supported by the EC IST Programme
CoreGRID European Research Network on Foundations, Software Infrastructures and Applications
for large scale distributed, GRID and Peer-to-Peer Technologies
image
Home arrow Integration Activities arrow Trust & Security arrow Web Portal arrow Publications  

spacer spacer
 
Main Menu
Home
News
Events
CoreGRID WG
CoreGRID NoE
Institutes
Integration Activities
Dissemination
Training & Education
CoreGRID & Industry
Mobility Portal
Trust&Security Portal
Collaboration Gateway
Other Collaborations
Links
 
spacer spacer
spacer spacer
 
Publications

Security Management:

CRO-GRID security management system
Radic, B.; Imamagic, E.; Dobrenic, D.;
Information Technology Interfaces, 2005. 27th International Conference on
June 20-23, 2005 Page(s):80 - 85  

Towards an Ontology-based Security Management
Tsoumas, B.; Gritzalis, D.;
Advanced Information Networking and Applications, 2006. AINA 2006. 20th International Conference on
Volume 1,  18-20 April 2006 Page(s):985 - 992 

Information security management metrics development
Herrera, S.O.S.;
Security Technology, 2005. CCST '05. 39th Annual 2005 International Carnahan Conference on
11-14 Oct. 2005 Page(s):51 - 56  

Context-based security management for multi-agent systems
Montanari, R.; Toninelli, A.; Bradshaw, J.M.;
Multi-Agent Security and Survivability, 2005 IEEE 2nd Symposium on
30-31 Aug. 2005 Page(s):75 - 84  

Should we share honeypot information for security management?
Wu, F.;
Integrated Network Management, 2005. IM 2005. 2005 9th IFIP/IEEE International Symposium on
15-19 May 2005 Page(s):778 - 778

Security in a PKI-based networking environment: a multi-agent architecture for distributed security management system & control
Torrellas, G.A.S.; Cruz, D.V.;
Computational Cybernetics, 2004. ICCC 2004. Second IEEE International Conference on
Aug. 30 - Sept. 1, 2004 Page(s):183 - 188 

Security management of Web services
Malek, M.; Harmantzis, F.;
Network Operations and Management Symposium, 2004. NOMS 2004. IEEE/IFIP
Volume 2,  19-23 April 2004 Page(s):175 - 189 Vol.2  

"Policy-Maker": a toolkit for policy-based security management
Pilz, A.;
Network Operations and Management Symposium, 2004. NOMS 2004. IEEE/IFIP
Volume 1,  19-23 April 2004 Page(s):263 - 276 Vol.1 

Protecting personal data: can IT security management standards help?
lachello, G.;
Computer Security Applications Conference, 2003. Proceedings. 19th Annual
2003 Page(s):266 - 275 

Federated security management for dynamic coalitions
Bhatt, S.; Raj Rajagopalan, S.; Rao, P.;
DARPA Information Survivability Conference and Exposition, 2003. Proceedings
Volume 2,  22-24 April 2003 Page(s):47 - 48 vol.2 

A case study of three open source security management tools
Kayacik, H.G.; Zincir-Heywood, A.N.;
Integrated Network Management, 2003. IFIP/IEEE Eighth International Symposium on
24-28 March 2003 Page(s):101 - 104 

An intelligent agent-based model for security management
Boudaoud, K.; McCathieNevile, C.;
Computers and Communications, 2002. Proceedings. ISCC 2002. Seventh International Symposium on
1-4 July 2002 Page(s):877 - 882 

Distributed security management using LDAP directories
Jamhour, E.;
Computer Science Society, 2001. SCCC 2001. Proceedings. XXI Internatinal Conference of the Chilean
7-9 Nov. 2001 Page(s):144 - 153  

Policy Management: 

