Table of Contents
|
Trust Management V Ian Wakeman, Ehud Gudes, Christian Jensen, Jason Crampton (Eds.)
|
Front Matter |
Extended Abstracts for Keynote Speakers
|
From Access Control to Trust Management, and Back – A Petition Dieter Gollmann |
1-8 |
Familiarity Breeds Con-victims: Why We Need More Effective Trust Signaling M. Sasse, Iacovos Kirlappos |
9-12 |
The Evolution of Trust Pam Briggs |
13-16 |
Trust and Social Intelligence Toshio Yamagishi |
17-18 |
Full Papers
|
Detecting and Reacting to Changes in Reputation Flows Sini Ruohomaa, Aleksi Hankalahti, Lea Kutvonen |
19-34 |
Validation and Verification of Agent Models for Trust: Independent Compared to Relative Trust Mark Hoogendoorn, S. Jaffry, Peter-Paul Maanen |
35-50 |
Composing Trust Models towards Interoperable Trust Management Rachid Saadi, Mohammad Ashiqur Rahaman,, Valérie Issarny, Alessandra Toninelli |
51-66 |
Identifying Knots of Trust in Virtual Communities Nurit Gal-Oz, Ran Yahalom, Ehud Gudes |
67-81 |
Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information Georgios Pitsilis, Xiangliang Zhang, Wei Wang |
82-97 |
From Reputation Models and Systems to Reputation Ontologies Rehab Alnemr, Christoph Meinel |
98-116 |
Enhancing Data Privacy in the Cloud Yanbin Lu, Gene Tsudik |
117-132 |
Longitude: A Privacy-Preserving Location Sharing Protocol for Mobile Applications Changyu Dong, Naranker Dulay |
133-148 |
An Empirical Evaluation of the Compliance of Game-Network Providers with Data-Protection Law Karin Leichtenstern, Nikolaus Bee, Elisabeth André, Ulrich Berkmüller, Johannes Wagner |
149-164 |
Physiological Measurement of Trust-Related Behavior in Trust-Neutral and Trust-Critical Situations Karin Leichtenstern, Nikolaus Bee, Elisabeth André, Ulrich Berkmüller, Johannes Wagner |
165-172 |
Trusted Principal-Hosted Certificate Revocation T. Sufatrio, Roland Yap |
173-189 |
On Tradeoffs between Trust and Survivability Using a Game Theoretic Approach Jin-Hee Cho, Ananthram Swami |
190-205 |
Prob-Cog: An Adaptive Filtering Model for Trust Evaluation Zeinab Noorian, Stephen Marsh, Michael Fleming |
206-222 |
Privacy-Respecting Reputation for Wiki Users Benjamin Kellermann, Stefanie Pötzsch, Sandra Steinbrecher |
223-239 |
Short Papers
|
Security and Privacy in E-consumer Protection in Victoria, Australia Huong Ha |
240-252 |
Proximity-Based Trust Inference for Mobile Social Networking Amir Seyedi, Rachid Saadi, Valérie Issarny |
253-264 |
Trust-Threshold Based Routing in Delay Tolerant Networks Moonjeong Chang, Ing-Ray Chen, Fenye Bao, Jin-Hee Cho |
265-276 |
A Trust Management Framework for Detecting Malicious and Selfish Behaviour in Ad-Hoc Wireless Networks Using Fuzzy Sets and Grey Theory Ji Guo, Alan Marshall, Bosheng Zhou |
277-289 |
Regulatory Impact of Data Protection and Privacy in the Cloud Sakshi Porwal, Srijith Nair, Theo Dimitrakos |
290-299 |
Assessment of the Trustworthiness of Digital Records Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård |
300-311 |
Taste and Trust Audun Jøsang, Walter Quattrociocchi, Dino Karabeg |
312-322 |
Trust Dynamics: A Data-Driven Simulation Approach Olufunmilola Onolaja, Rami Bahsoon, Georgios Theodoropoulos |
323-334 |