Can We Trust Trust?, Trust: Making and Breaking Cooperative Relations, pp.213-238, 1990. ,
A Survey of Trust and Reputation Systems for Online Service Provision, Decision Support Systems, vol.43, pp.618-644, 2007. ,
, A Survey of Trust in Internet Applications, Commun. Surveys Tuts, 2000.
Automated Trust Negotiation, DARPA Information Survivability Conference and Exposition, 2000. DISCEX '00. Proceedings, vol.1, pp.88-102, 2000. ,
Towards Practical Automated Trust Negotiation, Proceedings Third International Workshop on Policies for Distributed Systems and Networks, pp.92-103, 2002. ,
A Unified Scheme for Resource Protection in Automated Trust Negotiation, Symposium on Security and Privacy, pp.110-122, 2003. ,
Trust Engineering Framework for Software Services, 2015. ,
Negotiating Trust in the Web, Internet Computing, IEEE, vol.6, issue.6, pp.30-37, 2002. ,
, TrustBuilder2: A Reconfigurable Framework for Trust Negotiation. No. SAND2007-1928C. Sandia National Laboratories (SNL-CA), 2007.
, Security and Privacy Policy Languages: A Survey, Categorization and Gap Identification, 2015.
A Survey of Privacy Policy Languages, Workshop on Usable IT Security Management (USM 07): Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007. ,
Requirements for Policy Languages for Trust Negotiation, IEEE Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks, 2002. ,
, eXtensible Access Control Markup Language (XACML) 3.0, Committee Specification 01, 2010.
, Primelife Policy Language, W3C Workshop on Access Control Application Scenarios. W3C, 2009.
, PPL Engine: A Symmetric Architecture for Privacy Policy Handling, W3C Workshop on Privacy and Data Usage Control, vol.4, 2010.
A-PPL: An Accountability Policy Language, Data Privacy Management, Autonomous Spontaneous Security And Security Assurance, pp.319-326, 2015. ,
P2U: A Privacy Policy Specification Language for Secondary Data Sharing and Usage, IEEE Security and Privacy Workshops, 2014. ,
PlexC: A Policy Language for Exposure Control, Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012. ,
Cassandra: Distributed Access Control Policies with Tunable Expressiveness, Policies for Distributed Systems and Networks, Proceedings. Fifth IEEE International Workshop on, 2004. ,
X-TNL: An XML-based Language for Trust Negotiations, IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003. ,
XPref: A Preference Language for P3P, Computer Networks, 2005. ,
A Logical Language for Expressing Authorizations, Proceedings. 1997 IEEE Symposium on Security and Privacy, 1997. ,
XML Path Language (XPath) Version 1.0. W3C Recommendation, 1999. ,
A Framework for Privacy Preferences and Data-Handling Policies, 2009. ,
A Rule-Based Trust Negotiation System, IEEE Transactions on Knowledge and Data Engineering, vol.22, issue.11, 2010. ,
HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems, Information Security Technical Report, vol.17, pp.81-92, 2013. ,
, PRML: Privacy Rights Markup Language Specification Version 0, vol.9, 2001.
Regulating Service Access and Information Release on the Web, 7th ACM Conference on Computer and Communications Security, 2000. ,
, Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers, Proceeding 2000 IEEE Symposium on Security and Privacy, pp.2-14, 2000.
On Specifying Security Policies for Web Documents with an XML-based Language, Sixth ACM SACMAT, 2001. ,
The KeyNote TrustManagement System Version 2, RFC 2704, 1999. ,