{"title":"Persistent and Dynamic Trust: Analysis and the Related Impact of Trusted Platforms","authors":"Siani Pearson, M. C. Mont, S. Crane","doi":"10.1007/11429760_24","DOIUrl":"https://doi.org/10.1007/11429760_24","url":null,"abstract":"","PeriodicalId":374914,"journal":{"name":"Trust Management","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125142619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of the SECURE Trust Engine","authors":"C. Bryce, P. Couderc, J. Seigneur, V. Cahill","doi":"10.1007/11429760_29","DOIUrl":"https://doi.org/10.1007/11429760_29","url":null,"abstract":"","PeriodicalId":374914,"journal":{"name":"Trust Management","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131071167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy","authors":"Siani Pearson","doi":"10.1007/11429760_21","DOIUrl":"https://doi.org/10.1007/11429760_21","url":null,"abstract":"","PeriodicalId":374914,"journal":{"name":"Trust Management","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129165902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Bryce, N. Dimmock, K. Krukow, J. Seigneur, V. Cahill, W. Wagealla
{"title":"Towards an Evaluation Methodology for Computational Trust Systems","authors":"C. Bryce, N. Dimmock, K. Krukow, J. Seigneur, V. Cahill, W. Wagealla","doi":"10.1007/11429760_20","DOIUrl":"https://doi.org/10.1007/11429760_20","url":null,"abstract":"","PeriodicalId":374914,"journal":{"name":"Trust Management","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114391936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Giorgini, F. Massacci, J. Mylopoulos, Nicola Zannone
{"title":"Modeling Social and Individual Trust in Requirements Engineering Methodologies","authors":"P. Giorgini, F. Massacci, J. Mylopoulos, Nicola Zannone","doi":"10.1007/11429760_12","DOIUrl":"https://doi.org/10.1007/11429760_12","url":null,"abstract":"","PeriodicalId":374914,"journal":{"name":"Trust Management","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126531998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk Models for Trust-Based Access Control(TBAC)","authors":"N. Dimmock, J. Bacon, D. Ingram, K. Moody","doi":"10.1007/11429760_25","DOIUrl":"https://doi.org/10.1007/11429760_25","url":null,"abstract":"","PeriodicalId":374914,"journal":{"name":"Trust Management","volume":"os-7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127688556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-Preserving Search and Updates for Outsourced Tree-Structured Data on Untrusted Servers","authors":"T. K. Dang","doi":"10.1007/11429760_23","DOIUrl":"https://doi.org/10.1007/11429760_23","url":null,"abstract":"","PeriodicalId":374914,"journal":{"name":"Trust Management","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130233184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Can We Manage Trust?","authors":"A. Jøsang, C. Keser, T. Dimitrakos","doi":"10.1007/11429760_7","DOIUrl":"https://doi.org/10.1007/11429760_7","url":null,"abstract":"","PeriodicalId":374914,"journal":{"name":"Trust Management","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133859143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust, Untrust, Distrust and Mistrust - An Exploration of the Dark(er) Side","authors":"S. Marsh, M. Dibben","doi":"10.1007/11429760_2","DOIUrl":"https://doi.org/10.1007/11429760_2","url":null,"abstract":"","PeriodicalId":374914,"journal":{"name":"Trust Management","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122450018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Giorgini, F. Massacci, J. Mylopoulos, A. Siena, Nicola Zannone
{"title":"ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements","authors":"P. Giorgini, F. Massacci, J. Mylopoulos, A. Siena, Nicola Zannone","doi":"10.1007/11429760_33","DOIUrl":"https://doi.org/10.1007/11429760_33","url":null,"abstract":"","PeriodicalId":374914,"journal":{"name":"Trust Management","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128118117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}