• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,825
Next 10 →

Decentralized Trust Management

by Matt Blaze, Joan Feigenbaum, Jack Lacy - In Proceedings of the 1996 IEEE Symposium on Security and Privacy , 1996
"... We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, an ..."
Abstract - Cited by 1025 (24 self) - Add to MetaCart
approach to trust management, based on a simple language for specifying trusted actions and trust relationships. It also describes a prototype implementation of a new trust management system, called PolicyMaker, that will facilitate the development of security features in a wide range of network services

The Commitment-Trust Theory of Relationship Marketing

by Robert M. Morgan, Shelby D. Hunt - JOURNAL OF MARKETING , 1994
"... ..."
Abstract - Cited by 1582 (8 self) - Add to MetaCart
Abstract not found

Developing Trusting Relationships Through

by Izumi Yokoyama, Takuya Obara, Izumi Yokoyama, Takuya Obara , 2015
"... In this paper, we analyze the formation of trusting relationships among people through communication. To foster trusting relationships, individuals must disclose private and personal information. However, disclosing such information has both costs and benefits; therefore, both parties must decide on ..."
Abstract - Add to MetaCart
In this paper, we analyze the formation of trusting relationships among people through communication. To foster trusting relationships, individuals must disclose private and personal information. However, disclosing such information has both costs and benefits; therefore, both parties must decide

2.2 CONVENTIONAL TRUST RELATIONSHIPS.......................................................................................2

by unknown authors , 2003
"... 2. INTRODUCTION...............................................................................................................................2 2.1 TRUST RELATIONSHIPS..................................................................................................................2 ..."
Abstract - Add to MetaCart
2. INTRODUCTION...............................................................................................................................2 2.1 TRUST RELATIONSHIPS..................................................................................................................2

Trusting Relationships in the NATO Alliance

by Syddansk Universitet, Link To Publication, Vincent Charles Keating
"... Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download a ..."
Abstract - Add to MetaCart
Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal? Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Download date: 17. maj. 2016

Trust Relationship Modeling for Software Assurance

by David Burke, Joe Hurd, John Launchbury, Aaron Tomb , 2010
"... Software assurance, as practiced through the Common Criteria, is a mixture of processes, heuristics, and lessons learned from earlier failures. At the other end of the spectrum, formal methods establish rigorous mathematical properties of portions of code. By themselves, neither of these practices a ..."
Abstract - Add to MetaCart
are scalable to software systems with millions or billions of lines of code. We propose a framework that enables the collection and analysis of many disparate types of information to be applied to the issue of software assurance. Trust relationship modeling enables stakeholders to decompose the overall

General Methodology for Analysis and Modeling of Trust Relationships in Distributed Computing

by Weiliang Zhao, Vijay Varadharajan, George Bryan
"... Abstract—In this paper, we discuss a general methodology for analysis and modeling of trust relationships in distributed computing. We discuss the classification of trust relationships, categorize trust relationships into two layers and provide a hierarchy of trust relationships based on a formal de ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract—In this paper, we discuss a general methodology for analysis and modeling of trust relationships in distributed computing. We discuss the classification of trust relationships, categorize trust relationships into two layers and provide a hierarchy of trust relationships based on a formal

Secure routing for structured peer-to-peer overlay networks

by Miguel Castro, Peter Druschel, Ayalvadi Ganesh, Antony Rowstron, Dan S. Wallach , 2002
"... Structured peer-to-peer overlay networks provide a sub-strate for the construction of large-scale, decentralized applications, including distributed storage, group com-munication, and content distribution. These overlays are highly resilient; they can route messages correctly even when a large fract ..."
Abstract - Cited by 473 (12 self) - Add to MetaCart
without pre-existing trust relationships wish to pool their resources. This paper studies attacks aimed at preventing correct message delivery in structured peer-to-peer overlays and presents defenses to these attacks. We describe and eval-uate techniques that allow nodes to join the overlay, to maintain

Inferring Trust Relationships in Web-Based Social Networks

by Jennifer Golbeck, James Hendler - ACM Transactions on Internet Technology , 2005
"... The growth of web-based social networking and the properties of those networks have created great potential for producing intelligent software that integrates a user's social network and preferences. Our research looks particularly at assigning trust in web-based social nets and investigates ho ..."
Abstract - Cited by 39 (0 self) - Add to MetaCart
relationships between individuals that are not directly connected in the network. Both algorithms are shown theoretically and through simulation to produce calculated trust values that are highly accurate.. We then present TrustMail, a prototype email client that uses variations on these algorithms to score

Bridging Trust Relationships with Web Service Enhancements

by Zhengping Wu, Alfred C. Weaver
"... With the development of web technology and distributed systems, online collaborations are becoming more common and more demanding. Web services now provide standard mechanisms to enable online interactions. Yet security, privacy and trust-related protection mechanisms for web services need additiona ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
protection for privacy and trust. A trust establishment mechanism for web services must therefore ensure privacy and owner control at all times due to the subjectivity of trust relationships. This paper describes an indirect trust establishment mechanism to bridge and build new trust relationships from
Next 10 →
Results 1 - 10 of 4,825
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University