Experts in Uncertainty: Opinion and Subjective Probability in Science, 1991. ,
Expert Judgement for a Probabilistic Accident Consequence Uncertainty Analysis, Radiation Protection Dosimetry, vol.90, issue.3, pp.295-303, 2000. ,
DOI : 10.1093/oxfordjournals.rpd.a033151
27046-ACTIVE: EP-27046-ACTIVE, Final Prototype and User Manual, D4.2.2, Ver, 2001. ,
The Honeynet Project, Phase 1: Installing and Tuning Honeyd using LIDS (2003) Project assignment ,
Remote Denial of Service Attacks and Countermeasures, 2001. ,
A Testbed for Study of Distributed Denial of Service Attacks, Proceedings of the IEEE Workshop on Information Assurance and Security, pp.218-223, 2000. ,
A Survey on Solutions to Distributed Denial of Service Attacks, 2006. ,
A subjective metric of authentication, Proceedings of the 5th European Symposium on Research in Computer Security, pp.329-344, 1998. ,
DOI : 10.1007/BFb0055873
An Algebra for Assessing Trust in Certification Chains, Proceedings of the 1999 Network and Distributed Systems Security Symposium, 1999. ,
Trust in Decision Aids: A Model and a Training Strategy, 1997. ,
Trust relationships in secure systems-a distributed authentication perspective, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy, pp.150-164, 1993. ,
DOI : 10.1109/RISP.1993.287635
Trust-based Navigation in Distributed Systems, Computing Systems, vol.7, issue.1, pp.45-73, 1994. ,
Valuation of trust in open networks, Proceedings of the 3rd European Symposium on Research in Computer Security, pp.3-18, 1994. ,
DOI : 10.1007/3-540-58618-0_53
A Reputation-Based Trust Model For Peer-To-Peer Ecommerce Communities, Proceedings of the IEEE Conference on E-Commerce, pp.275-284, 2003. ,
Trust as Type Identification. In: Trust and Deception in Virtual Societies, pp.1-26, 2000. ,
A Simple Graphical Tool For Modelling Trust, Computers & Security, vol.20, issue.6, pp.479-484, 2001. ,
DOI : 10.1016/S0167-4048(01)00605-8
A Vector Model of Trust for Developing Trustworthy Systems, Proceedings of the 9th European Symposium on Research in Computer Security, pp.260-275, 2004. ,
DOI : 10.1007/978-3-540-30108-0_16
An interoperable context sensitive model of trust, Journal of Intelligent Information Systems, vol.7, issue.1, pp.75-104, 2009. ,
DOI : 10.1007/s10844-007-0049-9
Supporting trust in virtual communities, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, pp.4-7, 2000. ,
DOI : 10.1109/HICSS.2000.926814
A logic of authentication, ACM Transactions on Computer Systems, vol.8, issue.1, pp.18-36, 1990. ,
DOI : 10.1145/77648.77649
On the Characterization of a Trusting Agent ? Aspects of a Formal Approach In: Trust and Deception in Virtual Societies, pp.157-168, 2000. ,
A logical language for expressing authorizations, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.31-42, 1997. ,
DOI : 10.1109/SECPRI.1997.601312
Towards Operational Measures of Computer Security, Journal of Computer Security, vol.2, issue.2-3, pp.211-229, 1993. ,
DOI : 10.3233/JCS-1993-22-308
Experiments with Quantitative Evaluation Tools for Monitoring Operational Security, IEEE Transaction on Software Engineering, vol.5, issue.25, pp.633-650, 1999. ,
Modeling and quantification of security attributes of software systems, Proceedings International Conference on Dependable Systems and Networks, pp.505-514, 2002. ,
DOI : 10.1109/DSN.2002.1028941
A quantitative model of the security intrusion process based on attacker behavior, IEEE Transactions on Software Engineering, vol.23, issue.4, pp.235-246, 1997. ,
DOI : 10.1109/32.588541
Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Framework, Version 1.0, 1999. ,
The Use of the CCTA Risk Analysis and Management Methodology CRAMM in Health Information Systems, Proceedings of the International Medical Informatics Conference, pp.1589-1593, 1992. ,
Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation, Proceedings of the 4th International Conference on Trust Management, pp.135-149, 2006. ,
DOI : 10.1007/11755593_11