


default search action
7. IFIPTM 2013: Malaga, Spain
- M. Carmen Fernández Gago

, Fabio Martinelli, Siani Pearson
, Isaac Agudo
:
Trust Management VII - 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings. IFIP Advances in Information and Communication Technology 401, Springer 2013, ISBN 978-3-642-38322-9
Full Papers
- Meilof Veeningen, Benne de Weger, Nicola Zannone

:
Symbolic Privacy Analysis through Linkability and Detectability. 1-16 - Alexandre Bouard, Maximilian Graf, Dennis Burgkhardt:

Middleware-Based Security and Privacy for In-car Integration of Third-Party Applications. 17-32 - David W. Chadwick, Mark Hibbert:

Towards Automated Trust Establishment in Federated Identity Management. 33-48 - Tim Muller, Patrick Schweitzer:

On Beta Models with Trust Chains. 49-65 - Hani Alzaid, Manal Alfaraj, Sebastian Ries, Audun Jøsang

, Muneera Albabtain, Alhanof Abuhaimed:
Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review. 66-82 - Sarah Talboom, Jo Pierson:

Understanding Trust within Online Discussion Boards: Trust Formation in the Absence of Reputation Systems. 83-99 - Marianthi Theoharidou, Nikolaos Tsalis, Dimitris Gritzalis:

In Cloud We Trust: Risk-Assessment-as-a-Service. 100-110 - D. Harrison McKnight, Peng Liu:

An Empirical Test of How Events Turn the Cognitive Gears of Trust. 111-126 - Natasha Dwyer

, Anirban Basu, Stephen Marsh:
Reflections on Measuring the Trust Empowerment Potential of a Digital Environment. 127-135 - Henrich Christopher Pöhls:

Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity. 136-150 - Juan Caubet

, Oscar Esparza
, Juanjo Alins, Jorge Mata-Díaz, Miguel Soriano:
Securing Identity Assignment Using Implicit Certificates in P2P Overlays. 151-165 - Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert:

Impact of Dataset Representation on Smartphone Malware Detection Performance. 166-176 - Christian Damsgaard Jensen, Kristine Geneser, Ida C. Willemoes-Wissing:

Sensor Enhanced Access Control: Extending Traditional Access Control Models with Context-Awareness. 177-192 - Simon N. Foley:

Noninterference Analysis of Delegation Subterfuge in Distributed Authorization Systems. 193-207
Short Papers
- Bo Ye, Mohammad Ghavami

, Anjum Pervez, Maziar M. Nekovee
:
An Automatic Trust Calculation Based on the Improved Kalman Filter Detection Algorithm. 208-222 - Jiwan Seo, Seungjin Choi, Sangyong Han:

The Method of Trust and Reputation Systems Based on Link Prediction and Clustering. 223-230 - Alessandro Celestini

, Rocco De Nicola
, Francesco Tiezzi:
Network-Aware Evaluation Environment for Reputation Systems. 231-238 - Pramod S. Pawar, Muttukrishnan Rajarajan, Theo Dimitrakos, Andrea Zisman:

Trust Model for Cloud Based on Cloud Characteristics. 239-246 - Sergiy Gladysh, Peter Herrmann

:
Modeling Reactive Trust Acquisition Using State Transition Systems. 247-254 - Francisco Moyano

, Benoit Baudry, Javier López:
Towards Trust-Aware and Self-adaptive Systems. 255-262 - Kalpana Singh, Lynn Margaret Batten:

An Attack-Resistant Hybrid Data-Privatization Method with Low Information Loss. 263-271 - Marina Egea, Federica Paci, Marinella Petrocchi, Nicola Zannone

:
PERSONA - A Personalized Data Protection Framework. 272-280 - Giampaolo Bella, Rosario Giustolisi

, Gabriele Lenzini:
A Socio-technical Understanding of TLS Certificate Validation. 281-288

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














