Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. Technical report, DEC Systems Research Center, February 1989. Research Report 39.
2. T. Beth, M. Borcherding, and B. Klein. Valuation of trust in open networks. In ESORICS 94. Brighton, UK, November 1994.
3. Gary Becker. The economic approach to human behavior. University of Chicago Press, 1976.
4. M.S. Cohen. An expert system framework for non-monotonic reasoning about probabilistic assumptions. In L.N. Kanal and J.F. Lemmer, editors, Uncertainty in Artificial Intelligence. North-Holland, 1986.
5. EC. Information Technology Security Evaluation Criteria (ITSEC). The European Commission, 1992.
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献