The Community for Technology Leaders
RSS Icon
Issue No.02 - February (2009 vol.42)
pp: 44-52
Sampath Kannan , University of Pennsylvania
Insup Lee , University of Pennsylvania
Oleg Sokolsky , University of Pennsylvania
Jonathan M. Smith , University of Pennsylvania
Angelos D. Keromytis , Columbia University
Wenke Lee , Georgia Institute of Technology
Trust management forms the basis for communicating policy among system elements and demands credential checking for access to all virtual private service resources—along with careful evaluation of credentials against specified policies—before a party can be trusted.
Global Information Grid, trust management, service-oriented architecture, virtual private services
Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee, "Dynamic Trust Management", Computer, vol.42, no. 2, pp. 44-52, February 2009, doi:10.1109/MC.2009.51
1. M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized Trust Management," Proc. 17th Symp. Security and Privacy, IEEE CS Press, 1996, pp. 164-173.
2. M. Blaze, J. Feigenbaum, and M. Strauss, "Compliance Checking in the PolicyMaker Trust-Management System," Proc. Financial Cryptography 98, LNCS 1465, Springer, 1998, pp. 254-274.
3. S. Ioannidis et al., "Implementing a Distributed Firewall," Proc. Computer and Communications Security (CCS), 2000; .
4. S. Ioannidis et al., "Design and Implementation of Virtual Private Services," Proc. IEEE Int'l Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Workshop on Enterprise Security, Special Session on Trust Management in Collaborative Global Computing, IEEE Press, 2003, pp. 269-275.
5. S. Ioannidis, "Security Policy Consistency and Distributed Evaluation in Heterogeneous Environments," doctoral dissertation, University of Pennsylvania, 2005.
6. M. Blaze, J. Ioannidis, and A.D. Keromytis, "Experience with the KeyNote Trust Management System: Applications and Future Directions," Proc. 1st Int'l Conf. Trust Management, 2003; newkeynote.pdf.
7. A. Wool, "A Quantitative Study of Firewall Configuration Errors," Computer, June 2004, pp. 62-67.
8. W.H. Winsborough and N. Li, "Safety in Automated Trust Negotiation," Proc. IEEE Symp. Security &Privacy, IEEE Press, 2004, pp. 147-160.
9. A.D. Keromytis et al., "The Strongman Architecture," Proc. 3rdDARPA Information Survivability Conf. and Exposition (DISCEX III), 2003; .
10. A. Somayaji and S. Forrest, "Automated Response Using System-Call Delays," Proc. 9th Usenix Security Symposium, Usenix, 2000; .
11. M.E. Locasto et al., "Towards Collaborative Security and P2P Intrusion Detection," Proc. 6th Ann. IEEE SMC Information Assurance Workshop (IAW), IEEE Press, 2005, pp. 333-339.
12. M. Blaze, J. Ioannidis, and A.D. Keromytis, "Offline Micropayments without Trusted Hardware," Proc. 5th Financial Cryptography (FC) Conf., 2001;
29 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool