A survey of trust in internet applications

T Grandison, M Sloman - IEEE Communications Surveys & …, 2000 - ieeexplore.ieee.org
Trust is an important aspect of decision making for Internet applications and particularly
influences the specification of security policy, ie, who is authorized to perform actions as well …

A survey on key management and authentication approaches in smart metering systems

MS Abdalzaher, MM Fouda, A Emran, ZM Fadlullah… - Energies, 2023 - mdpi.com
The implementation of the smart grid (SG) and cyber-physical systems (CPS) greatly
enhances the safety, reliability, and efficiency of energy production and distribution. Smart …

The UCONABC usage control model

J Park, R Sandhu - ACM transactions on information and system security …, 2004 - dl.acm.org
In this paper, we introduce the family of UCONABC models for usage control (UCON), which
integrate Authorizations (A), oBligations (B), and Conditions (C). We call these core models …

Design and implementation of the idemix anonymous credential system

J Camenisch, E Van Herreweghen - … of the 9th ACM Conference on …, 2002 - dl.acm.org
Anonymous credential systems [8, 9, 12, 24] allow anonymous yet authenticated and
accountable transactions between users and service providers. As such, they represent a …

Trust in multi-agent systems

SD Ramchurn, D Huynh, NR Jennings - The knowledge engineering …, 2004 - cambridge.org
Trust is a fundamental concern in large-scale open distributed systems. It lies at the core of
all interactions between the entities that have to operate in such uncertain and constantly …

Information theoretic framework of trust modeling and evaluation for ad hoc networks

YL Sun, W Yu, Z Han, KJR Liu - IEEE Journal on Selected …, 2006 - ieeexplore.ieee.org
The performance of ad hoc networks depends on cooperation and trust among distributed
nodes. To enhance security in ad hoc networks, it is important to evaluate trustworthiness of …

Design of a role-based trust-management framework

N Li, JC Mitchell… - Proceedings 2002 IEEE …, 2002 - ieeexplore.ieee.org
We introduce the RT framework, a family of role-based trust management languages for
representing policies and credentials in distributed authorization. RT combines the strengths …

Securing context-aware applications using environment roles

MJ Covington, W Long, S Srinivasan, AK Dev… - Proceedings of the sixth …, 2001 - dl.acm.org
In the future, a largely invisible and ubiquitous computing infrastructure will assist people
with a variety of activities in the home and at work. The applications that will be deployed in …

A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks

YL Sun, Z Han, W Yu, KJR Liu - Proceedings IEEE INFOCOM …, 2006 - ieeexplore.ieee.org
The performance of distributed networks depends on collaboration among distributed
entities. To enhance security in distributed networks, such as ad hoc networks, it is important …

Trust-based security for wireless ad hoc and sensor networks

A Boukerch, L Xu, K El-Khatib - Computer Communications, 2007 - Elsevier
Wireless sensors networks are susceptible to a large number of security threats, and
because of the communication, computation and delay constraints of most applications that …