Results 1 - 10
of
6,415
Decentralized Trust Management
- In Proceedings of the 1996 IEEE Symposium on Security and Privacy
, 1996
"... We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, an ..."
Abstract
-
Cited by 1025 (24 self)
- Add to MetaCart
We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies
Design of a role-based trust management framework
- In Proceedings of the 2002 IEEE Symposium on Security and Privacy
, 2002
"... We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths of role-based access control and trustmanagement systems and is especially suitable for attributebased access control. Usi ..."
Abstract
-
Cited by 362 (42 self)
- Add to MetaCart
We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths of role-based access control and trustmanagement systems and is especially suitable for attributebased access control
Trust management for the semantic web
- In ISWC
, 2003
"... Abstract. Though research on the Semantic Web has progressed at a steady pace, its promise has yet to be realized. One major difficulty is that, by its very nature, the Semantic Web is a large, uncensored system to which anyone may contribute. This raises the question of how much credence to give ea ..."
Abstract
-
Cited by 271 (3 self)
- Add to MetaCart
each source. We cannot expect each user to know the trustworthiness of each source, nor would we want to assign top-down or global credibility values due to the subjective nature of trust. We tackle this problem by employing a web of trust, in which each user provides personal trust values for a small
Trust Management
"... Trust management is a form of distributed access control that allows one principal to delegate some access decisions to other principals. While this makes trust management more flexible than the access matrix model, it makes safety and security analysis more important. We show that in contrast to th ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
Trust management is a form of distributed access control that allows one principal to delegate some access decisions to other principals. While this makes trust management more flexible than the access matrix model, it makes safety and security analysis more important. We show that in contrast
KeyNote: Trust Management for Public-Key Infrastructures
- Infrastructures (Position Paper). Lecture Notes in Computer Science 1550
, 1998
"... This paper discusses the rationale for designing a simple trust-management system for public-key infrastructures, called KeyNote. ..."
Abstract
-
Cited by 214 (4 self)
- Add to MetaCart
This paper discusses the rationale for designing a simple trust-management system for public-key infrastructures, called KeyNote.
Trust Management
, 2007
"... The amount of data available electronically to a multitude of users has been increasing dramatically over the last few years. The size and dynamics of the user community set requirements that cannot be easily solved by traditional access control solutions. A promising approach for supporting access ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
access control in open environments is trust management. This chapter provides an overview of the most significant approaches for managing and negotiating trust between parties. We start by introducing the basic concepts on which trust management systems are built, describing their relationships
Understanding trust management systems
- In Proc. IEEE Symposium on Security and Privacy
, 2001
"... This paper presents a mathematical framework for expressing trust management systems. The framework makes it easier to understand existing systems and to compare them to one another, as well as to design new systems. The framework defines the semantics of a trust management engine via a least fixpoi ..."
Abstract
-
Cited by 85 (0 self)
- Add to MetaCart
This paper presents a mathematical framework for expressing trust management systems. The framework makes it easier to understand existing systems and to compare them to one another, as well as to design new systems. The framework defines the semantics of a trust management engine via a least
REFEREE: Trust Management for Web Applications
"... Digital signatures provide a mechanism for guaranteeing integrity and authenticity of Web content but not more general notions of security or trust. Web-aware applications must permit users to state clearly their own security policies and, of course, must provide the cryptographic tools for manipula ..."
Abstract
-
Cited by 137 (7 self)
- Add to MetaCart
for manipulating digital signatures. This paper describes the REFEREE trust management system for Web applications; REFEREE provides both a general policy-evaluation mechanism for Web clients and servers and a language for specifying trust policies. REFEREE places all trust decisions under explicit policy control
Trust management survey
- Proceedings of Trust Management: Third International Conference, LNCS 3477, Springer-Verlag, Apr 2005, p. 77 – 92
"... Abstract. Trust is an important tool in human life, as it enables people to cope with the uncertainty caused by the free will of others. Uncertainty and uncontrollability are also issues in computer-assisted collaboration and electronic commerce in particular. A computational model of trust and its ..."
Abstract
-
Cited by 61 (13 self)
- Add to MetaCart
implementation can alleviate this problem. This survey is directed to an audience wishing to familiarize themselves with the field, for example to locate a research target or implement a trust management system. It concentrates on providing a general overview of the state of the art, combined with examples
Deconstructing Trust Management
- Journal of Computer Security
, 2002
"... We present soundness and completeness theorems for our earlier work on modeling trust management systems. ..."
Abstract
- Add to MetaCart
We present soundness and completeness theorems for our earlier work on modeling trust management systems.
Results 1 - 10
of
6,415