skip to main content
10.1145/283699.283739acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article
Free Access

A distributed trust model

Authors Info & Claims
Published:01 January 1998Publication History
First page image

References

  1. Abd97.Alfarez Abdul-Rahman. The PGP Trust Model. EDI- Forum, April 1997. Available at http ://www.cs. ucl.ac.uk/staff/F.AbdulRahman/docs/Google ScholarGoogle Scholar
  2. BBK94.Thomas Beth, Malte Borchedring, B. Klein. Valuation of Trust in Open Networks. In Proceedings, European Symposium on Research in Computer Security 1994, ESORICS94, pp 3-18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. DoD85.U.S. Department of Defense. Department of Defense Trusted Computer System Evaluation Criteria. DoD 5200.28-STD, 26 December, 1985.Google ScholarGoogle Scholar
  4. Ell96.C.M. Ellison, B. Frantz, B. Lampson, R. Rivest, B.M. Thomas, T. Ylonen. Simple Public Key Certificate, Internet Draft, 29 July 1997. Available at http://www.clark.net/pub/cme/html/spki, html.Google ScholarGoogle Scholar
  5. Gam90.Diego Garnbetta. Can We Trust Trust?. In, Trust: Making and Breaking Cooperative Relations, Gambetta, D (ed.). Basil Blackwell. Oxford, 1990, pp. 213-237.Google ScholarGoogle Scholar
  6. Jøs96.Audun J~sang. The right type of trust for distributed systems. In Proceedings, New Security Paradigms '96 Workshop, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Lev95.Nancy Leveson. Safeware: System Safety and Computers. Addison-Wesley. New York, 1995. Google ScholarGoogle Scholar
  8. Mar94.Stephen Marsh. Formalising Trust as a Computational Concept. Ph.D. Thesis, University of Stirling, 1994.Google ScholarGoogle Scholar
  9. RJ96a.Lars Rasmusson, S verker Jansson. Simulated Social control for Secure Internet Commerce (position paper). In Proceedings, New Security Paradigms '96 Workshop. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. RJ96b.L. Rasmusson, S. jansson. Personal Security Assistance for Secure lnternet Commerce (position paper). In Proceedings, New Security Paradigms '96 Workshop. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. RL96.Ronald Rivest, Butler Lampson. SDSI- A Simple Distributed Security Infrastructure. http :lit heory.l cs.mi t. edu/--ci s/sdsi, html.Google ScholarGoogle Scholar
  12. RRJ96.Lars Rasmusson, Andreas Rasmusson, Sverker Jansson. Reactive Security and Social Control. In Proceedings, 19~ National Information Systems Security Conference, Baltimore, 1996.Google ScholarGoogle Scholar
  13. Sch97.Bruce Schneier. Why Cryptography Is Harder Than It Looks. Information Security Bulletin, Vol. 2 No. 2, March 1997, pp. 31-36. Available at http://www.counterpane.com.Google ScholarGoogle Scholar
  14. YKB93.Raphael Yahalom, Birgit Klein, Thomas Beth. Trust Relationships in Secure Systems - A Distributed Authentication Perspective. In Proceedings, IEEE Symposium on Research in Security and Privacy, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. YKB94.R.Yahalom, B.Klein, T.Beth. Trust-Based Navigation in Distributed Systems. Computing Systems v.7 no. I. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Zim94.Phil Zimmermann. PGP User's Guide. MIT. October 1994.Google ScholarGoogle Scholar
  17. Zur97.Mary Ellen Zurko. Panels at the 1997 IEEE Symposium on Security and Privacy, Oakland, C~ May 5-7, 199Z CIPHER, Electronic Issue #22, I2 July, 1997. Available at http://www.itd.nrl.navy, mil/ITD/5540/ieee/cipher!Google ScholarGoogle Scholar

Index Terms

  1. A distributed trust model

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  NSPW '97: Proceedings of the 1997 workshop on New security paradigms
                  January 1998
                  122 pages
                  ISBN:0897919866
                  DOI:10.1145/283699

                  Copyright © 1998 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 1 January 1998

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • Article

                  Acceptance Rates

                  Overall Acceptance Rate62of170submissions,36%

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader