A survey of trust in computer science and the semantic web
D Artz, Y Gil - Journal of Web Semantics, 2007 - Elsevier
Trust is an integral component in many kinds of human interaction, allowing people to act
under uncertainty and with the risk of negative consequences. For example, exchanging …
under uncertainty and with the risk of negative consequences. For example, exchanging …
Authorization in trust management: Features and foundations
Trust management systems are frameworks for authorization in modern distributed systems,
allowing remotely accessible resources to be protected by providers. By allowing providers …
allowing remotely accessible resources to be protected by providers. By allowing providers …
SecPAL: Design and semantics of a decentralized authorization language
MY Becker, C Fournet… - Journal of Computer …, 2010 - content.iospress.com
We present a declarative authorization language. Policies and credentials are expressed
using predicates defined by logical clauses, in the style of constraint logic programming …
using predicates defined by logical clauses, in the style of constraint logic programming …
Schematizing trust in named data networking
Securing communication in network applications involves many complex tasks that can be
daunting even for security experts. The Named Data Networking (NDN) architecture builds …
daunting even for security experts. The Named Data Networking (NDN) architecture builds …
Declarative networking: language, execution and optimization
The networking and distributed systems communities have recently explored a variety of
new network architectures, both for application-level overlay networks, and as prototypes for …
new network architectures, both for application-level overlay networks, and as prototypes for …
Semantic web policies–a discussion of requirements and research issues
PA Bonatti, C Duma, N Fuchs, W Nejdl… - The Semantic Web …, 2006 - Springer
Policies are pervasive in web applications. They play crucial roles in enhancing security,
privacy and usability of distributed services. There has been extensive research in the area …
privacy and usability of distributed services. There has been extensive research in the area …
Cassandra: Flexible trust management, applied to electronic health records
MY Becker, P Sewell - Proceedings. 17th IEEE Computer …, 2004 - ieeexplore.ieee.org
We study the specification of access control policy in large-scale distributed systems. We
present Cassandra, a language and system for expressing policy, and the results of a …
present Cassandra, a language and system for expressing policy, and the results of a …
The design and implementation of a declarative sensor network system
Sensor networks are notoriously difficult to program, given that they encompass the
complexities of both distributed and embedded systems. To address this problem, we …
complexities of both distributed and embedded systems. To address this problem, we …
[PDF][PDF] Security and trust issues in semantic grids
Grid computing allows sharing of services and resources accross institutions. However,
current Grid security mechanisms for authentication and authorization are too rigid and they …
current Grid security mechanisms for authentication and authorization are too rigid and they …
Peertrust: Automated trust negotiation for peers on the semantic web
Researchers have recently begun to develop and investigate policy languages to describe
trust and security requirements on the Semantic Web. Such policies will be one component …
trust and security requirements on the Semantic Web. Such policies will be one component …