{"id":"https://openalex.org/W1914013548","doi":"https://doi.org/10.1109/discex.2003.1194930","title":"Dynamic trust-based resource allocation","display_name":"Dynamic trust-based resource allocation","publication_year":2004,"publication_date":"2004-03-22","ids":{"openalex":"https://openalex.org/W1914013548","doi":"https://doi.org/10.1109/discex.2003.1194930","mag":"1914013548"},"language":"en","primary_location":{"id":"doi:10.1109/discex.2003.1194930","is_oa":false,"landing_page_url":"https://doi.org/10.1109/discex.2003.1194930","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings DARPA Information Survivability Conference and Exposition","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046134510","display_name":"Trevor C. Hughes","orcid":null},"institutions":[{"id":"https://openalex.org/I1287521167","display_name":"Lockheed Martin (United States)","ror":"https://ror.org/026er9r08","country_code":"US","type":"company","lineage":["https://openalex.org/I1287521167"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"T. Hughes","raw_affiliation_strings":["Lockheed Martin Advanced Technology Laboratories, USA"],"affiliations":[{"raw_affiliation_string":"Lockheed Martin Advanced Technology Laboratories, USA","institution_ids":["https://openalex.org/I1287521167"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003950083","display_name":"M. Junod","orcid":null},"institutions":[{"id":"https://openalex.org/I1287521167","display_name":"Lockheed Martin (United States)","ror":"https://ror.org/026er9r08","country_code":"US","type":"company","lineage":["https://openalex.org/I1287521167"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M. Junod","raw_affiliation_strings":["Lockheed Martin Advanced Technology Laboratories, USA"],"affiliations":[{"raw_affiliation_string":"Lockheed Martin Advanced Technology Laboratories, USA","institution_ids":["https://openalex.org/I1287521167"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011396622","display_name":"Patrick A. Muckelbauer","orcid":null},"institutions":[{"id":"https://openalex.org/I1287521167","display_name":"Lockheed Martin (United States)","ror":"https://ror.org/026er9r08","country_code":"US","type":"company","lineage":["https://openalex.org/I1287521167"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"P.A. Muckelbauer","raw_affiliation_strings":["Lockheed Martin Advanced Technology Laboratories, USA"],"affiliations":[{"raw_affiliation_string":"Lockheed Martin Advanced Technology Laboratories, USA","institution_ids":["https://openalex.org/I1287521167"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5046134510"],"corresponding_institution_ids":["https://openalex.org/I1287521167"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.13029055,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":null,"first_page":"90","last_page":"90"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.84170001745224,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.84170001745224,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.8095999956130981,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7590975761413574},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.6815649271011353},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.6804437041282654},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6721854209899902},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.6191895604133606},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.6144220232963562},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.5596597790718079},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5333293676376343},{"id":"https://openalex.org/keywords/resource-management","display_name":"Resource management (computing)","score":0.4693732261657715},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3309051990509033},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.21148934960365295},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.21057793498039246},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.16702696681022644},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.07634654641151428}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7590975761413574},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.6815649271011353},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.6804437041282654},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6721854209899902},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.6191895604133606},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.6144220232963562},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.5596597790718079},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5333293676376343},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.4693732261657715},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3309051990509033},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.21148934960365295},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.21057793498039246},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.16702696681022644},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.07634654641151428},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/discex.2003.1194930","is_oa":false,"landing_page_url":"https://doi.org/10.1109/discex.2003.1194930","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings DARPA Information Survivability Conference and Exposition","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2916013893","https://openalex.org/W2406819003","https://openalex.org/W2049283755","https://openalex.org/W2380484878","https://openalex.org/W2170496240","https://openalex.org/W145920803","https://openalex.org/W2509590646","https://openalex.org/W2097156757","https://openalex.org/W2381388525","https://openalex.org/W4243605140"],"abstract_inverted_index":{"Summary":[0],"form":[1],"only":[2],"given.":[3],"DyTR":[4,38,68,100,137],"is":[5],"an":[6,40,49],"approach":[7],"to":[8,48,79,89,115,125,149],"trust":[9,74,105,147],"that":[10,44,81,107,112,119],"goes":[11],"beyond":[12],"traditional":[13],"authentication-based":[14],"techniques,":[15],"in":[16,22,61,65,135],"which":[17,136],"the":[18,140],"trustworthiness":[19,141],"of":[20,36,52,104,142],"entities":[21,83,144],"a":[23,33,94,130],"system":[24,30,91,116],"adapts":[25],"over":[26],"time":[27],"based":[28],"on":[29],"events.":[31],"Using":[32],"socio-cognitive":[34],"model":[35],"trust,":[37,56],"provides":[39],"adaptive":[41],"trust-assessment":[42],"methodology":[43],"allocates":[45,59],"resources":[46,60,122],"dynamically":[47,138],"initial":[50],"level":[51,103],"credentials,":[53],"continually":[54,72],"assesses":[55,139],"and":[57,109,145,153],"adaptively":[58],"accordance":[62],"with":[63,75],"changes":[64],"perceived":[66],"trust.":[67],"tightly":[69],"couples":[70],"this":[71],"assessed":[73],"low-level":[76],"resource-allocation":[77],"mechanisms":[78],"ensure":[80],"requesting":[82,95],"are":[84],"trusted":[85],"and,":[86],"thus,":[87],"permitted":[88],"use":[90],"resources.":[92],"If":[93],"entity":[96],"exhibits":[97],"suspicious":[98],"behavior,":[99],"degrades":[101],"its":[102],"for":[106],"entity,":[108],"subsequently":[110],"reduces":[111],"entity's":[113],"access":[114],"resources,":[117],"so":[118],"other":[120],"critical":[121],"can":[123],"continue":[124],"operate.":[126],"This":[127],"paper":[128],"features":[129],"coalition":[131,143],"naval":[132],"fleet":[133],"simulation":[134],"uses":[146],"assessments":[148],"regulate":[150],"weapon,":[151],"sensor,":[152],"communication":[154],"pathway":[155],"resource":[156],"allocations.":[157]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
