Security Management: CRO-GRID security management system Radic, B.; Imamagic, E.; Dobrenic, D.; Information Technology Interfaces, 2005. 27th International Conference on June 20-23, 2005 Page(s):80 - 85 Towards an Ontology-based Security Management Tsoumas, B.; Gritzalis, D.; Advanced Information Networking and Applications, 2006. AINA 2006. 20th International Conference on Volume 1, 18-20 April 2006 Page(s):985 - 992 Information security management metrics development Herrera, S.O.S.; Security Technology, 2005. CCST '05. 39th Annual 2005 International Carnahan Conference on 11-14 Oct. 2005 Page(s):51 - 56 Context-based security management for multi-agent systems Montanari, R.; Toninelli, A.; Bradshaw, J.M.; Multi-Agent Security and Survivability, 2005 IEEE 2nd Symposium on 30-31 Aug. 2005 Page(s):75 - 84 Should we share honeypot information for security management? Wu, F.; Integrated Network Management, 2005. IM 2005. 2005 9th IFIP/IEEE International Symposium on 15-19 May 2005 Page(s):778 - 778 Security in a PKI-based networking environment: a multi-agent architecture for distributed security management system & control Torrellas, G.A.S.; Cruz, D.V.; Computational Cybernetics, 2004. ICCC 2004. Second IEEE International Conference on Aug. 30 - Sept. 1, 2004 Page(s):183 - 188 Security management of Web services Malek, M.; Harmantzis, F.; Network Operations and Management Symposium, 2004. NOMS 2004. IEEE/IFIP Volume 2, 19-23 April 2004 Page(s):175 - 189 Vol.2 "Policy-Maker": a toolkit for policy-based security management Pilz, A.; Network Operations and Management Symposium, 2004. NOMS 2004. IEEE/IFIP Volume 1, 19-23 April 2004 Page(s):263 - 276 Vol.1 Protecting personal data: can IT security management standards help? lachello, G.; Computer Security Applications Conference, 2003. Proceedings. 19th Annual 2003 Page(s):266 - 275 Federated security management for dynamic coalitions Bhatt, S.; Raj Rajagopalan, S.; Rao, P.; DARPA Information Survivability Conference and Exposition, 2003. Proceedings Volume 2, 22-24 April 2003 Page(s):47 - 48 vol.2 A case study of three open source security management tools Kayacik, H.G.; Zincir-Heywood, A.N.; Integrated Network Management, 2003. IFIP/IEEE Eighth International Symposium on 24-28 March 2003 Page(s):101 - 104 An intelligent agent-based model for security management Boudaoud, K.; McCathieNevile, C.; Computers and Communications, 2002. Proceedings. ISCC 2002. Seventh International Symposium on 1-4 July 2002 Page(s):877 - 882 Distributed security management using LDAP directories Jamhour, E.; Computer Science Society, 2001. SCCC 2001. Proceedings. XXI Internatinal Conference of the Chilean 7-9 Nov. 2001 Page(s):144 - 153 Policy Management: KAoS policy management for semantic Web services Uszok, A.; Bradshaw, J.M.; Johnson, M.; Jeffers, R.; Tate, A.; Dalton, J.; Aitken, S.; Intelligent Systems, IEEE [see also IEEE Intelligent Systems and Their Applications] Volume 19, Issue 4, Jul-Aug 2004 Page(s):32 - 41 Policy Management of Enterprise Systems: A Requirements Study Kolari, P.; Finin, T.; Yesha, Y.; Lyons, K.; Hawkins, J.; Perelgut, S.; Policies for Distributed Systems and Networks, 2006. Policy 2006. Seventh IEEE International Workshop on 05-07 June 2006 Page(s):231 - 234 Peer-to-peer policy management system for wearable mobile devices Massimi, M.; Wolz, U.; Wearable Computers, 2003. Proceedings. Seventh IEEE International Symposium on 18-21 Oct. 2005 Page(s):246 - 247 Policy management for networked systems and applications Agrawal, D.; Calo, S.; Giles, J.; Kang-Won Lee; Verma, D.; Integrated Network Management, 2005. IM 2005. 