Akash K Singh
"... Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for business integration scenarios, Federated Identity Management emerged as a possibility t ..."
Abstract - Add to MetaCart
Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for business integration scenarios, Federated Identity Management emerged as a possibility

Decentralized Trust Management

by Matt Blaze, Joan Feigenbaum, Jack Lacy - In Proceedings of the 1996 IEEE Symposium on Security and Privacy , 1996
"... We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, an ..."
Abstract - Cited by 1025 (24 self) - Add to MetaCart
We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies

PTM: A Pervasive Trust Management Model for Dynamic Open Environments∗

by Celeste Campo, Carlos Garćıa R
"... Trust is considered as a fundamental aspect for inter-domain relationships. We have reviewed existing trust models and their drawbacks when they are applied to per-vasive environments. We present PTM, a new decen-tralised trust management model for pervasive comput-ing environments. PTM overcomes th ..."
Abstract - Add to MetaCart
Trust is considered as a fundamental aspect for inter-domain relationships. We have reviewed existing trust models and their drawbacks when they are applied to per-vasive environments. We present PTM, a new decen-tralised trust management model for pervasive comput-ing environments. PTM overcomes

An Integrative Model of Organizational Trust

by Roger C. Mayer, James H. Davis, F. David Schoorman - ACADEMY OF MANAGEMENT REVIEW , 1995
"... ..."
Abstract - Cited by 1226 (1 self) - Add to MetaCart
Abstract not found

An Hybrid Trust Management Model For MAS Based Trading Society

by M. A. Maarof , K. Krishna
"... The widespread use of the Internet signals the need for a better understanding of trust as a basis for secure on-line interaction. In this paper we provide and discuss existing works on trust management models in the area of Multi Agent Systems and highlight the shortcomings. Our proposed model i ..."
Abstract - Add to MetaCart
The widespread use of the Internet signals the need for a better understanding of trust as a basis for secure on-line interaction. In this paper we provide and discuss existing works on trust management models in the area of Multi Agent Systems and highlight the shortcomings. Our proposed model

The EigenTrust Algorithm for Reputation Management in P2P Networks

by Sepandar D. Kamvar, Mario T. Schlosser, Hector Garcia-molina - in Proceedings of the 12th International World Wide Web Conference (WWW 2003 , 2003
"... Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience with P2P networks such as Gnutella shows, the anonymous, open nature of these networks offers an almost ideal environment for the spread of self ..."
Abstract - Cited by 997 (23 self) - Add to MetaCart
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience with P2P networks such as Gnutella shows, the anonymous, open nature of these networks offers an almost ideal environment for the spread of self-replicating inauthentic files.
Next 10 →
Results 1 - 10 of 94,077
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University