Incorporation Of Certification Revocation And Time Concept Into A Trust Model For Information Security System
In large open networks, handling trust and authenticity adequately is an important prerequisite for security policy. Trust issues influence not only the specification of security policies but also the techniques needed to manage and implement security policies for systems. Certification is one of...
| Main Author: | Azimzadeh, Fatemeh |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/5268/ http://psasir.upm.edu.my/id/eprint/5268/1/FK_2007_55a.pdf |
Similar Items
Incorporating revocation of certification into a PKI model
by: Azimzadeh, Fatemeh, et al.
Published: (2007)
by: Azimzadeh, Fatemeh, et al.
Published: (2007)
Comparative analysis of trust and security
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
Fuzzy nature and dynamic trust modeling in service oriented environments
by: Chang, Elizabeth, et al.
Published: (2005)
by: Chang, Elizabeth, et al.
Published: (2005)
Trust Based Security for Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Building a fuzzy trust network in unsupervised multi-agent environments
by: Chang, Elizabeth, et al.
Published: (2005)
by: Chang, Elizabeth, et al.
Published: (2005)
SECRET: a secure and efficient certificate revocation scheme for mobile ad hoc networks
by: Mall, Dieynaba, et al.
Published: (2014)
by: Mall, Dieynaba, et al.
Published: (2014)
Trust in Ecommerce: determinants of consumer trust in online shopping and trust-inducing features of interface design
by: Wang, Qiongzhen
Published: (2017)
by: Wang, Qiongzhen
Published: (2017)
Applying a fuzzy trust model to e-commerce systems
by: Chang, Elizabeth, et al.
Published: (2005)
by: Chang, Elizabeth, et al.
Published: (2005)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
Cognitive radio network security: A survey
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)
by: Maher, Zulfikar Ahmed
Published: (2016)
The performance of unit trust fund in Malaysia / Nur Nadhirah Sabar
by: Sabar, Nur Nadhirah
Published: (2017)
by: Sabar, Nur Nadhirah
Published: (2017)
Modeling the risk relationships and defining the risk set
by: Hussain, Omar, et al.
Published: (2005)
by: Hussain, Omar, et al.
Published: (2005)
Dynamic user reconfigurable privacy and trust settigs for collaborative industrial environments
by: Skinner, G
Published: (2005)
by: Skinner, G
Published: (2005)
Trust-based spectrum sharing for cognitive radio networks
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Commitment in cases of trust and distrust
by: Tallant, Jonathan
Published: (2017)
by: Tallant, Jonathan
Published: (2017)
Determinant factors that enhancing young investor to invest in ASNB Unit Trust / Nurul Uyun Abd Talib
by: Abd Talib, Nurul Uyun
Published: (2010)
by: Abd Talib, Nurul Uyun
Published: (2010)
A combinational approach for trust establishment in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Markov model for managing dynamic trust
by: Hussain, Farookh, et al.
Published: (2005)
by: Hussain, Farookh, et al.
Published: (2005)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
State of the art Review for Trust Maintenance in Organizations
by: Fachrunnisa, Olivia, et al.
Published: (2010)
by: Fachrunnisa, Olivia, et al.
Published: (2010)
Trust and reputation relationships in service-oriented environments
by: Chang, Elizabeth, et al.
Published: (2005)
by: Chang, Elizabeth, et al.
Published: (2005)
Mutual trust between leader and subordinate and employee outcomes
by: Kim, Tae-Yeol, et al.
Published: (2016)
by: Kim, Tae-Yeol, et al.
Published: (2016)
Trust and trustworthiness under information asymmetry and ambiguity
by: Clot-Figueras, Irma, et al.
Published: (2016)
by: Clot-Figueras, Irma, et al.
Published: (2016)
A methodology for maintaining trust in virtual environments
by: Fachrunnisa, Olivia
Published: (2011)
by: Fachrunnisa, Olivia
Published: (2011)
SLA-Based Trust Model for Cloud Computing
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
A study on security of mosque / Nor Hasnida Ab Halim
by: Ab Halim, Nor Hasnida
Published: (2013)
by: Ab Halim, Nor Hasnida
Published: (2013)
Development of Security Identification and Monitoring System for Web Application
by: Dani, Norizawati
Published: (1999)
by: Dani, Norizawati
Published: (1999)
Neural Network-Based Approach for Predicting Trust Values Based on Non-uniform Input in Mobile Applications
by: Raza, Muhammad, et al.
Published: (2011)
by: Raza, Muhammad, et al.
Published: (2011)
Investors' perception towards Islamic Unit Trust in Malaysia / Abdul Halim Mohamed Ibrahim ... [et al.]
by: Mohamed Ibrahim, Abdul Halim, et al.
Published: (2006)
by: Mohamed Ibrahim, Abdul Halim, et al.
Published: (2006)
The study of unit trust company in educating Malaysian people towards unit trust: a case study of Permodalan Nasional Berhad (PNB) / Mohd Faiz Zakaria
by: Zakaria, Mohd Faiz
Published: (2009)
by: Zakaria, Mohd Faiz
Published: (2009)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Internet - Based Security and Monitoring System
by: Suliman, Isameldin Mohammed
Published: (1998)
by: Suliman, Isameldin Mohammed
Published: (1998)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
The Performance of Malaysian Unit Trust Funds that is in compliant with Shari’a Principles and Factors Influencing It / Hasimah Omar and Nur Izati Zainal
by: Omar, Hasimah, et al.
Published: (2014)
by: Omar, Hasimah, et al.
Published: (2014)
A unified trust model for common criteria recognition arrangement for product acceptance
by: Mat Isa, Mohd Anuar
Published: (2018)
by: Mat Isa, Mohd Anuar
Published: (2018)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
A study on the level of awareness of Islamic Unit Trust in Terengganu / Azian Abd Ghani … [et al.]
by: Abd Ghani, Azian, et al.
Published: (2008)
by: Abd Ghani, Azian, et al.
Published: (2008)
Similar Items
-
Incorporating revocation of certification into a PKI model
by: Azimzadeh, Fatemeh, et al.
Published: (2007) -
Comparative analysis of trust and security
by: Hussain, Farookh Khadeer, et al.
Published: (2006) -
Fuzzy nature and dynamic trust modeling in service oriented environments
by: Chang, Elizabeth, et al.
Published: (2005) -
Trust Based Security for Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010) -
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)