


default search action
4. iTrust 2006: Pisa, Italy
- Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio Massacci:

Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings. Lecture Notes in Computer Science 3986, Springer 2006, ISBN 3-540-34295-8
Invited Talks
- Cristiano Castelfranchi:

Why We Need a Non-reductionist Approach to Trust. 1-2
Full Papers
- Mehran Ahsant, Mike Surridge, Thomas Leonard, Ananth Krishna, Olle Mulmo:

Dynamic Trust Federation in Grids. 3-18 - Cristiano Castelfranchi, Rino Falcone, Francesca Marzo:

Being Trusted in a Social Network: Trust as Relational Capital. 19-32 - Suroop Mohan Chandran, Korporn Panyim

, James B. D. Joshi:
A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments. 33-47 - Dag Elgesem:

Normative Structures in Trust Management. 48-61 - Colin English, Sotirios Terzis

:
Gathering Experience in Trust-Based Interactions. 62-76 - Noria Foukia, Li Zhou, B. Clifford Neuman:

Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail. 77-92 - Jennifer Golbeck:

Generating Predictive Movie Recommendations from Trust in Social Networks. 93-104 - Peter Herrmann

:
Temporal Logic-Based Specification and Verification of Trust Models. 105-119 - Gert Jan Hofstede

, Catholijn M. Jonker, Sebastiaan A. Meijer
, Tim Verwaart:
Modelling Trade and Trust Across Cultures. 120-134 - Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray:

Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. 135-149 - Christian Damsgaard Jensen, Paul O'Connell:

Trust-Based Route Selection in Dynamic Source Routing. 150-163 - Jacek Jonczy, Rolf Haenni:

Implementing Credential Networks. 164-178 - Audun Jøsang

, Stephen Marsh, Simon Pope:
Exploring Different Types of Trust Propagation. 179-192 - Florian Kerschbaum, Jochen Haller, Yücel Karabulut, Philip Robinson:

PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation. 193-205 - Tomas Klos, Han La Poutré:

A Versatile Approach to Combining Trust Values for Making Binary Decisions. 206-220 - Evangelos Kotsovinos, Petros Zerfos, Nischal M. Piratla, Niall Cameron, Sachin Agarwal:

Jiminy: A Scalable Incentive-Based Architecture for Improving Rating Quality. 221-235 - Adam J. Lee, Marianne Winslett:

Virtual Fingerprinting as a Foundation for Reputation in Open Systems. 236-251 - Siani Pearson

:
Towards Automated Evaluation of Trust Constraints. 252-266 - Siani Pearson

, Marco Casassa Mont
:
Provision of Trusted Identity Management Using Trust Credentials. 267-282 - Wolter Pieters:

Acceptance of Voting Technology: Between Confidence and Trust. 283-297 - Daniele Quercia, Stephen Hailes, Licia Capra:

B-Trust: Bayesian Trust Framework for Pervasive Computing. 298-312 - Daniele Quercia, Stephen Hailes, Licia Capra:

TATA: Towards Anonymous Trusted Authentication. 313-323 - Karl Quinn, Declan O'Sullivan

, David Lewis
, Vincent P. Wade:
The Design, Generation, and Utilisation of a Semantically Rich Personalised Model of Trust. 324-338 - Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya:

A Trust Assignment Model Based on Alternate Actions Payoff. 339-353 - Giovanni Sartor:

Privacy, Reputation, and Trust: Some Implications for Data Protection. 354-366 - Christoph Sorge, Martina Zitterbart:

A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks. 367-381 - Jonathan Traupman, Robert Wilensky:

Robust Reputations for Peer-to-Peer Marketplaces. 382-396 - Asimina Vasalou

, Jeremy Pitt, Guillaume Piolle:
From Theory to Practice: Forgiveness as a Mechanism to Repair Conflicts in CMC. 397-411 - Kouki Yonezawa:

A Novel Protocol for Communicating Reputation in P2P Networks. 412-422 - Xiaoqing Zheng, Zhaohui Wu, Huajun Chen, Yuxin Mao:

A Scalable Probabilistic Approach to Trust Evaluation. 423-438
Demonstration Overviews
- Karen Fullam, Tomas Klos, Guillaume Muller, Jordi Sabater-Mir, K. Suzanne Barber, Laurent Vercouter:

The Agent Reputation and Trust (ART) Testbed. 439-442 - Laurent Gomez, Ulrich Jansen:

Trust Establishment in Emergency Case. 443-448 - Jacek Jonczy:

Evaluating Trust and Authenticity with Caution. 449-453 - Evangelos Kotsovinos, Petros Zerfos, Nischal M. Piratla, Niall Cameron:

Using Jiminy for Run-Time User Classification Based on Rating Behaviour. 454-457 - Adam J. Lee, Marianne Winslett, Jim Basney

, Von Welch:
Traust: A Trust Negotiation Based Authorization Service. 458-462 - Philipp Obreiter, Birgitta König-Ries

:
The Interactive Cooperation Tournament. 463-466 - Judith E. Y. Rossebø, Scott Cadzow, Paul Sijben:

eTVRA, a Threat, Vulnerability and Risk Assessment Tool for eEurope. 467-471

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














