|
Search the dblp DataBase
Nathan Dimmock:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Ciarán Bryce, Nathan Dimmock, Karl Krukow, Jean-Marc Seigneur, Vinny Cahill, Waleed Wagealla
Towards an Evaluation Methodology for Computational Trust Systems. [Citation Graph (0, 0)][DBLP] iTrust, 2005, pp:289-304 [Conf]
- Nathan Dimmock, Jean Bacon, David Ingram, Ken Moody
Risk Models for Trust-Based Access Control(TBAC). [Citation Graph (0, 0)][DBLP] iTrust, 2005, pp:364-371 [Conf]
- Brian Shand, Nathan Dimmock, Jean Bacon
Trust for Ubiquitous, Transparent Collaboration. [Citation Graph (0, 0)][DBLP] PerCom, 2003, pp:153-160 [Conf]
- Jean-Marc Seigneur, Nathan Dimmock, Ciarán Bryce, Christian Damsgaard Jensen
Combating Spam with TEA. [Citation Graph (0, 0)][DBLP] PST, 2004, pp:47-58 [Conf]
- Nathan Dimmock, András Belokosztolszki, David M. Eyers, Jean Bacon, Ken Moody
Using trust and risk in role-based access control policies. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:156-162 [Conf]
- Nathan Dimmock
How much is "enough"? Risk in Trust-Based Access Control. [Citation Graph (0, 0)][DBLP] WETICE, 2003, pp:281-282 [Conf]
- Andrew Twigg, Nathan Dimmock
Attack-Resistance of Computational Trust Models. [Citation Graph (0, 0)][DBLP] WETICE, 2003, pp:275-280 [Conf]
- Brian Shand, Nathan Dimmock, Jean Bacon
Trust for Ubiquitous, Transparent Collaboration. [Citation Graph (0, 0)][DBLP] Wireless Networks, 2004, v:10, n:6, pp:711-721 [Journal]
Peer-to-peer collaborative spam detection. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs
|