The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Nathan Dimmock: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ciarán Bryce, Nathan Dimmock, Karl Krukow, Jean-Marc Seigneur, Vinny Cahill, Waleed Wagealla
    Towards an Evaluation Methodology for Computational Trust Systems. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:289-304 [Conf]
  2. Nathan Dimmock, Jean Bacon, David Ingram, Ken Moody
    Risk Models for Trust-Based Access Control(TBAC). [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:364-371 [Conf]
  3. Brian Shand, Nathan Dimmock, Jean Bacon
    Trust for Ubiquitous, Transparent Collaboration. [Citation Graph (0, 0)][DBLP]
    PerCom, 2003, pp:153-160 [Conf]
  4. Jean-Marc Seigneur, Nathan Dimmock, Ciarán Bryce, Christian Damsgaard Jensen
    Combating Spam with TEA. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:47-58 [Conf]
  5. Nathan Dimmock, András Belokosztolszki, David M. Eyers, Jean Bacon, Ken Moody
    Using trust and risk in role-based access control policies. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:156-162 [Conf]
  6. Nathan Dimmock
    How much is "enough"? Risk in Trust-Based Access Control. [Citation Graph (0, 0)][DBLP]
    WETICE, 2003, pp:281-282 [Conf]
  7. Andrew Twigg, Nathan Dimmock
    Attack-Resistance of Computational Trust Models. [Citation Graph (0, 0)][DBLP]
    WETICE, 2003, pp:275-280 [Conf]
  8. Brian Shand, Nathan Dimmock, Jean Bacon
    Trust for Ubiquitous, Transparent Collaboration. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2004, v:10, n:6, pp:711-721 [Journal]

  9. Peer-to-peer collaborative spam detection. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002