default search action
5. IFIPTM 2011: Copenhagen, Denmark
- Ian Wakeman, Ehud Gudes, Christian Damsgaard Jensen, Jason Crampton:
Trust Management V, 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, Denmark, June 29-July 1, 2011, Proceedings. IFIP Advances in Information and Communication Technology 358, Springer 2011, ISBN 978-3-642-22199-6
Extended Abstracts for Keynote Speakers
- Dieter Gollmann:
From Access Control to Trust Management, and Back - A Petition. 1-8 - Martina Angela Sasse, Iacovos Kirlappos:
Familiarity Breeds Con-victims: Why We Need More Effective Trust Signaling. 9-12 - Pam Briggs:
The Evolution of Trust. 13-16
Full Papers
- Sini Ruohomaa, Aleksi Hankalahti, Lea Kutvonen:
Detecting and Reacting to Changes in Reputation Flows. 19-34 - Mark Hoogendoorn, S. Waqar Jaffry, Peter-Paul van Maanen:
Validation and Verification of Agent Models for Trust: Independent Compared to Relative Trust. 35-50 - Rachid Saadi, Mohammad Ashiqur Rahaman, Valérie Issarny, Alessandra Toninelli:
Composing Trust Models towards Interoperable Trust Management. 51-66 - Nurit Gal-Oz, Ran Yahalom, Ehud Gudes:
Identifying Knots of Trust in Virtual Communities. 67-81 - Georgios Pitsilis, Xiangliang Zhang, Wei Wang:
Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information. 82-97 - Rehab Alnemr, Christoph Meinel:
From Reputation Models and Systems to Reputation Ontologies. 98-116 - Yanbin Lu, Gene Tsudik:
Enhancing Data Privacy in the Cloud. 117-132 - Changyu Dong, Naranker Dulay:
Longitude: A Privacy-Preserving Location Sharing Protocol for Mobile Applications. 133-148 - Karin Leichtenstern, Nikolaus Bee, Elisabeth André, Ulrich Berkmüller, Johannes Wagner:
Physiological Measurement of Trust-Related Behavior in Trust-Neutral and Trust-Critical Situations. 165-172 - Sufatrio, Roland H. C. Yap:
Trusted Principal-Hosted Certificate Revocation. 173-189 - Jin-Hee Cho, Ananthram Swami:
On Tradeoffs between Trust and Survivability Using a Game Theoretic Approach. 190-205 - Zeinab Noorian, Stephen Marsh, Michael W. Fleming:
Prob-Cog: An Adaptive Filtering Model for Trust Evaluation. 206-222 - Benjamin Kellermann, Stefanie Pötzsch, Sandra Steinbrecher:
Privacy-Respecting Reputation for Wiki Users. 223-239
Short Papers
- Huong Ha:
Security and Privacy in E-consumer Protection in Victoria, Australia. 240-252 - Amir Seyedi, Rachid Saadi, Valérie Issarny:
Proximity-Based Trust Inference for Mobile Social Networking. 253-264 - Moonjeong Chang, Ing-Ray Chen, Fenye Bao, Jin-Hee Cho:
Trust-Threshold Based Routing in Delay Tolerant Networks. 265-276 - Ji Guo, Alan Marshall, Bosheng Zhou:
A Trust Management Framework for Detecting Malicious and Selfish Behaviour in Ad-Hoc Wireless Networks Using Fuzzy Sets and Grey Theory. 277-289 - Sakshi Porwal, Srijith K. Nair, Theo Dimitrakos:
Regulatory Impact of Data Protection and Privacy in the Cloud. 290-299 - Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård:
Assessment of the Trustworthiness of Digital Records. 300-311 - Audun Jøsang, Walter Quattrociocchi, Dino Karabeg:
Taste and Trust. 312-322 - Olufunmilola Oladunni Onolaja, Rami Bahsoon, Georgios Theodoropoulos:
Trust Dynamics: A Data-Driven Simulation Approach. 323-334
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.