Sciweavers

801 search results - page 2 / 161
» The Use of Formal Methods in the Analysis of Trust (Position...
Sort
View
ICIW
2007
IEEE
13 years 5 months ago
Analysis of Web Services Secure Conversation with Formal Methods
Web Services Secure Conversation extends Web Services Trust to provide mechanisms for establishing security consecurity context is an abstract concept that refers an authenticated...
M. Llanos Tobarra, Diego Cazorla, Fernando Cuarter...
IGPL
2010
111views more  IGPL 2010»
13 years 4 months ago
A logic of trust and reputation
Reputation and trust are useful instruments in multi-agent systems to evaluate agent behaviour. Most of the works on trust and reputation adopt a quantitative representation of the...
Andreas Herzig, Emiliano Lorini, Jomi Fred Hü...
SECURWARE
2008
IEEE
14 years 4 days ago
Optimal Trust Network Analysis with Subjective Logic
Trust network analysis with subjective logic (TNA-SL) simplifies complex trust graphs into series-parallel graphs by removing the most uncertain paths to obtain a canonical graph...
Audun Jøsang, Touhid Bhuiyan
ICC
2007
IEEE
108views Communications» more  ICC 2007»
14 years 2 days ago
Trust Establishment in Distributed Networks: Analysis and Modeling
— Recently, trust establishment is recognized as an important approach to defend distributed networks, such as mobile ad hoc networks and sensor networks, against malicious attac...
Yan Lindsay Sun, Yafei Yang
CSE
2009
IEEE
14 years 15 days ago
Ceremonies Formal Analysis in PKI's Context
—Ceremonies are a useful tool to establish trust in scenarios where protocols operate. They describe a greater range of issues not taken into account by protocol designers. We ta...
Jean Everson Martina, Túlio Cicero Salvaro ...