Trust Evolution Policies for Security in Collaborative Ad Hoc Applications.
Elizabeth GrayChristian Damsgaard JensenPaul O'ConnellStefan WeberJean-Marc SeigneurYong ChenPublished in: Electron. Notes Theor. Comput. Sci. (2006)
Keyphrases
- security services
- trust relationships
- trusted computing
- trust management
- trust negotiation
- information security
- access control
- intrusion detection
- public key infrastructure
- collaborative learning
- security policies
- computer security
- security analysis
- policy enforcement
- trust evaluation
- role based access control
- network security
- trust model
- optimal policy
- security issues
- security mechanisms
- usage control
- access rights
- computing environments
- malicious nodes
- virtual communities
- security management
- security threats
- information systems
- privacy concerns
- key management
- security requirements
- statistical databases
- virtual teams
- data security
- privacy policies
- internet banking
- access control systems
- knowledge sharing
- access control policies
- electronic transactions
- supply chain