An evolving trust paradigm for enforcing computing system security.
Orhio Mark CreadoPhu Dung LeJan NewmarchJefferson TanPublished in: CEC (2015)
Keyphrases
- trust relationships
- security services
- information security
- trust management
- trusted computing
- trust model
- network security
- statistical databases
- security issues
- security requirements
- security mechanisms
- computer security
- ubiquitous computing and ambient intelligence
- security systems
- management system
- privacy concerns
- security policies
- security management
- multiagent systems
- intrusion detection
- internet banking
- digital rights management
- public key infrastructure
- security protocols
- personal information
- trust evaluation
- trust negotiation
- policy enforcement
- anomaly detection