IFIP TC6 Open Digital Library

2. IFIPTM 2008: Trondheim, Norway

Trust Management II - Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway

Yücel Karabulut, John Mitchell, Peter Herrmann, Christian Damsgaard Jensen

Springer, IFIP Advances in Information and Communication Technology 263, ISBN: 978-0-387-09427-4



Contents

Trust Management in P2P Systems Using Standard TuLiP.

Marcin Czenko, Jeroen Doumen, Sandro Etalle

 1-16

A Trust Evaluation Method Based on Logic and Probability Theory.

Reto Kohlas, Jacek Jonczy, Rolf Haenni

 17-32

A UML-based Method for the Development of Policies to Support Trust Management.

Atle Refsdal, Bjørnar Solhaug, Ketil Stølen

 33-49

Analyzing the Robustness of CertainTrust.

Sebastian Ries, Andreas Heinemann

 51-67

An Intensional Functional Model of Trust.

Kaiyu Wan, Vasu S. Alagar

 69-85

A Translation Mechanism for Recommendations.

Pierpaolo Dondio, Luca Longo, Stephen Barrett

 87-102

Modeling Trust for Recommender Systems using Similarity Metrics.

Georgios Pitsilis, Lindsay F. Marshall

 103-118

Trust-Based Collaborative Filtering.

Neal Lathia, Stephen Hailes, Licia Capra

 119-134

SOFIA: Social Filtering for Robust Recommendations.

Matteo Dell'Amico, Licia Capra

 135-150

Continuous Ratings in Discrete Bayesian Reputation Systems.

Audun Jøsang, Xixi Luo, Xiaowu Chen

 151-166

A Robust and Knot-Aware Trust-Based Reputation Model.

Nurit Gal-Oz, Ehud Gudes, Danny Hendler

 167-182

The North Laine Shopping Guide: A Case Study in Modelling Trust in Applications.

Jon Robinson, Ian Wakeman, Dan Chalmers, Anirban Basu

 183-197

Cooperation in Growing Communities.

Rowan Martin-Hughes

 199-214

A Model for Reasoning About the Privacy Impact of Composite Service Execution in Pervasive Computing.

Roberto Speicys Cardoso, Valérie Issarny

 215-230

Protecting Location Privacy through Semantics-aware Obfuscation Techniques.

Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri

 231-245

Privacy2.0: Towards Collaborative Data-Privacy Protection.

Erik Buchmann, Klemens Böhm, Oliver Raabe

 247-262

Automatic Verification of Privacy Properties in the Applied pi Calculus.

Stéphanie Delaune, Mark Ryan, Ben Smyth

 263-278

Place and Time Authentication of Cultural Assets.

Leonardo Mostarda, Changyu Dong, Naranker Dulay

 279-294

A Lightweight Binary Authentication System for Windows.

Felix Halim, Rajiv Ramnath, Sufatrio, Yongzheng Wu, Roland H. C. Yap

 295-310

Towards Standards-Compliant Trust Negotiation for Web Services.

Adam J. Lee, Marianne Winslett

 311-326

Assigning Responsibility for Failed Obligations.

Keith Irwin, Ting Yu, William H. Winsborough

 327-342

Role- and Relationship-Based Identity Management for Private yet Accountable E-Learning.

Mohd M. Anwar, Jim E. Greer

 343-358

Using Rummble as a Personalised Travel Guide.

Clive Cox

 359-362

An Inline Monitoring System for .NET Mobile Devices.

Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka

 363-366

STORE Stochastic Reputation Service for Virtual Organisations.

Jochen Haller

 367-370