


default search action
5. IFIPTM 2011: Copenhagen, Denmark
- Ian Wakeman, Ehud Gudes, Christian Damsgaard Jensen, Jason Crampton:

Trust Management V, 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, Denmark, June 29-July 1, 2011, Proceedings. IFIP Advances in Information and Communication Technology 358, Springer 2011, ISBN 978-3-642-22199-6
Extended Abstracts for Keynote Speakers
- Dieter Gollmann:

From Access Control to Trust Management, and Back - A Petition. 1-8 - Martina Angela Sasse, Iacovos Kirlappos:

Familiarity Breeds Con-victims: Why We Need More Effective Trust Signaling. 9-12 - Pam Briggs

:
The Evolution of Trust. 13-16
Full Papers
- Sini Ruohomaa, Aleksi Hankalahti, Lea Kutvonen

:
Detecting and Reacting to Changes in Reputation Flows. 19-34 - Mark Hoogendoorn

, S. Waqar Jaffry
, Peter-Paul van Maanen:
Validation and Verification of Agent Models for Trust: Independent Compared to Relative Trust. 35-50 - Rachid Saadi, Mohammad Ashiqur Rahaman, Valérie Issarny, Alessandra Toninelli

:
Composing Trust Models towards Interoperable Trust Management. 51-66 - Nurit Gal-Oz, Ran Yahalom, Ehud Gudes:

Identifying Knots of Trust in Virtual Communities. 67-81 - Georgios Pitsilis, Xiangliang Zhang

, Wei Wang:
Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information. 82-97 - Rehab Alnemr, Christoph Meinel:

From Reputation Models and Systems to Reputation Ontologies. 98-116 - Yanbin Lu, Gene Tsudik:

Enhancing Data Privacy in the Cloud. 117-132 - Changyu Dong, Naranker Dulay:

Longitude: A Privacy-Preserving Location Sharing Protocol for Mobile Applications. 133-148 - Karin Leichtenstern, Nikolaus Bee, Elisabeth André, Ulrich Berkmüller, Johannes Wagner:

Physiological Measurement of Trust-Related Behavior in Trust-Neutral and Trust-Critical Situations. 165-172 - Sufatrio, Roland H. C. Yap:

Trusted Principal-Hosted Certificate Revocation. 173-189 - Jin-Hee Cho, Ananthram Swami:

On Tradeoffs between Trust and Survivability Using a Game Theoretic Approach. 190-205 - Zeinab Noorian, Stephen Marsh, Michael W. Fleming:

Prob-Cog: An Adaptive Filtering Model for Trust Evaluation. 206-222 - Benjamin Kellermann, Stefanie Pötzsch, Sandra Steinbrecher:

Privacy-Respecting Reputation for Wiki Users. 223-239
Short Papers
- Huong Ha:

Security and Privacy in E-consumer Protection in Victoria, Australia. 240-252 - Amir Seyedi, Rachid Saadi, Valérie Issarny:

Proximity-Based Trust Inference for Mobile Social Networking. 253-264 - Moonjeong Chang, Ing-Ray Chen, Fenye Bao, Jin-Hee Cho:

Trust-Threshold Based Routing in Delay Tolerant Networks. 265-276 - Ji Guo, Alan Marshall, Bosheng Zhou:

A Trust Management Framework for Detecting Malicious and Selfish Behaviour in Ad-Hoc Wireless Networks Using Fuzzy Sets and Grey Theory. 277-289 - Sakshi Porwal, Srijith K. Nair, Theo Dimitrakos:

Regulatory Impact of Data Protection and Privacy in the Cloud. 290-299 - Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård:

Assessment of the Trustworthiness of Digital Records. 300-311 - Audun Jøsang

, Walter Quattrociocchi
, Dino Karabeg:
Taste and Trust. 312-322 - Olufunmilola Oladunni Onolaja, Rami Bahsoon, Georgios Theodoropoulos

:
Trust Dynamics: A Data-Driven Simulation Approach. 323-334

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














