• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 6,415
Next 10 →

Decentralized Trust Management

by Matt Blaze, Joan Feigenbaum, Jack Lacy - In Proceedings of the 1996 IEEE Symposium on Security and Privacy , 1996
"... We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, an ..."
Abstract - Cited by 1025 (24 self) - Add to MetaCart
We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies

Design of a role-based trust management framework

by Ninghui Li, John C. Mitchell - In Proceedings of the 2002 IEEE Symposium on Security and Privacy , 2002
"... We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths of role-based access control and trustmanagement systems and is especially suitable for attributebased access control. Usi ..."
Abstract - Cited by 362 (42 self) - Add to MetaCart
We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths of role-based access control and trustmanagement systems and is especially suitable for attributebased access control

Trust management for the semantic web

by Matthew Richardson, Rakesh Agrawal, Pedro Domingos - In ISWC , 2003
"... Abstract. Though research on the Semantic Web has progressed at a steady pace, its promise has yet to be realized. One major difficulty is that, by its very nature, the Semantic Web is a large, uncensored system to which anyone may contribute. This raises the question of how much credence to give ea ..."
Abstract - Cited by 271 (3 self) - Add to MetaCart
each source. We cannot expect each user to know the trustworthiness of each source, nor would we want to assign top-down or global credibility values due to the subjective nature of trust. We tackle this problem by employing a web of trust, in which each user provides personal trust values for a small

Trust Management

by Ninghui Li, John C. Mitchell, William H. Winsborough, Ninghui Li, John C. Mitchell, William H. Winsborough
"... Trust management is a form of distributed access control that allows one principal to delegate some access decisions to other principals. While this makes trust management more flexible than the access matrix model, it makes safety and security analysis more important. We show that in contrast to th ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
Trust management is a form of distributed access control that allows one principal to delegate some access decisions to other principals. While this makes trust management more flexible than the access matrix model, it makes safety and security analysis more important. We show that in contrast

KeyNote: Trust Management for Public-Key Infrastructures

by Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis - Infrastructures (Position Paper). Lecture Notes in Computer Science 1550 , 1998
"... This paper discusses the rationale for designing a simple trust-management system for public-key infrastructures, called KeyNote. ..."
Abstract - Cited by 214 (4 self) - Add to MetaCart
This paper discusses the rationale for designing a simple trust-management system for public-key infrastructures, called KeyNote.

Trust Management

by Claudio A. Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati , 2007
"... The amount of data available electronically to a multitude of users has been increasing dramatically over the last few years. The size and dynamics of the user community set requirements that cannot be easily solved by traditional access control solutions. A promising approach for supporting access ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
access control in open environments is trust management. This chapter provides an overview of the most significant approaches for managing and negotiating trust between parties. We start by introducing the basic concepts on which trust management systems are built, describing their relationships

Understanding trust management systems

by Stephen Weeks - In Proc. IEEE Symposium on Security and Privacy , 2001
"... This paper presents a mathematical framework for expressing trust management systems. The framework makes it easier to understand existing systems and to compare them to one another, as well as to design new systems. The framework defines the semantics of a trust management engine via a least fixpoi ..."
Abstract - Cited by 85 (0 self) - Add to MetaCart
This paper presents a mathematical framework for expressing trust management systems. The framework makes it easier to understand existing systems and to compare them to one another, as well as to design new systems. The framework defines the semantics of a trust management engine via a least

REFEREE: Trust Management for Web Applications

by Yang-Hua Chu, Joan Feigenbaum, Brian Lamacchia, Paul Resnick, Martin Strauss
"... Digital signatures provide a mechanism for guaranteeing integrity and authenticity of Web content but not more general notions of security or trust. Web-aware applications must permit users to state clearly their own security policies and, of course, must provide the cryptographic tools for manipula ..."
Abstract - Cited by 137 (7 self) - Add to MetaCart
for manipulating digital signatures. This paper describes the REFEREE trust management system for Web applications; REFEREE provides both a general policy-evaluation mechanism for Web clients and servers and a language for specifying trust policies. REFEREE places all trust decisions under explicit policy control

Trust management survey

by Sini Ruohomaa, Lea Kutvonen - Proceedings of Trust Management: Third International Conference, LNCS 3477, Springer-Verlag, Apr 2005, p. 77 – 92
"... Abstract. Trust is an important tool in human life, as it enables people to cope with the uncertainty caused by the free will of others. Uncertainty and uncontrollability are also issues in computer-assisted collaboration and electronic commerce in particular. A computational model of trust and its ..."
Abstract - Cited by 61 (13 self) - Add to MetaCart
implementation can alleviate this problem. This survey is directed to an audience wishing to familiarize themselves with the field, for example to locate a research target or implement a trust management system. It concentrates on providing a general overview of the state of the art, combined with examples

Deconstructing Trust Management

by Ajay Chander Stanford, Ajay Chander, Drew Dean, John C. Mitchell - Journal of Computer Security , 2002
"... We present soundness and completeness theorems for our earlier work on modeling trust management systems. ..."
Abstract - Add to MetaCart
We present soundness and completeness theorems for our earlier work on modeling trust management systems.
Next 10 →
Results 1 - 10 of 6,415
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University