About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
SECURECOMM 2005
PERVASIVETRUST 2005SECQOS 2005CNFR 2005SECOVAL 2005
Other Years
Ethics and Malpractice Statement

    SECOVAL

    1st International ICST Workshop on the Value of Security through Collaboration

    Security is usually centrally managed, for example in a form of policies duly executed by individual nodes. The SECOVAL workshop covers the alternative trend of using collaboration and trust to provide security. Instead of centrally managed security policies, nodes may use specific knowledge (both…

    Security is usually centrally managed, for example in a form of policies duly executed by individual nodes. The SECOVAL workshop covers the alternative trend of using collaboration and trust to provide security. Instead of centrally managed security policies, nodes may use specific knowledge (both local and acquired from other nodes) to make security-related decisions.

    For example, in reputation-based schemes, the reputation of a given node (and hence its security access rights) can be determined based on the recommendations of peer nodes. As systems are being deployed on ever-greater scale without direct connection to their distant home base, the need for self-management is rapidly increasing. Interaction after interaction, as the nodes collaborate, there is the emergence of a digital ecosystem. By guiding the local decisions of the nodes, for example, with whom the nodes collaborate, global properties of the ecosystem where the nodes operate may be guaranteed. Thus, the security property of the ecosystem may be driven by self-organising mechanisms. Depending on which local collaboration is preferred, a more trustworthy ecosystem may emerge.

    The research addressed by the workshop can be roughly divided into three main areas, each answering the related research questions. Contributions should address at least one of these areas. It is expected that the workshop will address all of them.

    more »
    Editor(s): Imrich Chlamtac (CreateNet Research Institute ) and Krishna Sivalingam (Univ. of Maryland, Baltimore County (UMBC) )
    Publisher
    IEEE
    ISBN
    0-7803-9468-2
    Conference dates
    5th Sep 2005
    Location
    Athens, Greece
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2025 IEEE

    Ordered by title or year
    Showing 11–14 of 14 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • Social approaches to trust-building in Web technologies

      Research Article in 1st International ICST Workshop on the Value of Security through Collaboration

      Filippo Ulivieri
    • Tailored trustworthiness estimations in peer-to-peer networks

      Research Article in 1st International ICST Workshop on the Value of Security through Collaboration

      Katri Ylitalo, Silke Holtmanns
    • Towards evidence-based trust brokering

      Research Article in 1st International ICST Workshop on the Value of Security through Collaboration

      Dong Huang, Shane Bracher
    • Towards ubiquitous cooperative security

      Research Article in 1st International ICST Workshop on the Value of Security through Collaboration

      Philip Robinson
    • First
    • Previous
    • 1
    • 2
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL