


default search action
2. iTrust 2004: Oxford, UK
- Christian Damsgaard Jensen

, Stefan Poslad, Theodosis Dimitrakos
:
Trust Management, Second International Conference, iTrust 2004, Oxford, UK, March 29 - April 1, 2004, Proceedings. Lecture Notes in Computer Science 2995, Springer 2004, ISBN 3-540-21312-0
Keynote Addresses
- Ian Walden:

Addressing the Data Problem: The Legal Framework Governing Forensics in an Online Environment. 1-15 - Andrzej Uszok

, Jeffrey M. Bradshaw
, Renia Jeffers:
KAoS: A Policy and Domain Services Framework for Grid Computing and Semantic Web Services. 16-26 - Massimo Marchiori:

W5: The Five W's of the World Wide Web. 27-32
Full Papers
- Philipp Obreiter:

A Case for Evidence-Aware Distributed Reputation Systems: Overcoming the Limitations of Plausibility Considerations. 33-47 - Jinshan Liu, Valérie Issarny:

Enhanced Reputation Mechanism for Mobile Ad Hoc Networks. 48-62 - Alberto Fernandes, Evangelos Kotsovinos, Sven Östring, Boris Dragovic:

Pinocchio: Incentives for Honest Participation in Distributed Trust Management. 63-77 - Laurent Bussard, Refik Molva, Yves Roudier:

History-Based Signature or How to Trust Anonymous Documents. 78-92 - Jean-Marc Seigneur

, Christian Damsgaard Jensen:
Trading Privacy for Trust. 93-107 - Elan Pavlov, Jeffrey S. Rosenschein, Zvi Topol:

Supporting Privacy in Decentralized Additive Reputation Systems. 108-119 - Colin English, Sotirios Terzis

, Waleed Wagealla:
Engineering Trust Based Collaborations in a Global Computing Environment. 120-134 - Audun Jøsang

, Stéphane Lo Presti:
Analysing the Relationship between Risk and Trust. 135-145 - Gyrd Brændeland, Ketil Stølen:

Using Risk Analysis to Assess User Trust: A Net-Bank Scenario. 146-160 - Paul Ruth

, Dongyan Xu, Bharat K. Bhargava, Fred Regnier:
E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities. 161-175 - Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone

:
Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning. 176-190 - Ivan Djordjevic, Theodosis Dimitrakos:

Towards Dynamic Security Perimeters for Virtual Collaborative Networks. 191-205 - Catholijn M. Jonker, Joost J. P. Schalken, Jan Theeuwes

, Jan Treur
:
Human Experiments in Trust Dynamics. 206-220 - Paolo Massa

, Bobby Bhattacharjee:
Using Trust in Recommender Systems: An Experimental Analysis. 221-235 - Yao-Hua Tan, Walter Thoen, Jaap Gordijn:

Modeling Controls for Dynamic Value Exchanges in Virtual Organizations. 236-250 - Cai-Nicolas Ziegler, Georg Lausen:

Analyzing Correlation between Trust and User Similarity in Online Communities. 251-265 - Tanko Ishaya

, Darren P. Mundy:
Trust Development and Management in Virtual Communities. 266-276 - Michael Grimsley, Anthony Meehan, Anna Tan:

Managing Internet-Mediated Community Trust Relations. 277-290 - Robert Demolombe:

Reasoning About Trust: A Formal Logical Framework. 291-303 - Cristiano Castelfranchi:

Trust Mediation in Knowledge Management and Sharing. 304-318 - Adrian Baldwin:

Enhanced Accountability for Electronic Processes. 319-332
Short Papers and Experience Reports
- Michael J. Butler, Michael Leuschel, Stéphane Lo Presti, Phillip Turner:

The Use of Formal Methods in the Analysis of Trust (Position Paper). 333-339 - Piotr Cofta

:
Computing Recommendations to Trust. 340-346 - Charles B. Haley, Robin C. Laney

, Jonathan D. Moffett, Bashar Nuseibeh
:
Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements. 347-354 - Philip Robinson, Jochen Haller, Roger Kilian-Kehr:

Towards Trust Relationship Planning for Virtual Organizations. 355-361 - Matteo Gaeta

, Giuseppe Laria, Pierluigi Ritrovato, N. Romano, Bassem Serhan, Stefan Wesner
, Theodosis Dimitrakos, Damian Mac Randal:
Trust, Security, and Contract Management Challenges for Grid-Based Application Service Provision. 362-368 - Brian Matthews

, Theodosis Dimitrakos:
Deploying Trust Policies on the Semantic Web. 369-375

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














