index - Trust Management V Access content directly
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Trust Management V
Ian Wakeman, Ehud Gudes, Christian Jensen, Jason Crampton (Eds.)
Front Matter

Extended Abstracts for Keynote Speakers


From Access Control to Trust Management, and Back – A Petition
Dieter Gollmann
1-8
Familiarity Breeds Con-victims: Why We Need More Effective Trust Signaling
M. Sasse, Iacovos Kirlappos
9-12
The Evolution of Trust
Pam Briggs
13-16
Trust and Social Intelligence
Toshio Yamagishi
17-18

Full Papers


Detecting and Reacting to Changes in Reputation Flows
Sini Ruohomaa, Aleksi Hankalahti, Lea Kutvonen
19-34
Validation and Verification of Agent Models for Trust: Independent Compared to Relative Trust
Mark Hoogendoorn, S. Jaffry, Peter-Paul Maanen
35-50
Composing Trust Models towards Interoperable Trust Management
Rachid Saadi, Mohammad Ashiqur Rahaman,, Valérie Issarny, Alessandra Toninelli
51-66
Identifying Knots of Trust in Virtual Communities
Nurit Gal-Oz, Ran Yahalom, Ehud Gudes
67-81
Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information
Georgios Pitsilis, Xiangliang Zhang, Wei Wang
82-97
From Reputation Models and Systems to Reputation Ontologies
Rehab Alnemr, Christoph Meinel
98-116
Enhancing Data Privacy in the Cloud
Yanbin Lu, Gene Tsudik
117-132
Longitude: A Privacy-Preserving Location Sharing Protocol for Mobile Applications
Changyu Dong, Naranker Dulay
133-148
An Empirical Evaluation of the Compliance of Game-Network Providers with Data-Protection Law
Karin Leichtenstern, Nikolaus Bee, Elisabeth André, Ulrich Berkmüller, Johannes Wagner
149-164
Physiological Measurement of Trust-Related Behavior in Trust-Neutral and Trust-Critical Situations
Karin Leichtenstern, Nikolaus Bee, Elisabeth André, Ulrich Berkmüller, Johannes Wagner
165-172
Trusted Principal-Hosted Certificate Revocation
T. Sufatrio, Roland Yap
173-189
On Tradeoffs between Trust and Survivability Using a Game Theoretic Approach
Jin-Hee Cho, Ananthram Swami
190-205
Prob-Cog: An Adaptive Filtering Model for Trust Evaluation
Zeinab Noorian, Stephen Marsh, Michael Fleming
206-222
Privacy-Respecting Reputation for Wiki Users
Benjamin Kellermann, Stefanie Pötzsch, Sandra Steinbrecher
223-239

Short Papers


Security and Privacy in E-consumer Protection in Victoria, Australia
Huong Ha
240-252
Proximity-Based Trust Inference for Mobile Social Networking
Amir Seyedi, Rachid Saadi, Valérie Issarny
253-264
Trust-Threshold Based Routing in Delay Tolerant Networks
Moonjeong Chang, Ing-Ray Chen, Fenye Bao, Jin-Hee Cho
265-276
A Trust Management Framework for Detecting Malicious and Selfish Behaviour in Ad-Hoc Wireless Networks Using Fuzzy Sets and Grey Theory
Ji Guo, Alan Marshall, Bosheng Zhou
277-289
Regulatory Impact of Data Protection and Privacy in the Cloud
Sakshi Porwal, Srijith Nair, Theo Dimitrakos
290-299
Assessment of the Trustworthiness of Digital Records
Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård
300-311
Taste and Trust
Audun Jøsang, Walter Quattrociocchi, Dino Karabeg
312-322
Trust Dynamics: A Data-Driven Simulation Approach
Olufunmilola Onolaja, Rami Bahsoon, Georgios Theodoropoulos
323-334

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/