نتایج جستجو برای: trust management

تعداد نتایج: 902691  

2007
Claudio A. Ardagna Ernesto Damiani Sabrina De Capitani di Vimercati Sara Foresti Pierangela Samarati

The amount of data available electronically to a multitude of users has been increasing dramatically over the last few years. The size and dynamics of the user community set requirements that cannot be easily solved by traditional access control solutions. A promising approach for supporting access control in open environments is trust management . This chapter provides an overview of the most ...

Journal: :J. Internet Serv. Inf. Secur. 2011
Christian Damsgaard Jensen Nicola Dragoni Anirban Basu Clara Mancini

Information and Communication Technologies (ICT) are becoming increasingly important in the way we organize our lives, our workplaces and our societies. ICT allows people and organisations, that have never interacted with each other in the past, to initiate new and mutually beneficial businesses across the world. This means that personal and business information is increasingly being communicat...

2007
Sini Ruohomaa

Enterprise computing is moving towards more open, collaborative systems, which involves issues in technical, semantic and pragmatic interoperability. Trust management focuses on pragmatic problems of whether two enterprises trust each other enough to want to collaborate in the first place, or whether they wish to end an existing endeavour due to perceived risks outweighing the trust between the...

2012
Theodosis Dimitrakos

Year 2012 completes a decade since a research network called iTrust was established in Europe in 2002. The international research community associated with the iTrust network has been the main – albeit not the only – predecessor of the IFIP Working Group 11.11 on Trust Management the organization behind events such as the IFIPTM conference series. Since that era, I have spent the last decade wi...

2005
Simon N. Foley

Trust Management [1, 4, 10] is an approach to constructing and interpreting the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic credentials are used to specify delegation of authorisation among public keys. Existing trust management schemes are operational in nature, defining security in terms of specific controls such as delegation chains...

2005
Junbeom Hur Yoonho Lee Seongmin Hong Hyunsoo Yoon

Wireless Sensor networks are often deployed in open environment, thus the networks can be susceptible to their unexpected physical environment and attacks from some adversaries. In addition, sensor devices are limited in resources and vulnerable to node capture, so even a few malicious adversaries can easily compromise sensor devices and inject forged data into the networks to make the networks...

Journal: :CoRR 2010
Jaydip Sen

Studies on the large scale peer-to-peer (P2P) network like Gnutella have shown the presence of large number of free riders. Moreover, the open and decentralized nature of P2P network is exploited by malicious users who distribute unauthentic or harmful contents. Despite the existence of a number of trust management schemes in the literature for combating against free riding and distribution of ...

2007
Marcin Czenko Sandro Etalle

We propose CoreTuLiP the core of a trust management language based on Logic Programming. CoreTuLiP is based on a subset of moded logic programming, but enjoys the features of TM languages such as RT; in particular clauses are issued by different authorities and stored in a distributed manner. We present a lookup and inference algorithm which we prove to be correct and complete w.r.t. the declar...

2010
Jin-Hee Cho Ananthram Swami Ing-Ray Chen

Mobile ad hoc and sensor networks often contain a mixture of nodes, some of which may be selfish and non-cooperative in providing network services such as forwarding packets in order to conserve energy. Existing trust management protocols for mobile ad hoc networks (MANETs) advocate isolating selfish nodes as soon as they are detected. Further, altruistic behaviors are encouraged with incentive...

2016
C. Priya R. Latha

Trust is one of the most concerned obstacles for the adoption and growth of cloud computing. Although several solutions have been proposed recently in managing trust feedbacks in cloud environments, how to determine the credibility of trust feedbacks is mostly neglected. In addition, managing trust feedbacks in cloud environments is a difficult problem due to unpredictable number of cloud servi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید