{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:59:39Z","timestamp":1725562779559},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642137389"},{"type":"electronic","value":"9783642137396"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13739-6_16","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T11:23:50Z","timestamp":1282649030000},"page":"241-256","source":"Crossref","is-referenced-by-count":3,"title":["Using Trust-Based Information Aggregation for Predicting Security Level of Systems"],"prefix":"10.1007","author":[{"given":"Siv Hilde","family":"Houmb","sequence":"first","affiliation":[]},{"given":"Sudip","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Indrakshi","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Indrajit","family":"Ray","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"ISO 15408:1999 Common Criteria for Information Technology Security Evaluation. Version 2.1, CCIMB\u201399\u2013031, CCIMB-99-032, CCIMB-99-033 (August 1999)"},{"key":"16_CR2","unstructured":"Common Criteria for Information Technology Security Evaluation (2010), http:\/\/en.wikipedia.org\/wiki\/Common_Criteria"},{"key":"16_CR3","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195064650.001.0001","volume-title":"Experts in Uncertainty: Opinion and Subjective Probability in Science","author":"R. Cooke","year":"1991","unstructured":"Cooke, R.: Experts in Uncertainty: Opinion and Subjective Probability in Science. Oxford University Press, Oxford (1991)"},{"issue":"3","key":"16_CR4","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1093\/oxfordjournals.rpd.a033151","volume":"90","author":"L. Goossens","year":"2000","unstructured":"Goossens, L., Harper, F., Kraan, B., Meacutetivier, H.: Expert Judgement for a Probabilistic Accident Consequence Uncertainty Analysis. Radiation Protection and Dosimetry\u00a090(3), 295\u2013303 (2000)","journal-title":"Radiation Protection and Dosimetry"},{"key":"16_CR5","unstructured":"EU Project EP-27046-ACTIVE: EP-27046-ACTIVE, Final Prototype and User Manual, D4.2.2, Ver. 2.0, 2001-02-22 (2001)"},{"key":"16_CR6","unstructured":"\u00d8stvang, M.E.: The Honeynet Project, Phase 1: Installing and Tuning Honeyd using LIDS, Project assignment, Norwegian University of Science and Technology (2003)"},{"key":"16_CR7","unstructured":"Karig, D., Lee, R.: Remote Denial of Service Attacks and Countermeasures. Technical report CE-L2001-002, Department of Electrical Engineering, Princeton University (October 2001)"},{"key":"16_CR8","unstructured":"Barkley, A., Liu, S., Gia, Q., Dingfield, M., Gokhale, Y.: A Testbed for Study of Distributed Denial of Service Attacks (WA 2.4). In: Proceedings of the IEEE Workshop on Information Assurance and Security, June 2000, pp. 218\u2013223 (2000)"},{"key":"16_CR9","unstructured":"Bernstein, D.: SYN Cookies, http:\/\/crypto.syncookies.html (accessed November 2006)"},{"key":"16_CR10","unstructured":"Lin, S., Chiueh, T.: A Survey on Solutions to Distributed Denial of Service Attacks. Technical report RPE TR-201, Department of Computer Science, Stony Brook University (September 2006)"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A.: A Subjective Metric of Authentication. In: Proceedings of the 5th European Symposium on Research in Computer Security, September 1998, pp. 329\u2013344 (1998)","DOI":"10.1007\/BFb0055873"},{"key":"16_CR12","unstructured":"J\u00f8sang, A.: An Algebra for Assessing Trust in Certification Chains. In: Proceedings of the 1999 Network and Distributed Systems Security Symposium (February 1999)"},{"key":"16_CR13","unstructured":"Cohen, M., Parasuraman, R., Freeman, J.: Trust in Decision Aids: A Model and a Training Strategy. Technical Report USAATCOM TR 97-D-4, Cognitive Technologies Inc. (1997)"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Yahalom, R., Klein, B., Beth, T.: Trust Relationship in Secure Systems: A Distributed Authentication Perspective. In: Proceedings of the IEEE Symposium on Security and Privacy, May 1993, pp. 150\u2013164 (1993)","DOI":"10.1109\/RISP.1993.287635"},{"issue":"1","key":"16_CR15","first-page":"45","volume":"7","author":"R. Yahalom","year":"1994","unstructured":"Yahalom, R., Klein, B., Beth, T.: Trust-based Navigation in Distributed Systems. Computing Systems\u00a07(1), 45\u201373 (1994)","journal-title":"Computing Systems"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Beth, T., Borcherding, M., Klein, B.: Valuation of Trust in Open Networks. In: Proceedings of the 3rd European Symposium on Research in Computer Security, November 1994, pp. 3\u201318 (1994)","DOI":"10.1007\/3-540-58618-0_53"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Xiong, L., Liu, L.: A Reputation-Based Trust Model For Peer-To-Peer Ecommerce Communities. In: Proceedings of the IEEE Conference on E-Commerce, June 2003, pp. 275\u2013284 (2003)","DOI":"10.1145\/779928.779972"},{"key":"16_CR18","first-page":"1","volume-title":"Trust and Deception in Virtual Societies","author":"M. Bacharach","year":"2000","unstructured":"Bacharach, M., Gambetta, D.: Trust as Type Identification. In: Trust and Deception in Virtual Societies, pp. 1\u201326. Kluwer Academic Publishers, Dordrecht (2000)"},{"issue":"6","key":"16_CR19","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1016\/S0167-4048(01)00605-8","volume":"20","author":"S. Purser","year":"2001","unstructured":"Purser, S.: A Simple Graphical Tool For Modelling