FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment
暂无分享,去创建一个
Giuseppe Cattaneo | Alfredo De Santis | Francesco Palmieri | Ugo Fiore | Aniello Castiglione | Giuliana Carullo | A. D. Santis | Aniello Castiglione | F. Palmieri | Ugo Fiore | G. Cattaneo | Giuliana Carullo
[1] Audun Jøsang,et al. Dirichlet Reputation Systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[2] Francesco Palmieri,et al. Automatic security assessment for next generation wireless mobile networks , 2011, Mob. Inf. Syst..
[3] Jennifer Golbeck,et al. Investigating interactions of trust and interest similarity , 2007, Decis. Support Syst..
[4] Josep Lluís de la Rosa i Esteva,et al. Opinion-Based Filtering through Trust , 2002, CIA.
[5] Ulrich Ultes-Nitsche,et al. Transport Layer Security (TLS) Extensions for the Trusted Platform Module (TPM) , 2010 .
[6] Tomas Olsson. Decentralized Social Filtering based on Trust , 1998, AAAI 1998.
[7] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[8] E. B. Wilson. Probable Inference, the Law of Succession, and Statistical Inference , 1927 .
[9] Amitava Mukherjee,et al. Pervasive Computing: A Paradigm for the 21st Century , 2003, Computer.
[10] Yoshiyori Urano,et al. User authentication on smart phones using a data mining method , 2010, 2010 International Conference on Information Society.
[11] Gianni D'Angelo,et al. A bluetooth infrastructure for automatic services access in ubiquitous and nomadic computing environments , 2007, MobiWac '07.
[12] Félix Gómez Mármol,et al. Security threats scenarios in trust and reputation models for distributed systems , 2009, Comput. Secur..
[13] C. Sierra,et al. REGRET: A reputation model for gregarious societies , 2001 .
[14] Francesco Palmieri,et al. Audit-Based Access Control in Nomadic Wireless Environments , 2006, ICCSA.
[15] David Wetherall,et al. Toward trustworthy mobile sensing , 2010, HotMobile '10.
[16] Peter Szolovits,et al. Ratings in Distributed Systems: A Bayesian Approach , 2002 .
[17] Jean-Pierre Seifert,et al. Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms , 2009, MobiSec.
[18] Salam HAJJAR,et al. Privacy Preserving Reputation Systems , 2009 .
[19] Julita Vassileva,et al. Trust and reputation model in peer-to-peer networks , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[20] Marco Voss,et al. Privacy Preserving Online Reputation Systems , 2004, International Information Security Workshops.
[21] Paul J. Leach,et al. Simple Service Discovery Protocol/1.0 , 1999 .
[22] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[23] S Hailes,et al. Using Recommendations for Managing Trust in Distributed Systems , 1997 .
[24] Philip Ginzboorg,et al. Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems , 2004, ESAS.
[25] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[26] Jim Waldo,et al. The Jini architecture for network-centric computing , 1999, CACM.
[27] Chrysanthos Dellarocas,et al. Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems , 2000, ICIS.