Author of the publication

TRIMS, a privacy-aware trust and reputation model for identity management systems.

, , and . Computer Networks, 54 (16): 2899-2912 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TACS, a Trust Model for P2P Networks., , and . Wireless Personal Communications, 51 (1): 153-164 (2009)Graph-based XACML evaluation., , and . SACMAT, page 83-92. ACM, (2012)Meta-Tacs: A Trust Model Demonstration Of Robustness Through A Genetic Algorithm., , and . Intelligent Automation & Soft Computing, 17 (1): 41-59 (2011)Dynamic counter-measures for risk-based access control systems: An evolutive approach., , , and . Future Generation Comp. Syst., (2016)Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems., and . Computer Standards & Interfaces, 32 (4): 185-196 (2010)Screening Out Social Bots Interference: Are There Any Silver Bullets?, , , , , , and . IEEE Communications Magazine, 57 (8): 98-104 (2019)Triggering IDM Authentication Methods based on Device Capabilities Information., , and . Sicherheit, volume P-195 of LNI, page 235-244. GI, (2012)Reporting Offensive Content in Social Networks: Toward a Reputation-Based Assessment Approach., , and . IEEE Internet Comput., 18 (2): 32-40 (2014)Resolving privacy-preserving relationships over outsourced encrypted data storages., , , , and . Int. J. Inf. Sec., 15 (2): 195-209 (2016)Editorial: special issue on advances in security and privacy for future mobile communications., , and . Electron. Commer. Res., 15 (1): 73-74 (2015)