KAoS policy management for semantic Web services
Uszok, A.; Bradshaw, J.M.; Johnson, M.; Jeffers, R.; Tate, A.; Dalton, J.; Aitken, S.;
Intelligent Systems, IEEE [see also IEEE Intelligent Systems and Their Applications]
Volume 19,  Issue 4,  Jul-Aug 2004 Page(s):32 - 41 

Policy Management of Enterprise Systems: A Requirements Study
Kolari, P.; Finin, T.; Yesha, Y.; Lyons, K.; Hawkins, J.; Perelgut, S.;
Policies for Distributed Systems and Networks, 2006. Policy 2006. Seventh IEEE International Workshop on
05-07 June 2006 Page(s):231 - 234  

Peer-to-peer policy management system for wearable mobile devices
Massimi, M.; Wolz, U.;
Wearable Computers, 2003. Proceedings. Seventh IEEE International Symposium on
18-21 Oct. 2005 Page(s):246 - 247 

Policy management for networked systems and applications
Agrawal, D.; Calo, S.; Giles, J.; Kang-Won Lee; Verma, D.;
Integrated Network Management, 2005. IM 2005. 2005 9th IFIP/IEEE International Symposium on
15-19 May 2005 Page(s):455 - 468 

How to Leverage Access Control Specification for Autonomic Policy Management
Vatsavai, R.R.; Chakravarthy, S.; Mohania, M.;
Autonomic Computing, 2005. ICAC 2005. Proceedings. Second International Conference on
13-16 June 2005 Page(s):358 - 359

Proposition of a network policy management ontology
Chamoun, M.; Kilany, R.; Serhrouchni, A.;
Signal Processing and Information Technology, 2004. Proceedings of the Fourth IEEE International Symposium on
18-21 Dec. 2004 Page(s):262 - 266  

Policy management for network-based intrusion detection and prevention
Yao-Min Chen; Yanyan Yang;
Network Operations and Management Symposium, 2004. NOMS 2004. IEEE/IFIP
Volume 2,  19-23 April 2004 Page(s):219 - 232 Vol.2  

An XACML-based policy management and authorization service for globus resources
Lorch, M.; Kafura, D.; Shah, S.;
Grid Computing, 2003. Proceedings. Fourth International Workshop on
17 Nov. 2003 Page(s):208 - 210  

Joint policy management and auditing in virtual organizations
Smith, T.J.; Lavanya Ramakrishnan;
Grid Computing, 2003. Proceedings. Fourth International Workshop on
17 Nov. 2003 Page(s):117 - 124  

Towards federated policy management
Hull, R.; Bharat Kumar; Lieuwen, D.;
Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003. IEEE 4th International Workshop on
4-6 June 2003 Page(s):183 - 194  

Toward explicit policy management for virtual organizations
Wasson, G.; Humphrey, M.;
Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003. IEEE 4th International Workshop on
4-6 June 2003 Page(s):173 - 182  

Bands: an inter-domain Internet security policy management system for IPSec/VPN
Yanyan Yang; Fu, Z.; Wu, S.F.;
Integrated Network Management, 2003. IFIP/IEEE Eighth International Symposium on2
4-28 March 2003 Page(s):231 - 244 

Obligation monitoring in policy management
Bettini, C.;
Policies for Distributed Systems and Networks, 2002. Proceedings. Third International Workshop on
5-7 June 2002 Page(s):2 - 12  

Tools for domain-based policy management of distributed systems
Damianou, N.; Dulay, N.; Lupu, E.; Sloman, M.; Tonouchi, T.;
Network Operations and Management Symposium, 2002. NOMS 2002. 2002 IEEE/IFIP
15-19 April 2002 Page(s):203 - 217  

A policy management system for collaborative applications
Lakhdissi, M.; Harroud, H.; Karmouch, A.; Grossner, C.;
Communications, Computers and signal Processing, 2001. PACRIM. 2001 IEEE Pacific Rim Conference on
Volume 2,  26-28 Aug. 2001 Page(s):732 - 735 vol.2    

Security Frameworks: 

A MAS security framework implementing reputation based policies and owners access control
Vitabile, S.; Milici, G.; Scolaro, S.; Sorbello, F.; Pilato, G.;
Advanced Information Networking and Applications, 2006. AINA 2006. 20th International Conference on
Volume 2,  18-20 April 2006 Page(s):5 pp.  

