
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Privacy-Preserving Trust Negotiations
Elisa Bertino, Elena Ferrari, Anna Squicciarini
Lecture notes in computer science (2005), pp. 283-301
Closed Access | Times Cited: 32
Elisa Bertino, Elena Ferrari, Anna Squicciarini
Lecture notes in computer science (2005), pp. 283-301
Closed Access | Times Cited: 32
Showing 1-25 of 32 citing articles:
PP-trust-X
Anna Squicciarini, Elisa Bertino, Elena Ferrari, et al.
ACM Transactions on Information and System Security (2007) Vol. 10, Iss. 3, pp. 12-12
Closed Access | Times Cited: 66
Anna Squicciarini, Elisa Bertino, Elena Ferrari, et al.
ACM Transactions on Information and System Security (2007) Vol. 10, Iss. 3, pp. 12-12
Closed Access | Times Cited: 66
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach
Anna Squicciarini, Elisa Bertino, Elena Ferrari, et al.
IEEE Transactions on Dependable and Secure Computing (2006) Vol. 3, Iss. 1, pp. 13-30
Closed Access | Times Cited: 63
Anna Squicciarini, Elisa Bertino, Elena Ferrari, et al.
IEEE Transactions on Dependable and Secure Computing (2006) Vol. 3, Iss. 1, pp. 13-30
Closed Access | Times Cited: 63
Analysis-preserving protection of user privacy against information leakage of social-network Likes
Francesco Buccafurri, Lidia Fotia, Gianluca Lax, et al.
Information Sciences (2015) Vol. 328, pp. 340-358
Closed Access | Times Cited: 28
Francesco Buccafurri, Lidia Fotia, Gianluca Lax, et al.
Information Sciences (2015) Vol. 328, pp. 340-358
Closed Access | Times Cited: 28
Modeling Trust Negotiation for Web Services
Halvard Skogsrud, Hamid Reza Motahari‐Nezhad, Boualem Benatallah, et al.
Computer (2009) Vol. 42, Iss. 2, pp. 54-61
Closed Access | Times Cited: 28
Halvard Skogsrud, Hamid Reza Motahari‐Nezhad, Boualem Benatallah, et al.
Computer (2009) Vol. 42, Iss. 2, pp. 54-61
Closed Access | Times Cited: 28
A privacy-preserving e-participation framework allowing citizen opinion analysis
Francesco Buccafurri, Lidia Fotia, Gianluca Lax
Electronic Government an International Journal (2015) Vol. 11, Iss. 3, pp. 185-185
Closed Access | Times Cited: 14
Francesco Buccafurri, Lidia Fotia, Gianluca Lax
Electronic Government an International Journal (2015) Vol. 11, Iss. 3, pp. 185-185
Closed Access | Times Cited: 14
Allowing privacy-preserving analysis of social network likes
Francesco Buccafurri, Lidia Fotia, Gianluca Lax
(2013), pp. 36-43
Closed Access | Times Cited: 13
Francesco Buccafurri, Lidia Fotia, Gianluca Lax
(2013), pp. 36-43
Closed Access | Times Cited: 13
Privacy Preserving Trust Negotiation for Pervasive Healthcare
Changyu Dong, Naranker Dulay
(2006), pp. 1-9
Closed Access | Times Cited: 18
Changyu Dong, Naranker Dulay
(2006), pp. 1-9
Closed Access | Times Cited: 18
Allowing Non-identifying Information Disclosure in Citizen Opinion Evaluation
Francesco Buccafurri, Lidia Fotia, Gianluca Lax
Lecture notes in computer science (2013), pp. 241-254
Closed Access | Times Cited: 10
Francesco Buccafurri, Lidia Fotia, Gianluca Lax
Lecture notes in computer science (2013), pp. 241-254
Closed Access | Times Cited: 10
A New Approach to Hide Policy for Automated Trust Negotiation
Hai Jin, Zhensong Liao, Deqing Zou, et al.
Lecture notes in computer science (2006), pp. 168-178
Closed Access | Times Cited: 13
Hai Jin, Zhensong Liao, Deqing Zou, et al.
Lecture notes in computer science (2006), pp. 168-178
Closed Access | Times Cited: 13
A Flexible Approach to Multisession Trust Negotiations
Anna Squicciarini, Elisa Bertino, Alberto Trombetta, et al.
IEEE Transactions on Dependable and Secure Computing (2011) Vol. 9, Iss. 1, pp. 16-29
Closed Access | Times Cited: 8
Anna Squicciarini, Elisa Bertino, Alberto Trombetta, et al.
