Journal: Electronic Notes in Theoretical Computer Science

Volume 157, Issue 3

1 -- 2Sjouke Mauw, Valérie Issarny, Cas J. F. Cremers. Preface
3 -- 9Dieter Gollmann. Why Trust is Bad for Security
11 -- 25Daniel Cvrcek, Petr Svenda. Smart Dust Security - Key Infection Revisited
27 -- 41Simona Orzan, Erik P. de Vink. Multiparty Contract Signing Over a Reliable Network
43 -- 59J. Todd McDonald, Alec Yasinsac. Application Security Models for Mobile Agent Systems
61 -- 78Roberto Gorrieri, Fabio Martinelli, Marinella Petrocchi. A Formalization of Credit and Responsibility Within the GNDC Schema
79 -- 94Katja Schmidt-Samoa. A New Rabin-type Trapdoor Permutation Equivalent to Factoring
95 -- 111Elizabeth Gray, Christian Damsgaard Jensen, Paul O Connell, Stefan Weber, Jean-Marc Seigneur, Yong Chen. Trust Evolution Policies for Security in Collaborative Ad Hoc Applications
113 -- 130Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Jerry den Hartog. Nonmonotonic Trust Management for P2P Applications
131 -- 142Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati, Marco Viviani. A WOWA-based Aggregation Technique on Trust Values Connected to Metadata
143 -- 158Thomas B. Quillinan, Simon N. Foley. Synchronisation in Trust Management Using Push Authorisation