A survey of trust in internet applications

T Grandison, M Sloman - IEEE Communications Surveys & …, 2000 - ieeexplore.ieee.org
Trust is an important aspect of decision making for Internet applications and particularly
influences the specification of security policy, ie, who is authorized to perform actions as well …

Grid resource management: state of the art and future trends

J Nabrzyski, JM Schopf, J Weglarz - 2012 - books.google.com
Grid Resource Management: State of the Art and Future Trends presents an overview of the
state of the field and describes both the real experiences and the current research available …

Machine learning based trust computational model for IoT services

U Jayasinghe, GM Lee, TW Um… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The Internet of Things has facilitated access to a large volume of sensitive information on
each participating object in an ecosystem. This imposes many threats ranging from the risks …

[PDF][PDF] Implementing a distributed firewall

S Ioannidis, AD Keromytis, SM Bellovin… - Proceedings of the 7th …, 2000 - dl.acm.org
Conventional firewalls rely on topology restrictions and controlled network entry points to
enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does not see, so …

Cryptographically generated addresses (CGA)

T Aura - International Conference on Information Security, 2003 - Springer
Cryptographically generated addresses (CGA) are IPv6 addresses some address bits are
generated by hashing the address owner's public key. The address owner uses the …

Design of a role-based trust-management framework

N Li, JC Mitchell… - Proceedings 2002 IEEE …, 2002 - ieeexplore.ieee.org
We introduce the RT framework, a family of role-based trust management languages for
representing policies and credentials in distributed authorization. RT combines the strengths …

Improving Host Security with System Call Policies.

N Provos - USENIX Security Symposium, 2003 - usenix.org
We introduce a system that eliminates the need to run programs in privileged process
contexts. Using our system, programs run unprivileged but may execute certain operations …

[HTML][HTML] Distributed firewalls

SM Bellovin - 1999 - usenix.org
Conventional firewalls [5] rely on the notions of restricted topology and controlled entry
points to function. More precisely, they rely on the assumption that everyone on one side of …

SOS: Secure overlay services

AD Keromytis, V Misra, D Rubenstein - ACM SIGCOMM Computer …, 2002 - dl.acm.org
Denial of service (DoS) attacks continue to threaten the reliability of networking systems.
Previous approaches for protecting networks from DoS attacks are reactive in that they wait …

Enforcing access control in web-based social networks

B Carminati, E Ferrari, A Perego - ACM Transactions on Information and …, 2009 - dl.acm.org
In this article, we propose an access control mechanism for Web-based social networks,
which adopts a rule-based approach for specifying access policies on the resources owned …