Phyllo: a peer-to-peer overlay security framework
Heinbockel, W.; Minseok Kwon;
Secure Network Protocols, 2005. (NPSec). 1st IEEE ICNP Workshop on
6 Nov. 2005 Page(s):43 - 48  

An adaptable security framework for service-based systems
Yau, S.S.; Yisheng Yao; Zhaoji Chen; Luping Zhu;
Object-Oriented Real-Time Dependable Systems, 2005. WORDS 2005. 10th IEEE International Workshop on
2-4 Feb. 2005 Page(s):28 - 35  

An integrated security framework for XML based management
Cridlig, V.; State, R.; Festor, O.;
Integrated Network Management, 2005. IM 2005. 2005 9th IFIP/IEEE International Symposium on
15-19 May 2005 Page(s):587 - 600 

A security framework for open service mobility using trust delegation
Jun, A.D.; Bakker, J.-L.; Chung, C.F.;
Intelligent Signal Processing and Communication Systems, 2004. ISPACS 2004. Proceedings of 2004 International Symposium on
18-19 Nov. 2004 Page(s):226 - 231  

A security framework for collaborative distributed system control at the device-level
Xu, Y.; Korba, L.; Wang, L.; Hao, Q.; Shen, W.; Lang, S.;
Industrial Informatics, 2003. INDIN 2003. Proceedings. IEEE International Conference on
21-24 Aug. 2003 Page(s):192 - 198  

Security framework for integrated networks
Alkassar, A.; Stuble, C.;
Military Communications Conference, 2003. MILCOM 2003. IEEE
Volume 2,  13-16 Oct. 2003 Page(s):802 - 807 Vol.2  

An aspect-oriented security framework
Shah, V.; Hill, F.;
DARPA Information Survivability Conference and Exposition, 2003. Proceedings
Volume 2,  22-24 April 2003 Page(s):143 - 145 vol.2  

 

Reputation-based Trust Management:

Supporting trust in virtual communities;
Abdul-Rahman, A., Hailes, S.;
System Sciences, HICSS '00, 33rd Hawaii International Conference on, Proceedings. Volume 6;
page 9 pp.; IEEE Computer Society, 2000

Managing trust in a peer-2-peer information system;
Aberer, K., Despotovic, Z.;
Information and knowledge management, CIKM '01: Proceedings. 10h international conference on;
pages 310-317; ACM Press,  2001

Self-Policing Mobile Ad-Hoc Networks by Reputation;
Buchegger, S., Boudec, J. L.;
IEEE Communication Magazine; 43(7) (2005), pages 101-107

Probabilistic prediction of peers' performance in p2p networks;
Despotovic, Z., Aberer, K.;
Engineering Applications of Artificial Intelligence; 18(3) (2005), pages 771-780

The agent reputation and trust (art) testbed architecture;
Fullam, K., Klos, T., Muller, G., Sabater, J., Topol, Z., Barber, K., Rosenscheim, J., Vercouter, L.;
Frontiers in Artificial Intelligence and Applications; vol. 131;
pages 389-396; IOS Press, 2005

A reputation system for peer-to-peer networks;
Gupta, M., Judge, P., Ammar, M.;
Network and operating systems support for digital audio and video, NOSSDAV '03: Proceedings. 13th international workshop on;
pages 144-152; ACM Press, 2003

An integrated trust and reputation model for open multi-agent systems;
Huynh, T., Jennings, N. R., Shadbolt, N.;
Autonomous Agents and Multi-Agent Systems; 13(2) (2006), pages 119-154

