About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
SECURECOMM 2006
SECOVAL 2006WENS 2006
Other Years
Ethics and Malpractice Statement

    SECOVAL

    2nd International ICST Workshop on the Value of Security through Collaboration

    Security is usually centrally managed, for example in a form of policies duly executed by individual nodes. The SECOVAL workshop covers the alternative trend of using collaboration and trust to provide security. Instead of centrally managed security policies, nodes may use specific knowledge (both…

    Security is usually centrally managed, for example in a form of policies duly executed by individual nodes. The SECOVAL workshop covers the alternative trend of using collaboration and trust to provide security. Instead of centrally managed security policies, nodes may use specific knowledge (both local and acquired from other nodes) to make security-related decisions. For example, in reputation-based schemes, the reputation of a given node (and hence its security access rights) can be determined based on the recommendations of peer nodes. As systems are being deployed on ever-greater scale without direct connection to their distant home base, the need for self-management is rapidly increasing. Interaction after interaction, as the nodes collaborate, there is the emergence of a digital ecosystem. By guiding the local decisions of the nodes, for example, with whom the nodes collaborate, global properties of the ecosystem where the nodes operate may be guaranteed. Thus, the security property of the ecosystem may be driven by self-organising mechanisms. Depending on which local collaboration is preferred, a more trustworthy ecosystem may emerge.

    more »
    Editor(s): Mukesh Singhal (University of Kentucky) and John Baras (University of Maryland, College Park)
    Publisher
    IEEE
    Conference dates
    1st Sep 2006
    Location
    Baltimore, USA
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2025 IEEE

    Ordered by title or year
    Showing 1–10 of 10 results
    Page size: 102550
    • 1
    • A Customizable Reputation-based Privacy Assurance System using Active Feedback

      Research Article in 2nd International ICST Workshop on the Value of Security through Collaboration

      Stephen Crane , Marco Casassa Mont
    • A History-Based Framework to Build Trust Management Systems

      Research Article in 2nd International ICST Workshop on the Value of Security through Collaboration

      Samuel Galice, Veronique Legrand, Marine Minier, John Mullins, Stephane Ubeda
    • A Unified Framework for Trust Management

      Research Article in 2nd International ICST Workshop on the Value of Security through Collaboration

      Weiliang Zhao, Vijay Varadharajan, George Bryan
    • An Infrastructure for Gaining Trust in Context Information

      Research Article in 2nd International ICST Workshop on the Value of Security through Collaboration

      Frank Fransen, Eddy Olk, Sven Lachmund, Laurent Bussard
    • Outsourcing Security Analysis with Anonymized Logs

      Research Article in 2nd International ICST Workshop on the Value of Security through Collaboration

      Jianqing Zhang, Nikita Borisov, William Yurcik
    • Reputation-Based Algorithm for Managing Trust in File Sharing Networks

      Research Article in 2nd International ICST Workshop on the Value of Security through Collaboration

      Lara Srour, Ayman Kayssi , Ali Chehab
    • Reputation-based Trust-Aware Recommender System

      Research Article in 2nd International ICST Workshop on the Value of Security through Collaboration

      Sukumal Kitisin, Clifford Neuman
    • S-DV: A new approach to Secure Distance Vector routing protocols

      Research Article in 2nd International ICST Workshop on the Value of Security through Collaboration

      Abdelaziz Babakhouya, Yacine Challal, Abdelmadjid Bouabdallah, Saïd Gharout
    • Towards Communal Governed Transactions Among Decentralized Trading Agents

      Research Article in 2nd International ICST Workshop on the Value of Security through Collaboration

      Avinanta Tarigan
    • Towards Cooperative Self-Protecting Mobile Devices using Trustful Relationships

      Research Article in 2nd International ICST Workshop on the Value of Security through Collaboration

      Stephan Groß
    • 1
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL