Nothing Special   »   [go: up one dir, main page]

skip to main content
article

REFEREE: trust management for Web applications

Published: 01 September 1997 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2021)Towards trustworthy Cyber-physical Production SystemsJournal of Ambient Intelligence and Smart Environments10.3233/AIS-21059313:2(157-180)Online publication date: 1-Jan-2021
  • (2020)A Trust Management Model for Internet of VehiclesProceedings of the 2020 4th International Conference on Cryptography, Security and Privacy10.1145/3377644.3377664(136-140)Online publication date: 10-Jan-2020
  • (2017)Mitigating Browser-based DDoS Attacks using CORPProceedings of the 10th Innovations in Software Engineering Conference10.1145/3021460.3021477(137-146)Online publication date: 5-Feb-2017
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Computer Networks and ISDN Systems
Computer Networks and ISDN Systems  Volume 29, Issue 8-13
Sep. 1997
645 pages
ISSN:0169-7552
Issue’s Table of Contents

Publisher

Elsevier Science Publishers B. V.

Netherlands

Publication History

Published: 01 September 1997

Author Tags

  1. network security
  2. policy evaluation
  3. trust management

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Towards trustworthy Cyber-physical Production SystemsJournal of Ambient Intelligence and Smart Environments10.3233/AIS-21059313:2(157-180)Online publication date: 1-Jan-2021
  • (2020)A Trust Management Model for Internet of VehiclesProceedings of the 2020 4th International Conference on Cryptography, Security and Privacy10.1145/3377644.3377664(136-140)Online publication date: 10-Jan-2020
  • (2017)Mitigating Browser-based DDoS Attacks using CORPProceedings of the 10th Innovations in Software Engineering Conference10.1145/3021460.3021477(137-146)Online publication date: 5-Feb-2017
  • (2016)Privacy challenges in Ambient Intelligence systemsJournal of Ambient Intelligence and Smart Environments10.3233/AIS-1604058:6(619-644)Online publication date: 1-Jan-2016
  • (2011)Rule-based trust assessment on the semantic webProceedings of the 5th international conference on Rule-based reasoning, programming, and applications10.5555/2032787.2032811(227-241)Online publication date: 19-Jul-2011
  • (2010)The pervasive trust foundation for security in next generation networksProceedings of the 2010 New Security Paradigms Workshop10.1145/1900546.1900564(129-142)Online publication date: 21-Sep-2010
  • (2010)Privacy-preserving trust verificationProceedings of the 15th ACM symposium on Access control models and technologies10.1145/1809842.1809865(139-148)Online publication date: 9-Jun-2010
  • (2009)ABUSEProceedings of the 6th European conference on Public key infrastructures, services and applications10.5555/1927830.1927844(146-162)Online publication date: 10-Sep-2009
  • (2008)AURAProceedings of the 13th ACM SIGPLAN international conference on Functional programming10.1145/1411204.1411212(27-38)Online publication date: 20-Sep-2008
  • (2008)AURAACM SIGPLAN Notices10.1145/1411203.141121243:9(27-38)Online publication date: 20-Sep-2008
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media