{"id":"https://openalex.org/W2085262651","doi":"https://doi.org/10.1145/1102120.1102155","title":"A framework for concrete reputation-systems with applications to history-based access control","display_name":"A framework for concrete reputation-systems with applications to history-based access control","publication_year":2005,"publication_date":"2005-11-07","ids":{"openalex":"https://openalex.org/W2085262651","doi":"https://doi.org/10.1145/1102120.1102155","mag":"2085262651"},"language":"en","primary_location":{"id":"doi:10.1145/1102120.1102155","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1102120.1102155","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th ACM conference on Computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108811091","display_name":"Karl Krukow","orcid":null},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Karl Krukow","raw_affiliation_strings":["University of Aarhus, Denmark"],"affiliations":[{"raw_affiliation_string":"University of Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103703203","display_name":"Mogens Nielsen","orcid":null},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Mogens Nielsen","raw_affiliation_strings":["University of Aarhus, Denmark"],"affiliations":[{"raw_affiliation_string":"University of Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067426975","display_name":"Vladimiro Sassone","orcid":"https://orcid.org/0000-0002-6432-1482"},"institutions":[{"id":"https://openalex.org/I162608824","display_name":"University of Sussex","ror":"https://ror.org/00ayhx656","country_code":"GB","type":"education","lineage":["https://openalex.org/I162608824"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Vladimiro Sassone","raw_affiliation_strings":["University of Sussex, UK"],"affiliations":[{"raw_affiliation_string":"University of Sussex, UK","institution_ids":["https://openalex.org/I162608824"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5108811091"],"corresponding_institution_ids":["https://openalex.org/I204337017"],"apc_list":null,"apc_paid":null,"fwci":14.7843,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.98480569,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"260","last_page":"269"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.655104398727417},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6336070895195007},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6212826371192932},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5029618144035339},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3807133138179779},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11637696623802185},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.06374058127403259}],"concepts":[{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.655104398727417},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6336070895195007},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6212826371192932},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5029618144035339},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3807133138179779},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11637696623802185},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.06374058127403259},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1102120.1102155","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1102120.1102155","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th ACM conference on Computer and communications security","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.59.6242","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.6242","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.informatics.sussex.ac.uk/users/vs/research/paps/concreteRepDraft.pdf","raw_type":"text"},{"id":"pmh:oai:pure.atira.dk:publications/4727dae0-5c8d-11db-bee9-02004c4f4f50","is_oa":false,"landing_page_url":"https://pure.au.dk/portal/en/publications/4727dae0-5c8d-11db-bee9-02004c4f4f50","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Krukow, K K, Nielsen, M & Sassone, V 2005, A Framework for Concrete Reputation-Systems with Applications to History-Based Access Control. in Proc. of 12th ACM Conference on Computer and Communications Security. Association for Computing Machinery, pp. 260-269, ACM Conference on Computer and Communications Security, Alexandria, VA, United States, 07/11/2005. https://doi.org/10.1145/1102120.1102155","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7599999904632568,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W4295971","https://openalex.org/W11623710","https://openalex.org/W1479733905","https://openalex.org/W1482988310","https://openalex.org/W1513224132","https://openalex.org/W1526098002","https://openalex.org/W1542726706","https://openalex.org/W1582376574","https://openalex.org/W1604936042","https://openalex.org/W1740522204","https://openalex.org/W1747436876","https://openalex.org/W1968076133","https://openalex.org/W1998084650","https://openalex.org/W2003227046","https://openalex.org/W2023808162","https://openalex.org/W2036910349","https://openalex.org/W2046970568","https://openalex.org/W2096063762","https://openalex.org/W2097681874","https://openalex.org/W2097726984","https://openalex.org/W2103146530","https://openalex.org/W2104568606","https://openalex.org/W2105223068","https://openalex.org/W2106933078","https://openalex.org/W2109304399","https://openalex.org/W2109387928","https://openalex.org/W2125537511","https://openalex.org/W2131273904","https://openalex.org/W2134955051","https://openalex.org/W2136760448","https://openalex.org/W2137665245","https://openalex.org/W2156523427","https://openalex.org/W2159761160","https://openalex.org/W2162171351","https://openalex.org/W2173961470","https://openalex.org/W2176851475","https://openalex.org/W2337430557","https://openalex.org/W2470659010","https://openalex.org/W3124686198","https://openalex.org/W3182936708","https://openalex.org/W4239578735","https://openalex.org/W4285719527","https://openalex.org/W6630618191","https://openalex.org/W6676877027"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2102271161","https://openalex.org/W4313425421","https://openalex.org/W2361883455","https://openalex.org/W2952832228","https://openalex.org/W2909324362","https://openalex.org/W2372868951","https://openalex.org/W4388714791","https://openalex.org/W570712888","https://openalex.org/W1555990437"],"abstract_inverted_index":{"In":[0,45,61],"a":[1,31,51,55,82,138,143],"reputation-based":[2,38,59],"trust-management":[3,39],"system,":[4],"agents":[5],"maintain":[6],"information":[7,16],"about":[8,24,65],"the":[9,98,130,148,154],"past":[10,78],"behaviour":[11],"of":[12,57,136],"other":[13,126],"agents.":[14],"This":[15,121],"is":[17,30,101,145],"used":[18],"to":[19,124,142],"guide":[20],"future":[21],"trust-based":[22],"decisions":[23,64],"interaction.":[25],"However,":[26],"while":[27],"trust":[28],"management":[29],"component":[32],"in":[33],"security":[34],"decision-making,":[35],"many":[36,163],"existing":[37],"systems":[40],"provide":[41],"no":[42],"formal":[43],"security-guarantees.":[44],"this":[46],"extended":[47],"abstract,":[48],"we":[49,109],"describe":[50],"mathematical":[52],"framework":[53],"for":[54,93,147,153],"class":[56],"simple":[58,95],"systems.":[60],"these":[62],"systems,":[63],"interaction":[66],"are":[67,73],"taken":[68],"based":[69,86],"on":[70,76,87],"policies":[71,127,158],"that":[72],"exact":[74],"requirements":[75],"agents'":[77],"histories.":[79],"We":[80],"present":[81],"basic":[83,99,149],"declarative":[84],"language,":[85,150],"pure-past":[88],"linear":[89],"temporal":[90],"logic,":[91],"intended":[92],"writing":[94],"policies.":[96],"While":[97],"language":[100,156],"reasonably":[102],"expressive":[103],"(encoding":[104],"e.g.":[105],"Chinese":[106],"Wall":[107],"policies)":[108],"show":[110],"how":[111],"one":[112],"can":[113],"extend":[114],"it":[115],"with":[116,140],"quantification":[117],"and":[118,151],"parameterized":[119],"events.":[120],"allows":[122],"us":[123],"encode":[125],"known":[128],"from":[129],"literature,":[131],"e.g.,":[132],"`one-out-of-k'.":[133],"The":[134],"problem":[135],"checking":[137],"history":[139],"respect":[141],"policy":[144],"efficient":[146],"tractable":[152],"quantified":[155],"when":[157],"do":[159],"not":[160],"have":[161],"too":[162],"variables.":[164]},"counts_by_year":[{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":4}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
