A survey of trust in internet applications

T Grandison, M Sloman - IEEE Communications Surveys & …, 2000 - ieeexplore.ieee.org
Trust is an important aspect of decision making for Internet applications and particularly
influences the specification of security policy, ie, who is authorized to perform actions as well …

Understanding graph-based trust evaluation in online social networks: Methodologies and challenges

W Jiang, G Wang, MZA Bhuiyan, J Wu - Acm Computing Surveys (Csur), 2016 - dl.acm.org
Online Social Networks (OSNs) are becoming a popular method of meeting people and
keeping in touch with friends. OSNs resort to trust evaluation models and algorithms to …

Access control: Policies, models, and mechanisms

P Samarati, SC De Vimercati - … school on foundations of security analysis …, 2000 - Springer
Access control is the process of mediating every request to resources and data maintained
by a system and determining whether the request should be granted or denied. The access …

Теория систем

ВЯ Цветков - 2018 - elibrary.ru
Монография написана по материалам лекционных курсов, читаемых в Московском
государственном университете геодезии и картографии. Монография описывает …

Tarzan: A peer-to-peer anonymizing network layer

MJ Freedman, R Morris - Proceedings of the 9th ACM Conference on …, 2002 - dl.acm.org
Tarzan is a peer-to-peer anonymous IP network overlay. Because it provides IP service,
Tarzan is general-purpose and transparent to applications. Organized as a decentralized …

A survey of trust in computer science and the semantic web

D Artz, Y Gil - Journal of Web Semantics, 2007 - Elsevier
Trust is an integral component in many kinds of human interaction, allowing people to act
under uncertainty and with the risk of negative consequences. For example, exchanging …

[PDF][PDF] Implementing a distributed firewall

S Ioannidis, AD Keromytis, SM Bellovin… - Proceedings of the 7th …, 2000 - dl.acm.org
Conventional firewalls rely on topology restrictions and controlled network entry points to
enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does not see, so …

A survey of autonomic communications

S Dobson, S Denazis, A Fernández, D Gaïti… - ACM Transactions on …, 2006 - dl.acm.org
Autonomic communications seek to improve the ability of network and services to cope with
unpredicted change, including changes in topology, load, task, the physical and logical …

A reputation-based approach for choosing reliable resources in peer-to-peer networks

E Damiani, DC di Vimercati, S Paraboschi… - Proceedings of the 9th …, 2002 - dl.acm.org
Peer-to-peer (P2P) applications have seen an enormous success, and recently introduced
P2P services have reached tens of millions of users. A feature that significantly contributes to …

Trust management of services in cloud environments: Obstacles and solutions

TH Noor, QZ Sheng, S Zeadally, J Yu - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Trust management is one of the most challenging issues in the emerging cloud computing
area. Over the past few years, many studies have proposed different techniques to address …