


default search action
10. IFIPTM 2016: Darmstadt, Germany
- Sheikh Mahbub Habib, Julita Vassileva, Sjouke Mauw, Max Mühlhäuser:
Trust Management X - 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings. IFIP Advances in Information and Communication Technology 473, Springer 2016, ISBN 978-3-319-41353-2
Willam Winsborough Award Invited Paper
- Simone Fischer-Hübner, Julio Angulo, Farzaneh Karegar, Tobias Pulls:
Transparency, Privacy and Trust - Technology for Tracking and Controlling My Data Disclosures: Does This Work? 3-14
Full Papers
- Tim Muller, Dongxia Wang, Yang Liu
, Jie Zhang:
How to Use Information Theory to Mitigate Unfair Rating Attacks. 17-32 - Nazila Gol Mohammadi, Maritta Heisel:
Enhancing Business Process Models with Trustworthiness Requirements. 33-51 - Anirban Basu, Stephen Marsh, Mohammad Shahriar Rahman
, Shinsaku Kiyomoto:
A Model for Personalised Perception of Policies. 52-62 - Fatbardh Veseli
, Jetzabel M. Serna:
Evaluation of Privacy-ABC Technologies - a Study on the Computational Efficiency. 63-78 - Saghar Behrooz, Stephen Marsh:
A Trust-Based Framework for Information Sharing Between Mobile Health Care Applications. 79-95 - Torsten Bandyszak, Micha Moffie, Abigail Goldsteen, Panos Melas, Bassem I. Nasser, Costas Kalogiros, Gabriele Barni, Sandro Hartenstein, Giorgos Giotis, Thorsten Weyer:
Supporting Coordinated Maintenance of System Trustworthiness and User Trust at Runtime. 96-112 - Tim Muller, Yang Liu
, Jie Zhang:
Limitations on Robust Ratings and Predictions. 113-126
Short Papers
- Félix Gómez Mármol
, Manuel Gil Pérez
, Gregorio Martínez Pérez:
I Don't Trust ICT: Research Challenges in Cyber Security. 129-136 - Stephen Marsh, Mark R. Dibben
, Natasha Dwyer:
The Wisdom of Being Wise: A Brief Introduction to Computational Wisdom. 137-145 - Wenjuan Li
, Lijun Jiang, Weizhi Meng
, Lam-for Kwok
:
Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation. 146-153 - Christian Johansen
, Tore Pedersen
, Audun Jøsang
:
Towards Behavioural Computer Science. 154-163 - Marc Sel:
Improving Interpretations of Trust Claims. 164-173 - Jörg Kebbedies, Felix Kluge, Iris Braun, Alexander Schill:
Trust and Regulation Conceptualisation: The Foundation for User-Defined Cloud Policies. 174-182 - Giuseppe Primiero
:
A Calculus for Distrust and Mistrust. 183-190

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.