Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Dynamic Trust Management

Published: 01 February 2009 Publication History

Abstract

Trust management forms the basis for communicating policy among system elements and demands credential checking for access to all virtual private service resources—along with careful evaluation of credentials against specified policies—before a party can be trusted.

Cited By

View all
  • (2018)Opportunities and Challenges in Monitoring Cyber-Physical Systems SecurityLeveraging Applications of Formal Methods, Verification and Validation. Industrial Practice10.1007/978-3-030-03427-6_2(9-18)Online publication date: 5-Nov-2018
  • (2016)Intercrossed Access Controls for Secure Financial Services on Multimedia Big Data in Cloud SystemsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/297857512:4s(1-18)Online publication date: 15-Sep-2016
  • (2015)A Survey on Trust ModelingACM Computing Surveys10.1145/281559548:2(1-40)Online publication date: 12-Oct-2015
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Computer
Computer  Volume 42, Issue 2
February 2009
92 pages

Publisher

IEEE Computer Society Press

Washington, DC, United States

Publication History

Published: 01 February 2009

Author Tags

  1. Global Information Grid
  2. service-oriented architecture
  3. trust management
  4. virtual private services

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Opportunities and Challenges in Monitoring Cyber-Physical Systems SecurityLeveraging Applications of Formal Methods, Verification and Validation. Industrial Practice10.1007/978-3-030-03427-6_2(9-18)Online publication date: 5-Nov-2018
  • (2016)Intercrossed Access Controls for Secure Financial Services on Multimedia Big Data in Cloud SystemsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/297857512:4s(1-18)Online publication date: 15-Sep-2016
  • (2015)A Survey on Trust ModelingACM Computing Surveys10.1145/281559548:2(1-40)Online publication date: 12-Oct-2015
  • (2015)Information Governance Requirements for Architectural Solutions Supporting Dynamic Business NetworkingService-Oriented Computing – ICSOC 2015 Workshops10.1007/978-3-662-50539-7_15(184-189)Online publication date: 16-Nov-2015
  • (2014)An adaptable distributed trust management framework for large-scale secure service-based systemsComputing10.1007/s00607-013-0354-996:10(925-949)Online publication date: 1-Oct-2014
  • (2010)Software managment applications, textile CAD and human factorsProceedings of the First international conference on Advances in new technologies, interactive interfaces, and communicability10.5555/1996774.1996787(121-131)Online publication date: 20-Oct-2010
  • (2010)Spam mitigation using spatio-temporal reputations from blacklist historyProceedings of the 26th Annual Computer Security Applications Conference10.1145/1920261.1920287(161-170)Online publication date: 6-Dec-2010
  • (2010)Improving component selection and monitoring with controlled experimentation and automated measurementsInformation and Software Technology10.1016/j.infsof.2010.02.00152:6(641-655)Online publication date: 1-Jun-2010
  • (2009)Federation proxy for cross domain identity federationProceedings of the 5th ACM workshop on Digital identity management10.1145/1655028.1655041(53-62)Online publication date: 13-Nov-2009
  • (2009)An architectural approach for assessing system trust based on security policy specifications and security mechanismsProceedings of the 2nd international conference on Security of information and networks10.1145/1626195.1626214(71-74)Online publication date: 6-Oct-2009
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media