About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
SECURECOMM 2005
PERVASIVETRUST 2005SECQOS 2005CNFR 2005SECOVAL 2005
Other Years
Ethics and Malpractice Statement

    SECOVAL

    1st International ICST Workshop on the Value of Security through Collaboration

    Security is usually centrally managed, for example in a form of policies duly executed by individual nodes. The SECOVAL workshop covers the alternative trend of using collaboration and trust to provide security. Instead of centrally managed security policies, nodes may use specific knowledge (both…

    Security is usually centrally managed, for example in a form of policies duly executed by individual nodes. The SECOVAL workshop covers the alternative trend of using collaboration and trust to provide security. Instead of centrally managed security policies, nodes may use specific knowledge (both local and acquired from other nodes) to make security-related decisions.

    For example, in reputation-based schemes, the reputation of a given node (and hence its security access rights) can be determined based on the recommendations of peer nodes. As systems are being deployed on ever-greater scale without direct connection to their distant home base, the need for self-management is rapidly increasing. Interaction after interaction, as the nodes collaborate, there is the emergence of a digital ecosystem. By guiding the local decisions of the nodes, for example, with whom the nodes collaborate, global properties of the ecosystem where the nodes operate may be guaranteed. Thus, the security property of the ecosystem may be driven by self-organising mechanisms. Depending on which local collaboration is preferred, a more trustworthy ecosystem may emerge.

    The research addressed by the workshop can be roughly divided into three main areas, each answering the related research questions. Contributions should address at least one of these areas. It is expected that the workshop will address all of them.

    more »
    Editor(s): Imrich Chlamtac (CreateNet Research Institute ) and Krishna Sivalingam (Univ. of Maryland, Baltimore County (UMBC) )
    Publisher
    IEEE
    ISBN
    0-7803-9468-2
    Conference dates
    5th Sep 2005
    Location
    Athens, Greece
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2025 IEEE

    Ordered by title or year
    Showing 1–10 of 14 results
    Page size: 102550
    • 1
    • 2
    • Next
    • Last
    • A comprehensive reputation-based trust model for distributed systems

      Research Article in 1st International ICST Workshop on the Value of Security through Collaboration

      Ayman Tajeddine, Hassan Artail, Ali Chehab, Ayman Kayssi
    • A context-aware trust-based security system for ad hoc networks

      Research Article in 1st International ICST Workshop on the Value of Security through Collaboration

      Maria Moloney, Stefan Weber
    • Computational complexity of one reputation metric

      Research Article in 1st International ICST Workshop on the Value of Security through Collaboration

      Victor Grishchenko
    • Demonstration of security through collaboration in the digital business ecosystem

      Research Article in 1st International ICST Workshop on the Value of Security through Collaboration

      Jean-Marc Seigneur
    • Establishing agreements in dynamic virtual organizations

      Research Article in 1st International ICST Workshop on the Value of Security through Collaboration

      Tatyana Ryutov, Noria Foukia, Li Zhou, Clifford Neuman
    • Performance evaluation of a self-evolving trust building framework

      Research Article in 1st International ICST Workshop on the Value of Security through Collaboration

      Giannis Marias, Panagiotis Georgiadis, Odysseas Sekkas, Vassileios Tsetsos
    • Privacy in distributed reputation management

      Research Article in 1st International ICST Workshop on the Value of Security through Collaboration

      Katri Ylitalo, Iki Kortesniemi
    • Privacy preserving ubiquitous service provisioning based on Bayesian network conversion

      Research Article in 1st International ICST Workshop on the Value of Security through Collaboration

      Hiroyuki Kasai, Shoji Kurakake, Wataru Uchida
    • Reasoning about trust groups to coordinate mobile ad-hoc systems

      Research Article in 1st International ICST Workshop on the Value of Security through Collaboration

      Licia Capra
    • Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization

      Research Article in 1st International ICST Workshop on the Value of Security through Collaboration

      Adam Slagell, William Yurcik
    • 1
    • 2
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL