Secure computer systems: Mathematical foundations and model, The MITRE Corporation, 1973. ,
John Ioannidis, and Angelos D. Keromytis. The KeyNote Trust-Management System Version, 1999. ,
Decentralized trust management, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.164-173, 1996. ,
DOI : 10.1109/SECPRI.1996.502679
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.44.6276
An integration of reputation-based and policy-based trust management, Semantic Web Policy Workshop in conjunction with 4th International Semantic Web Conference, 2005. ,
Fine Grained Access Control with Trust and Reputation Management for Globus, Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems, pp.1505-1515, 2007. ,
DOI : 10.1007/978-3-540-76843-2_26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.4495
Overview of the AT&T Labs trust-management project, Security Protocols, pp.45-50, 1998. ,
Why Trust is Bad for Security, Electronic Notes in Theoretical Computer Science, vol.157, issue.3, pp.3-9, 2006. ,
DOI : 10.1016/j.entcs.2005.09.044
URL : http://doi.org/10.1016/j.entcs.2005.09.044
A method for access authorisation through delegation networks, Proc. Fourth Australasian Information Security Workshop, pp.165-174, 2006. ,
A logical framework for history-based access control and reputation systems, Journal of Computer Security, vol.16, issue.1, pp.63-101, 2008. ,
DOI : 10.3233/JCS-2008-16102
NET Framework Security, 2002. ,
Authentication in distributed systems: theory and practice, ACM Transactions on Computer Systems, vol.10, issue.4, pp.265-310, 1992. ,
DOI : 10.1145/138873.138874
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.4473
The NIST model for role-based access control, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.47-63, 2000. ,
DOI : 10.1145/344287.344301
Reputation Based Localized Access Control for Mobile Ad-Hoc Networks, Proceedings of Ad-Hoc, Mobile, and Wireless Networks, pp.197-210, 2006. ,
DOI : 10.1007/11814764_17
Reputation and Role Based Access Control Model for Multi-domain Environments, 2010 International Symposium on Intelligence Information Processing and Trusted Computing, pp.597-600, 2010. ,
DOI : 10.1109/IPTC.2010.64
Was ist Informatik? Elektronische Rechenanlagen, pp.157-161, 1971. ,