2005 9th IFIP/IEEE International Symposium on 15-19 May 2005 Page(s):455 - 468 How to Leverage Access Control Specification for Autonomic Policy Management Vatsavai, R.R.; Chakravarthy, S.; Mohania, M.; Autonomic Computing, 2005. ICAC 2005. Proceedings. Second International Conference on 13-16 June 2005 Page(s):358 - 359 Proposition of a network policy management ontology Chamoun, M.; Kilany, R.; Serhrouchni, A.; Signal Processing and Information Technology, 2004. Proceedings of the Fourth IEEE International Symposium on 18-21 Dec. 2004 Page(s):262 - 266 Policy management for network-based intrusion detection and prevention Yao-Min Chen; Yanyan Yang; Network Operations and Management Symposium, 2004. NOMS 2004. IEEE/IFIP Volume 2, 19-23 April 2004 Page(s):219 - 232 Vol.2 An XACML-based policy management and authorization service for globus resources Lorch, M.; Kafura, D.; Shah, S.; Grid Computing, 2003. Proceedings. Fourth International Workshop on 17 Nov. 2003 Page(s):208 - 210 Joint policy management and auditing in virtual organizations Smith, T.J.; Lavanya Ramakrishnan; Grid Computing, 2003. Proceedings. Fourth International Workshop on 17 Nov. 2003 Page(s):117 - 124 Towards federated policy management Hull, R.; Bharat Kumar; Lieuwen, D.; Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003. IEEE 4th International Workshop on 4-6 June 2003 Page(s):183 - 194 Toward explicit policy management for virtual organizations Wasson, G.; Humphrey, M.; Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003. IEEE 4th International Workshop on 4-6 June 2003 Page(s):173 - 182 Bands: an inter-domain Internet security policy management system for IPSec/VPN Yanyan Yang; Fu, Z.; Wu, S.F.; Integrated Network Management, 2003. IFIP/IEEE Eighth International Symposium on2 4-28 March 2003 Page(s):231 - 244 Obligation monitoring in policy management Bettini, C.; Policies for Distributed Systems and Networks, 2002. Proceedings. Third International Workshop on 5-7 June 2002 Page(s):2 - 12 Tools for domain-based policy management of distributed systems Damianou, N.; Dulay, N.; Lupu, E.; Sloman, M.; Tonouchi, T.; Network Operations and Management Symposium, 2002. NOMS 2002. 2002 IEEE/IFIP 15-19 April 2002 Page(s):203 - 217 A policy management system for collaborative applications Lakhdissi, M.; Harroud, H.; Karmouch, A.; Grossner, C.; Communications, Computers and signal Processing, 2001. PACRIM. 2001 IEEE Pacific Rim Conference on Volume 2, 26-28 Aug. 2001 Page(s):732 - 735 vol.2 Security Frameworks: A MAS security framework implementing reputation based policies and owners access control Vitabile, S.; Milici, G.; Scolaro, S.; Sorbello, F.; Pilato, G.; Advanced Information Networking and Applications, 2006. AINA 2006. 20th International Conference on Volume 2, 18-20 April 2006 Page(s):5 pp. Phyllo: a peer-to-peer overlay security framework Heinbockel, W.; Minseok Kwon; Secure Network Protocols, 2005. (NPSec). 1st IEEE ICNP Workshop on 6 Nov. 2005 Page(s):43 - 48 An adaptable security framework for service-based systems Yau, S.S.; Yisheng Yao; Zhaoji Chen; Luping Zhu; Object-Oriented Real-Time Dependable Systems, 2005. WORDS 2005. 10th IEEE International Workshop on 2-4 Feb. 2005 Page(s):28 - 35 An integrated security framework for XML based management Cridlig, V.; State, R.; Festor, O.; Integrated Network Management, 2005. IM 2005. 2005 9th IFIP/IEEE International Symposium on 15-19 May 2005 Page(s):587 - 600 A security framework for open service mobility using trust delegation Jun, A.D.; Bakker, J.-L.; Chung, C.F.; Intelligent Signal Processing and Communication Systems, 2004. ISPACS 2004. Proceedings of 2004 International Symposium on 18-19 Nov. 2004 Page(s):226 - 231 A security framework for collaborative distributed system control at the device-level Xu, Y.; Korba, L.; Wang, L.; Hao, Q.; Shen, W.; Lang, S.; Industrial Informatics, 2003. INDIN 2003. Proceedings. IEEE International Conference on 21-24 Aug. 2003 Page(s):192 - 198 Security framework for integrated networks Alkassar, A.; Stuble, C.; Military Communications Conference, 2003. MILCOM 2003. IEEE Volume 2, 13-16 Oct. 2003 Page(s):802 - 807 Vol.2 An aspect-oriented security framework Shah, V.; Hill, F.; DARPA Information Survivability Conference and Exposition, 2003. Proceedings Volume 2, 22-24 April 2003 Page(s):143 - 145 vol.2 Reputation-based Trust Management: Supporting trust in virtual communities; Abdul-Rahman, A., Hailes, S.; System Sciences, HICSS '00, 33rd Hawaii International Conference on, Proceedings. Volume 6; page 9 pp.; IEEE Computer Society, 2000 Managing trust in a peer-2-peer information system; Aberer, K., Despotovic, Z.; Information and knowledge management, CIKM '01: Proceedings. 