Table of Contents
|
Trust Management VI Theo Dimitrakos, Rajat Moona, Dhiren Patel, D. Harrison McKnight (Eds.)
|
Front Matter |
Full Papers
|
Co-evolving Trust Mechanisms for Catering User Behavior Tanja Ažderska |
1-16 |
Perturbation Based Privacy Preserving Slope One Predictors for Collaborative Filtering Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi |
17-35 |
Robustness of Trust Models and Combinations for Handling Unfair Ratings Lizi Zhang, Siwei Jiang, Jie Zhang, Wee Ng |
36-51 |
A Provenance-Based Trust Model for Delay Tolerant Networks Jin-Hee Cho, Moonjeong Chang, Ing-Ray Chen, Ananthram Swami |
52-67 |
Trust Transitivity and Conditional Belief Reasoning Audun Josang, Tanja Ažderska, Stephen Marsh |
68-83 |
Incorporating Honeypot for Intrusion Detection in Cloud Infrastructure Bhavesh Borisaniya, Avi Patel, Dhiren Patel, Hiren Patel |
84-96 |
Trust Model for Optimized Cloud Services P. Pawar, M. Rajarajan, S. Nair, A. Zisman |
97-112 |
Post-Session Authentication Naveed Ahmed, Christian Jensen |
113-128 |
An Efficient Approach for Privacy Preserving Distributed K-Means Clustering Based on Shamir’s Secret Sharing Scheme Sankita Patel, Sweta Garasia, Devesh Jinwala |
129-141 |
From Subjective Reputation to Verifiable Experiences — Augmenting Peer-Control Mechanisms for Open Service Ecosystems Sini Ruohomaa, Puneet Kaur, Lea Kutvonen |
142-157 |
Integrating Indicators of Trustworthiness into Reputation-Based Trust Models Sascha Hauke, Florian Volk, Sheikh Habib, Max Mühlhäuser |
158-173 |
Finding Trusted Publish/Subscribe Trees Stephen Naicken, Ian Wakeman, Dan Chalmers |
174-190 |
Short Papers
|
Rendering unto Cæsar the Things That Are Cæsar’s: Complex Trust Models and Human Understanding Stephen Marsh, Anirban Basu, Natasha Dwyer |
191-200 |
Trust Management Framework for Attenuation of Application Layer DDoS Attack in Cloud Computing Dipen Contractor, Dhiren Patel |
201-208 |
An Incentive Mechanism to Promote Honesty in E-marketplaces with Limited Inventory Yuan Liu, Jie Zhang, Qin Li |
209-216 |
How Events Affect Trust: A Baseline Information Processing Model with Three Extensions D. Mcknight, Peng Liu, Brian Pentland |
217-224 |
Improvements over Extended LMAP+: RFID Authentication Protocol Jitendra Gurubani, Harsh Thakkar, Dhiren Patel |
225-231 |
Automated Evaluation of Annotators for Museum Collections Using Subjective Logic Davide Ceolin, Archana Nottamkandath, Wan Fokkink |
232-239 |
A New Data Integrity Checking Protocol with Public Verifiability in Cloud Storage Mihir Gohel, Bhavesh Gohil |
240-246 |
Document and Author Promotion Strategies in the Secure Wiki Model Kasper Lindberg, Christian Jensen |
247-252 |
Invited Keynote Papers
|
Robustness of Trust and Reputation Systems: Does It Matter? Audun Josang |
253-262 |
transCryptFS: A Trusted and Secure File System Rajat Moona |
263-263 |
Operational Challenges in Deploying Trust Management Systems - A Practical Perspective Sundeep Oberoi |
264-266 |
A Perspective on the Evolution of the International Trust Management Research Community in the Last Decade Theo Dimitrakos |
267-280 |