IEEE Transactions on Dependable and Secure Computing (2011) Vol. 9, Iss. 1, pp. 16-29
Closed Access | Times Cited: 8
Personal Information Classification for Privacy Negotiation
Injoo Jang, Hyeong Seon Yoo
(2009), pp. 1117-1122
Closed Access | Times Cited: 8
Injoo Jang, Hyeong Seon Yoo
(2009), pp. 1117-1122
Closed Access | Times Cited: 8
Trust-privacy tradeoffs in distributed systems
Rima Deghaili, Ali Chehab, Ayman Kayssi
International Conference on Innovations in Information Technology (2008), pp. 39-43
Closed Access | Times Cited: 6
Rima Deghaili, Ali Chehab, Ayman Kayssi
International Conference on Innovations in Information Technology (2008), pp. 39-43
Closed Access | Times Cited: 6
Combining access control and trust negotiations in an On-line Social Network
Stefano Braghin, Elena Ferrari, Alberto Trombetta
(2010)
Open Access | Times Cited: 5
Stefano Braghin, Elena Ferrari, Alberto Trombetta
(2010)
Open Access | Times Cited: 5
A Research on the Relationship between Trust and Privacy in Network Environments
Feng Gao, Jingsha He, Shunan Ma
International Journal of Digital Content Technology and its Applications (2011) Vol. 5, Iss. 1, pp. 235-246
Closed Access | Times Cited: 5
Feng Gao, Jingsha He, Shunan Ma
International Journal of Digital Content Technology and its Applications (2011) Vol. 5, Iss. 1, pp. 235-246
Closed Access | Times Cited: 5
Preventing Unofficial Information Propagation
Zhengyi Le, Yi Ouyang, Yurong Xu, et al.
Lecture notes in computer science (2007), pp. 113-125
Open Access | Times Cited: 6
Zhengyi Le, Yi Ouyang, Yurong Xu, et al.
Lecture notes in computer science (2007), pp. 113-125
Open Access | Times Cited: 6
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
Sudip Chakraborty, Indrajit Ray
Journal of Computers (2007) Vol. 2, Iss. 2
Closed Access | Times Cited: 6
Sudip Chakraborty, Indrajit Ray
Journal of Computers (2007) Vol. 2, Iss. 2
Closed Access | Times Cited: 6
Anonymity Preserving Techniques in Trust Negotiations
Indrakshi Ray, Elisa Bertino, Anna Squicciarini, et al.
Lecture notes in computer science (2006), pp. 93-109
Closed Access | Times Cited: 6
Indrakshi Ray, Elisa Bertino, Anna Squicciarini, et al.
Lecture notes in computer science (2006), pp. 93-109
Closed Access | Times Cited: 6
A Quantifying Metric for Privacy Protection Based on Information Theory
Feng Gao, Jingsha He, Shufen Peng, et al.
(2010), pp. 216-220
Closed Access | Times Cited: 4
Feng Gao, Jingsha He, Shufen Peng, et al.
(2010), pp. 216-220
Closed Access | Times Cited: 4
Trust Based Privacy Protection Method in Pervasive Computing
Feng Gao, Jingsha He, Shunan Ma
Journal of Networks (2012) Vol. 7, Iss. 2
Closed Access | Times Cited: 3
Feng Gao, Jingsha He, Shunan Ma
Journal of Networks (2012) Vol. 7, Iss. 2
Closed Access | Times Cited: 3
STRIDE
Rima Deghaili, Ali Chehab, Ayman Kayssi, et al.
International Journal of Dependable and Trustworthy Information Systems (2010) Vol. 1, Iss. 1, pp. 60-81
Closed Access | Times Cited: 2
Rima Deghaili, Ali Chehab, Ayman Kayssi, et al.
International Journal of Dependable and Trustworthy Information Systems (2010) Vol. 1, Iss. 1, pp. 60-81
Closed Access | Times Cited: 2
Trust Negotiation Systems
Anna Squicciarini
Lecture notes in computer science (2004), pp. 90-99
Closed Access | Times Cited: 3
Anna Squicciarini
Lecture notes in computer science (2004), pp. 90-99
Closed Access | Times Cited: 3
Advanced languages and techniques for trust negotiation.
Stefano Braghin
(2011)
Closed Access | Times Cited: 1
Stefano Braghin
(2011)
Closed Access | Times Cited: 1
A Unified Theory of Trust and Collaboration
Guoray Cai, Anna Squicciarini
Springer eBooks (2009), pp. 425-438
Closed Access | Times Cited: 1
Guoray Cai, Anna Squicciarini
Springer eBooks (2009), pp. 425-438
Closed Access | Times Cited: 1
Vector-Based Sensitive Information Protecting Scheme in Automatic Trust Negotiation
Jianyun Lei, Yanhong Li
Journal of Networks (2014) Vol. 9, Iss. 4
Closed Access
Jianyun Lei, Yanhong Li
Journal of Networks (2014) Vol. 9, Iss. 4
Closed Access
A Framework for Secret Sharing In MultisessionTrust Negotiation
S. Pavithra, R. Jeyanthi
International Journal of Innovative Research in Computer and Communication Engineering (2014) Vol. 2, Iss. 1, pp. 1404-1407
Closed Access
S. Pavithra, R. Jeyanthi
International Journal of Innovative Research in Computer and Communication Engineering (2014) Vol. 2, Iss. 1, pp. 1404-1407
Closed Access