Trust. Computers & Security\u00a020(6), 479\u2013484 (2001)","journal-title":"Computers & Security"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Ray, I., Chakraborty, S.: A Vector Model of Trust for Developing Trustworthy Systems. In: Proceedings of the 9th European Symposium on Research in Computer Security, September 2004, pp. 260\u2013275 (2004)","DOI":"10.1007\/978-3-540-30108-0_16"},{"issue":"1","key":"16_CR21","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s10844-007-0049-9","volume":"32","author":"I. Ray","year":"2009","unstructured":"Ray, I., Ray, I., Chakraborty, S.: An Interoperable Context Sensitive Model of Trust. Journal of Intelligent Information Systems\u00a032(1), 75\u2013104 (2009)","journal-title":"Journal of Intelligent Information Systems"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman, A., Hailes, S.: Supporting Trust in Virtual Communities. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, January 2000, pp. 4\u20137 (2000)","DOI":"10.1109\/HICSS.2000.926814"},{"issue":"1","key":"16_CR23","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. ACM Transactions on Computer Systems\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Transactions on Computer Systems"},{"key":"16_CR24","first-page":"157","volume-title":"Trust and Deception in Virtual Societies","author":"A. Jones","year":"2000","unstructured":"Jones, A., Firozabadi, B.: On the Characterization of a Trusting Agent \u2013 Aspects of a Formal Approach. In: Trust and Deception in Virtual Societies, pp. 157\u2013168. Kluwer Academic Publishers, Dordrecht (2000)"},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Samarati, P., Subrahmanian, V.: A Logical Language for Expressing Authorizations. In: Proceedings of the IEEE Symposium on Security and Privacy, May 1997, pp. 31\u201342 (1997)","DOI":"10.1109\/SECPRI.1997.601312"},{"key":"16_CR26","doi-asserted-by":"crossref","first-page":"211","DOI":"10.3233\/JCS-1993-22-308","volume":"2","author":"B. Littlewood","year":"1993","unstructured":"Littlewood, B., Brocklehurst, S., Fenton, N., Mellor, P., Page, S., Wright, D., Dobson, J., McDermid, J., Gollmann, D.: Towards Operational Measures of Computer Security. Journal of Computer Security\u00a02, 211\u2013229 (1993)","journal-title":"Journal of Computer Security"},{"issue":"25","key":"16_CR27","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1109\/32.815323","volume":"5","author":"R. Ortalo","year":"1999","unstructured":"Ortalo, R., Deswarte, Y.: Experiments with Quantitative Evaluation Tools for Monitoring Operational Security. IEEE Transaction on Software Engineering\u00a05(25), 633\u2013650 (1999)","journal-title":"IEEE Transaction on Software Engineering"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Madan, B., Popstojanova, K.G., Vaidyanathan, K., Trivedi, K.: Modeling and Quantification of Security Attributes of Software Systems. In: Proceedings of the International Conference on Dependable Systems and Networks, June 2002, pp. 505\u2013514 (2002)","DOI":"10.1109\/DSN.2002.1028941"},{"issue":"25","key":"16_CR29","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1109\/32.588541","volume":"4","author":"E. Jonsson","year":"1997","unstructured":"Jonsson, E., Olovsson, T.: A Quantitative Model of the Security Intrusion Process based on Attacker Behavior. IEEE Transaction on Software Engineering\u00a04(25), 235\u2013246 (1997)","journal-title":"IEEE Transaction on Software Engineering"},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"Alberts, C., Behrens, S., Pethia, R., Wilson, W.: Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Framework, Version 1.0. Technical report, Software Engineering Institute, Carnegie Mellon University (June 1999)","DOI":"10.21236\/ADA367718"},{"key":"16_CR31","unstructured":"Barber, B., Davey, J.: The Use of the CCTA Risk Analysis and Management Methodology CRAMM in Health Information Systems. In: Proceedings of the International Medical Informatics Conference, September 1992, pp. 1589\u20131593 (1992)"},{"key":"16_CR32","unstructured":"CORAS (2000\u20132003): IST-2000-25031 CORAS: A Platform for Risk Analysis of Security Critical Systems (accessed February 2006)"},{"key":"16_CR33","unstructured":"International Organization for Standardization (ISO\/IEC): ISO\/IEC 27002:2005 Information Technology \u2013 Security Techniques \u2013 Code of Practice for Information Security Management (2000)"},{"key":"16_CR34","unstructured":"International Organization for Standardization (ISO\/IEC): ISO\/IEC TR 13335:2004 Information Technology \u2013 Guidelines for Management of IT Security (2001)"},{"key":"16_CR35","unstructured":"Australian\/New Zealand Standards: AS\/NZS 4360:2007 Risk Management (2004)"},{"key":"16_CR36","doi-asserted-by":"crossref","unstructured":"Houmb, S., Ray, I., Ray, I.: Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. In: Proceedings of the 4th International Conference on Trust Management, May 2006, pp. 135\u2013149 (2006)","DOI":"10.1007\/11755593_11"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13739-6_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,29]],"date-time":"2024-03-29T21:10:58Z","timestamp":1711746658000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13739-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137389","9783642137396"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13739-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}