TY - JOUR AU - Artz, D. AU - Gil, Y. PY - 2007 DA - 2007// TI - A survey of trust in computer science and the semantic web JO - J Web Semant VL - 5 UR - https://doi.org/10.1016/j.websem.2007.03.002 DO - 10.1016/j.websem.2007.03.002 ID - Artz2007 ER - TY - CHAP AU - Becker, M. AU - Sewell, P. PY - 2004 DA - 2004// TI - Cassandra: distributed access control policies with tunable expressiveness BT - Proceedings of the fifth IEEE international workshop on policies for distributed systems and networks PB - IEEE Computer Society CY - Los Alamitos ID - Becker2004 ER - TY - STD TI - Berners-Lee T, Hendler J, Lassila O (2001) The semantic web, May 2001. Scientific American Magazine. Retrieved from http://www.sciam.com/article.cfm?id=the-semantic-web, on Jan 2011 UR - http://www.sciam.com/article.cfm?id=the-semantic-web ID - ref3 ER - TY - CHAP AU - Boneh, D. AU - Boyen, X. PY - 2004 DA - 2004// TI - Short signatures without random oracles BT - Proceedings of the 24th international conference on the theory and applications of cryptographic techniques PB - Springer CY - Berlin ID - Boneh2004 ER - TY - CHAP AU - Boneh, D. AU - Boyen, X. AU - Shacham, H. PY - 2004 DA - 2004// TI - Short group signatures BT - Proceedings of the 24th international conference on the theory and applications of cryptographic techniques PB - Springer CY - Berlin ID - Boneh2004 ER - TY - BOOK AU - Brands, S. PY - 2000 DA - 2000// TI - Rethinking public key infrastructures and digital certificates: building in privacy PB - MIT Press CY - Cambridge ID - Brands2000 ER - TY - JOUR AU - Brin, S. AU - Page, L. PY - 1998 DA - 1998// TI - The anatomy of a large-scale hypertextual web search engine JO - Comput Netw ISDN Syst VL - 30 UR - https://doi.org/10.1016/S0169-7552(98)00110-X DO - 10.1016/S0169-7552(98)00110-X ID - Brin1998 ER - TY - CHAP AU - Camenisch, J. AU - Herreweghen, E. V. PY - 2002 DA - 2002// TI - Design and implementation of the idemix anonymous credential system BT - Proceedings of the ACM conference on computer and communications security PB - ACM Press CY - New York ID - Camenisch2002 ER - TY - CHAP AU - Damiani, E. AU - Vimercati, D. C. D. AU - Paraboschi, S. AU - Samarati, P. AU - Violante, F. PY - 2002 DA - 2002// TI - A reputation-based approach for choosing reliable resources in peer-to-peer networks BT - Proceedings of the ACM conference on computer and communications security PB - ACM Press CY - New York ID - Damiani2002 ER - TY - CHAP AU - Dimitriou, T. AU - Karame, G. AU - Christou, I. PY - 2007 DA - 2007// TI - SuperTrust: a secure and efficient framework for handling trust in super-peer networks BT - Proceedings of the twenty-sixth annual ACM symposium on principles of distributed computing PB - ACM Press CY - New York UR - https://doi.org/10.1145/1281100.1281180 DO - 10.1145/1281100.1281180 ID - Dimitriou2007 ER - TY - CHAP AU - Dingledine, R. AU - Mathewson, N. AU - Syverson, P. PY - 2004 DA - 2004// TI - Tor: the second-generation onion router BT - Proceedings of the 13th USENIX security symposium PB - USENIX Association CY - Berkeley ID - Dingledine2004 ER - TY - CHAP AU - Douceur, J. PY - 2002 DA - 2002// TI - The sybil attack BT - Proceedings of the first international workshop on peer-to-peer systems, IPTPS UR - https://doi.org/10.1007/3-540-45748-8_24 DO - 10.1007/3-540-45748-8_24 ID - Douceur2002 ER - TY - CHAP AU - Golbeck, J. AU - Hendler, J. PY - 2004 DA - 2004// TI - Accuracy of metrics for inferring trust and reputation in semantic web-based social networks BT - Proceedings of the international conference on knowledge engineering and knowledge management ID - Golbeck2004 ER - TY - JOUR AU - Grandison, T. AU - Sloman, M. PY - 2000 DA - 2000// TI - A survey of trust in internet applications JO - IEEE Commun Surv Tutor VL - 3 UR - https://doi.org/10.1109/COMST.2000.5340804 DO - 10.1109/COMST.2000.5340804 ID - Grandison2000 ER - TY - JOUR AU - Hansen, M. AU - Berlich, P. AU - Camenisch, J. AU - Clauss, S. AU - Pfitzmann, A. AU - Waidner, M. PY - 2004 DA - 2004// TI - Privacy-enhancing identity management JO - Inf Secur Tech Rep VL - 9 UR - https://doi.org/10.1016/S1363-4127(04)00014-7 DO - 10.1016/S1363-4127(04)00014-7 ID - Hansen2004 ER - TY - CHAP AU - Hussain, M. AU - Skillicorn, D. B. PY - 2008 DA - 2008// TI - Persona-based identity management: a novel approach to privacy protection BT - Proceedings of the 13th Nordic workshop on secure it systems ID - Hussain2008 ER - TY - CHAP AU - Hussain, M. AU - Skillicorn, D. B. PY - 2009 DA - 2009// TI - Guarantee-based access control BT - Proceedings of the IEEE international conference on computational science and engineering PB - IEEE Comput Soc CY - Los Alamitos ID - Hussain2009 ER - TY - CHAP AU - Hussain, M. AU - Skillicorn, D. B. PY - 2010 DA - 2010// TI - The case for service provider anonymity BT - Proceedings of the IEEE international symposium on signal processing and information technology PB - IEEE Comput Soc CY - Los Alamitos UR - https://doi.org/10.1109/ISSPIT.2010.5711743 DO - 10.1109/ISSPIT.2010.5711743 ID - Hussain2010 ER - TY - CHAP AU - Kagal, L. AU - Finin, T. AU - Joshi, A. PY - 2002 DA - 2002// TI - Developing secure agent systems using delegation based trust management BT - Proceedings of security of mobile multiagent systems held at autonomous agents and multiagent systems ID - Kagal2002 ER - TY - CHAP AU - Kamvar, S. AU - Schlosser, M. AU - Garcia-Molina, H. PY - 2003 DA - 2003// TI - The eigentrust algorithm for reputation management in p2p networks BT - Proceedings of the 12th international conference on World Wide Web PB - ACM Press CY - New York ID - Kamvar2003 ER - TY - CHAP AU - Kiayias, A. AU - Zhou, H. -. S. PY - 2008 DA - 2008// TI - Hidden identity-based signatures BT - Proceedings of the 11th international conference on financial cryptography and data security PB - Springer CY - Berlin ID - Kiayias2008 ER - TY - STD TI - Lynn B (2011) Pairing-based cryptography library. Retrieved from http://crypto.stanford.edu/pbc, on Jan 2011 UR - http://crypto.stanford.edu/pbc ID - ref22 ER - TY - JOUR AU - Malin, B. AU - Sweeney, L. PY - 2004 DA - 2004// TI - How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems JO - J Biomed Inform VL - 37 UR - https://doi.org/10.1016/j.jbi.2004.04.005 DO - 10.1016/j.jbi.2004.04.005 ID - Malin2004 ER - TY - CHAP AU - Müller, W. AU - Plötz, H. AU - Redlich, J. -. P. AU - Shiraki, T. PY - 2008 DA - 2008// TI - Sybil proof anonymous reputation management BT - Proceedings of the 4th international conference on security and privacy in communication networks PB - ACM Press CY - New York ID - Müller2008 ER - TY - CHAP AU - Narayanan, A. AU - Shmatikov, V. PY - 2008 DA - 2008// TI - Robust de-anonymization of large sparse datasets BT - Proceedings of the IEEE symposium on security and privacy PB - IEEE Comput Soc CY - Los Alamitos ID - Narayanan2008 ER - TY - STD TI - Narayanan A, Shmatikov V (2009) De-anonymizing social networks. In: Proceedings of the IEEE symposium on security and privacy. IEEE Computer Society, Los Alamitos (in press) ID - ref26 ER - TY - CHAP AU - Rezgui, A. AU - Bouguettaya, A. AU - Malik, Z. PY - 2003 DA - 2003// TI - A reputation-based approach to preserving privacy in web services BT - Lecture notes in computer science ID - Rezgui2003 ER - TY - CHAP AU - Singh, A. AU - Liu, L. PY - 2003 DA - 2003// TI - TrustMe: anonymous management of trust relationships in decentralized P2P systems BT - Proceedings of the third conference on peer-to-peer computing UR - https://doi.org/10.1109/PTP.2003.1231514 DO - 10.1109/PTP.2003.1231514 ID - Singh2003 ER - TY - STD TI - Skillicorn DB, Hussain M (2009) Personas: beyond identity protection by information control. Technical report, School of Computing, Queen’s University, Kingston, ON, Canada, March 2009. Retrieved from http://research.cs.queensu.ca/home/skill/opccreport.pdf, on Jan 2011 UR - http://research.cs.queensu.ca/home/skill/opccreport.pdf ID - ref29 ER - TY - JOUR AU - Sweeney, L. PY - 2002 DA - 2002// TI - k-Anonymity: a model for protecting privacy JO - Int J Uncertain Fuzziness Knowl-Based Syst VL - 10 UR - https://doi.org/10.1142/S0218488502001648 DO - 10.1142/S0218488502001648 ID - Sweeney2002 ER - TY - JOUR AU - Yu, T. AU - Winslett, M. AU - Seamons, K. PY - 2003 DA - 2003// TI - Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation JO - ACM Trans Inf Syst Secur VL - 6 UR - https://doi.org/10.1145/605434.605435 DO - 10.1145/605434.605435 ID - Yu2003 ER -