An algebra for assessing trust in certification chains.;
Josang, A.;
Network and Distributed System Security Symposium, NDSS 1999, Proceedings
The Internet Society, 1999

Reputation-based service level agreements for web services.;
Jurca, R., Faltings, B.;
Service-Oriented Computing - ICSOC 2005, Third International Conference;
Lecture Notes in Computer Science, vol. 3826; pages 396-409; Springer, 2005

The eigentrust algorithm for reputation management in p2p networks;
Kamvar, S., Schlosser, M., Garcia-Molina, H.;
World Wide Web, WWW '03: Proceedings of the 12th international conference on;
pages 640-651; ACM Press, 2003

Pathtrust: A trust-based reputation service for virtual organization formation;
Kerschbaum, F., Haller, J., Karabulut, Y., Robinson, P.;
Trust Management, iTrust2006: Proceedings of the 4th International Conference on;
Lecture Notes in Computer Science, vol. 3986; pages 193-205; Springer, 2006

Towards reputable grids;
von Laszewski, G., Alunkal, B., Veljkovic, I.;
Scalable Computing: Practice and Experience; 6(3) (2005), pages 95-106

Devising a trust model for multi-agent interactions using confidence and reputation;
Ramchurn, S., Jennings, N., Sierra, C., Godo, L.;
Applied Artificial Intelligence; 18(9-10) (2004), pages 833-852

A reputation-based trust mechanism for ad hoc networks;
Rebahi, Y., Mujica, V., Sisalem, D.;
Computers and Communications, ISCC '05: Proceedings. 10th IEEE Symposium on;
pages 37-42; IEEE Computer Society, 2005

Regret: a reputation model for gregarious societies;
Sabater, J., Sierra, C.;
Deception, Fraud and Trust in Agent Societies, Fourth Workshop on;
ACM Press, 2001

Cooperative peer groups in NICE;
Sherwood, R., Seungjoon, L., Bhattacharjee, B.;
Computer Networks; 50(4) (2006), pages 523-544

TrustMe: Anonymous management of trust relationships in decentralized p2p systems;
Singh, A., Liu, L.;
Peer-to-Peer Computing, P2P '03: Proceedings of the 3rd International Conference on;
pages 142-149; IEEE Computer Society, 2003

Community-based service location;
Singh, M., Yu, B., Venkatraman, M.;
Communications of ACM; 44(4) (2001), pages 49-54

Pace: An architectural style for trust management in decentralized applications;
Suryanarayana, G., Erenkantz, J., Hendrickson, S., Taylor, R.;
Tech. Rep. UCI-ISR-03-9; Institute of Software Research, UC Irvine 2003

Superstringrep: reputation-enhanced service discovery;
Wishart, R., Robinson, R., Indulska, J., Josang, A.;
Computer Science, ACSC '05: Proceedings of the 28th Australasian conference on;
pages 49-57; Australian Computer Society, 2005

PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities;
Xiong, L., Liu, L.;
IEEE Transactions on Knowledge and Data Engineering; 16(7) (2004), pages 843-857

An evidential model of distributed reputation management;
Yu, B., Singh, M.;
Autonomous agents and multiagent systems, AAMAS '02: Proceedings. 1st international joint conference on;
pages 294-301; ACM Press,  2002

Trust management through reputation mechanisms.;
Zacharia, G., Maes, P.;
Applied Artificial Intelligence; 14(9) (2000), pages 881-907

Result verification and trust-based scheduling in peer-to-peer grids;
Zhao, S., Lo, V., GauthierDickey, C.;
Peer-to-Peer Computing, P2P '05: Proceedings of the 5th IEEE International Conference on;
pages 31-38; IEEE Computer Society, 2005
 

 

Last Updated ( Monday, 16 October 2006 )
 
 
spacer spacer
spacer spacer
 
© 2012 CoreGRID Network of Excellence - European Grid Research
Joomla! is Free Software released under the GNU/GPL License.
 
spacer spacer