


default search action
9. IFIPTM 2015: Hamburg, Germany
- Christian Damsgaard Jensen, Stephen Marsh, Theo Dimitrakos

, Yuko Murayama:
Trust Management IX - 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology 454, Springer 2015, ISBN 978-3-319-18490-6
Winsborough Award Invited Paper
- Ehud Gudes:

Reputation - from Social Perception to Internet Security. 3-10
Full Papers
- Md. Sadek Ferdous

, Gethin Norman
, Audun Jøsang
, Ron Poet:
Mathematical Modelling of Trust Issues in Federated Identity Management. 13-29 - Yongzheng Wu, Roland H. C. Yap:

Simple and Practical Integrity Models for Binaries and Files. 30-46 - Nikos Fotiou, George C. Polyzos

:
Enabling NAME-Based Security and Trust. 47-59 - Thibaud Antignac, Daniel Le Métayer:

Trust Driven Strategies for Privacy by Design. 60-75 - Anirban Basu, Juan Camilo Corena, Jaideep Vaidya, Jon Crowcroft

, Shinsaku Kiyomoto, Stephen Marsh, Yung Shin Van Der Sype, Toru Nakamura:
Lightweight Practical Private One-Way Anonymous Messaging. 76-91 - Paul Lajoie-Mazenc, Emmanuelle Anceaume, Gilles Guette, Thomas Sirvent, Valérie Viet Triem Tong:

Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings. 92-108 - Jamal Ali Hussein

, Luc Moreau
, Vladimiro Sassone:
Obscuring Provenance Confidential Information via Graph Transformation. 109-125 - Natasha Dwyer

, Stephen Marsh:
Social Network Culture Needs the Lens of Critical Trust Research. 126-133 - Archana Nottamkandath, Jasper Oosterman, Davide Ceolin

, Gerben Klaas Dirk de Vries, Wan J. Fokkink
:
Predicting Quality of Crowdsourced Annotations Using Graph Kernels. 134-148 - Andrew Wong, Vicky Liu

, William J. Caelli, Tony Sahama:
An Architecture for Trustworthy Open Data Services. 149-162
Short Papers
- Ijlal Loutfi, Audun Jøsang

:
1, 2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space. 165-176 - Alexandru Butoi, Mircea Moca, Nicolae Tomai:

Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation. 177-184 - Natasha Dwyer

, Stephen Marsh:
The Detail of Trusted Messages: Retweets in a Context of Health and Fitness. 185-194 - Johannes Sänger, Christian Richthammer, Artur Rösch, Günther Pernul:

Reusable Defense Components for Online Reputation Systems. 195-202 - Jingjing Guo, Christian Damsgaard Jensen

, Jianfeng Ma:
Continuous Context-Aware Device Comfort Evaluation Method. 203-211
Special Session: Toward Trusted Cloud Ecosystems
- Theo Dimitrakos

:
Foreword: Towards Trusted Cloud Ecosystems. 215-216 - Panagiotis Gouvas, Konstantinos Kalaboukas, Giannis Ledakis, Theo Dimitrakos

, Joshua Daniel, Gery Ducatel, Nuria Rodriguez Dominguez:
A Cloud Orchestrator for Deploying Public Services on the Cloud - The Case of STRATEGIC Project. 217-225 - Joshua Daniel, Fadi Ali El-Moussa, Gery Ducatel, Pramod S. Pawar, Ali Sajjad, Robert Rowlingson, Theo Dimitrakos

:
Integrating Security Services in Cloud Service Stores. 226-239 - Michele Vescovi, Corrado Moiso, Mattia Pasolli, Lorenzo Cordin, Fabrizio Antonelli:

Building an Eco-System of Trusted Services via User Control and Transparency on Personal Data. 240-250 - Pramod S. Pawar, Ali Sajjad, Theo Dimitrakos

, David W. Chadwick
:
Security-as-a-Service in Multi-cloud and Federated Cloud Environments. 251-261 - Ana Juan Ferrer, Enric Pages i Montanera:

The Role of SLAs in Building a Trusted Cloud for Europe. 262-275

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