10h international conference on; pages 310-317; ACM Press, 2001 Self-Policing Mobile Ad-Hoc Networks by Reputation; Buchegger, S., Boudec, J. L.; IEEE Communication Magazine; 43(7) (2005), pages 101-107 Probabilistic prediction of peers' performance in p2p networks; Despotovic, Z., Aberer, K.; Engineering Applications of Artificial Intelligence; 18(3) (2005), pages 771-780 The agent reputation and trust (art) testbed architecture; Fullam, K., Klos, T., Muller, G., Sabater, J., Topol, Z., Barber, K., Rosenscheim, J., Vercouter, L.; Frontiers in Artificial Intelligence and Applications; vol. 131; pages 389-396; IOS Press, 2005 A reputation system for peer-to-peer networks; Gupta, M., Judge, P., Ammar, M.; Network and operating systems support for digital audio and video, NOSSDAV '03: Proceedings. 13th international workshop on; pages 144-152; ACM Press, 2003 An integrated trust and reputation model for open multi-agent systems; Huynh, T., Jennings, N. R., Shadbolt, N.; Autonomous Agents and Multi-Agent Systems; 13(2) (2006), pages 119-154 An algebra for assessing trust in certification chains.; Josang, A.; Network and Distributed System Security Symposium, NDSS 1999, Proceedings The Internet Society, 1999 Reputation-based service level agreements for web services.; Jurca, R., Faltings, B.; Service-Oriented Computing - ICSOC 2005, Third International Conference; Lecture Notes in Computer Science, vol. 3826; pages 396-409; Springer, 2005 The eigentrust algorithm for reputation management in p2p networks; Kamvar, S., Schlosser, M., Garcia-Molina, H.; World Wide Web, WWW '03: Proceedings of the 12th international conference on; pages 640-651; ACM Press, 2003 Pathtrust: A trust-based reputation service for virtual organization formation; Kerschbaum, F., Haller, J., Karabulut, Y., Robinson, P.; Trust Management, iTrust2006: Proceedings of the 4th International Conference on; Lecture Notes in Computer Science, vol. 3986; pages 193-205; Springer, 2006 Towards reputable grids; von Laszewski, G., Alunkal, B., Veljkovic, I.; Scalable Computing: Practice and Experience; 6(3) (2005), pages 95-106 Devising a trust model for multi-agent interactions using confidence and reputation; Ramchurn, S., Jennings, N., Sierra, C., Godo, L.; Applied Artificial Intelligence; 18(9-10) (2004), pages 833-852 A reputation-based trust mechanism for ad hoc networks; Rebahi, Y., Mujica, V., Sisalem, D.; Computers and Communications, ISCC '05: Proceedings. 10th IEEE Symposium on; pages 37-42; IEEE Computer Society, 2005 Regret: a reputation model for gregarious societies; Sabater, J., Sierra, C.; Deception, Fraud and Trust in Agent Societies, Fourth Workshop on; ACM Press, 2001 Cooperative peer groups in NICE; Sherwood, R., Seungjoon, L., Bhattacharjee, B.; Computer Networks; 50(4) (2006), pages 523-544 TrustMe: Anonymous management of trust relationships in decentralized p2p systems; Singh, A., Liu, L.; Peer-to-Peer Computing, P2P '03: Proceedings of the 3rd International Conference on; pages 142-149; IEEE Computer Society, 2003 Community-based service location; Singh, M., Yu, B., Venkatraman, M.; Communications of ACM; 44(4) (2001), pages 49-54 Pace: An architectural style for trust management in decentralized applications; Suryanarayana, G., Erenkantz, J., Hendrickson, S., Taylor, R.; Tech. Rep. UCI-ISR-03-9; Institute of Software Research, UC Irvine 2003 Superstringrep: reputation-enhanced service discovery; Wishart, R., Robinson, R., Indulska, J., Josang, A.; Computer Science, ACSC '05: Proceedings of the 28th Australasian conference on; pages 49-57; Australian Computer Society, 2005 PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities; Xiong, L., Liu, L.; IEEE Transactions on Knowledge and Data Engineering; 16(7) (2004), pages 843-857 An evidential model of distributed reputation management; Yu, B., Singh, M.; Autonomous agents and multiagent systems, AAMAS '02: Proceedings. 1st international joint conference on; pages 294-301; ACM Press, 2002 Trust management through reputation mechanisms.; Zacharia, G., Maes, P.; Applied Artificial Intelligence; 14(9) (2000), pages 881-907 Result verification and trust-based scheduling in peer-to-peer grids; Zhao, S., Lo, V., GauthierDickey, C.; Peer-to-Peer Computing, P2P '05: Proceedings of the 5th IEEE International Conference on; pages 31-38; IEEE Computer Society, 2005
|