Trust-based enforcement of security policies

被引:0
|
作者
Vigo, Roberto [1 ]
Celestini, Alessandro [2 ]
Tiezzi, Francesco [3 ]
De Nicola, Rocco [3 ]
Nielson, Flemming [1 ]
Nielson, Hanne Riis [1 ]
机构
[1] DTU Compute, Technical University of Denmark, Kongens Lyngby, Denmark
[2] Istituto per le Applicazioni del Calcolo, IAC-CNR, Rome, Italy
[3] IMT, Institute for Advanced Studies Lucca, Lucca, Italy
关键词
D O I
10.1007/978-3-662-45917-1_12
中图分类号
学科分类号
摘要
引用
收藏
页码:176 / 191
相关论文
共 50 条
  • [31] Security Verification of Trust-based Authentication Handover in IP Networks
    Al-shadly, Saleh
    Alfandi, Omar
    Brosenne, Henrik
    Hogrefe, Dieter
    2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [32] A theoretical inter-organizational trust-based security model
    Hexmoor, Henry
    Wilson, Seth
    Bhattaram, Sandeep
    KNOWLEDGE ENGINEERING REVIEW, 2006, 21 (02): : 127 - 161
  • [33] A Trust-Based Security System for Data Collection in Smart City
    Fang, Weidong
    Cui, Ningning
    Chen, Wei
    Zhang, Wuxiong
    Chen, Yunliang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (06) : 4131 - 4140
  • [34] Trust-based security for wireless ad hoc and sensor networks
    Boukerch, A.
    Xu, L.
    El-Khatib, K.
    COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2413 - 2427
  • [35] Dynamic Enforcement of Knowledge-based Security Policies
    Mardziel, Piotr
    Magill, Stephen
    Hicks, Michael
    Srivatsa, Mudhakar
    2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, : 114 - 128
  • [36] ENFORCEMENT OF SECURITY POLICIES FOR COMPUTATION
    JONES, AK
    LIPTON, RJ
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1978, 17 (01) : 35 - 55
  • [37] Corrective Enforcement of Security Policies
    Khoury, Raphael
    Tawbi, Nadia
    FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 176 - 190
  • [38] TRUST-BASED MEDICINE
    Nemcekova, Maria
    HUMAN AFFAIRS-POSTDISCIPLINARY HUMANITIES & SOCIAL SCIENCES QUARTERLY, 2013, 23 (01): : 114 - 116
  • [39] Trust-adapted enforcement of security policies in distributed component-structured applications
    Herrmann, P
    Krumm, H
    PROCEEDINGS OF THE SIXTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, 2001, : 2 - 8
  • [40] An Elevated Trust-based Security for Mobile Ad-hoc Networks
    Pei, Yanli
    Zheng, Shijue
    DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 1028 - 1032