Table of Contents
|
Book Title (Part xxx) Scientific Editor 1, Scientific Editor2 (Eds.)
|
Front Matter |
Full Papers
|
Symbolic Privacy Analysis through Linkability and Detectability Meilof Veeningen, Benne Weger, Nicola Zannone |
1-16 |
Middleware-Based Security and Privacy for In-car Integration of Third-Party Applications Alexandre Bouard, Maximilian Graf, Dennis Burgkhardt |
17-32 |
Towards Automated Trust Establishment in Federated Identity Management David Chadwick, Mark Hibbert |
33-48 |
On Beta Models with Trust Chains Tim Muller, Patrick Schweitzer |
49-65 |
Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review Hani Alzaid, Manal Alfaraj, Sebastian Ries, Audun Jøsang, Muneera Albabtain, Alhanof Abuhaimed |
66-82 |
Understanding Trust within Online Discussion Boards: Trust Formation in the Absence of Reputation Systems Sarah Talboom, Jo Pierson |
83-99 |
In Cloud We Trust: Risk-Assessment-as-a-Service Marianthi Theoharidou, Nikolaos Tsalis, Dimitris Gritzalis |
100-110 |
An Empirical Test of How Events Turn the Cognitive Gears of Trust D. Mcknight, Peng Liu |
111-126 |
Reflections on Measuring the Trust Empowerment Potential of a Digital Environment Natasha Dwyer, Anirban Basu, Stephen Marsh |
127-135 |
Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity Henrich Pöhls |
136-150 |
Securing Identity Assignment Using Implicit Certificates in P2P Overlays Juan Caubet, Oscar Esparza, Juanjo Alins, Jorge Mata-Díaz, Miguel Soriano |
151-165 |
Impact of Dataset Representation on Smartphone Malware Detection Performance Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert |
166-176 |
Sensor Enhanced Access Control: Extending Traditional Access Control Models with Context-Awareness Christian Jensen, Kristine Geneser, Ida Willemoes-Wissing |
177-192 |
Noninterference Analysis of Delegation Subterfuge in Distributed Authorization Systems Simon Foley |
193-207 |
Short Papers
|
An Automatic Trust Calculation Based on the Improved Kalman Filter Detection Algorithm Bo Ye, Mohammad Ghavami, Anjum Pervez, Maziar Nekovee |
208-222 |
The Method of Trust and Reputation Systems Based on Link Prediction and Clustering Jiwan Seo, Seungjin Choi, Sangyong Han |
223-230 |
Network-Aware Evaluation Environment for Reputation Systems Alessandro Celestini, Rocco Nicola, Francesco Tiezzi |
231-238 |
Trust Model for Cloud Based on Cloud Characteristics Pramod Pawar, Muttukrishnan Rajarajan, Theo Dimitrakos, Andrea Zisman |
239-246 |
Modeling Reactive Trust Acquisition Using State Transition Systems Sergiy Gladysh, Peter Herrmann |
247-254 |
Towards Trust-Aware and Self-adaptive Systems Francisco Moyano, Benoit Baudry, Javier Lopez |
255-262 |
An Attack-Resistant Hybrid Data-Privatization Method with Low Information Loss Kalpana Singh, Lynn Batten |
263-271 |
PERSONA - A Personalized Data Protection Framework Marina Egea, Federica Paci, Marinella Petrocchi, Nicola Zannone |
272-280 |
A Socio-technical Understanding of TLS Certificate Validation Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini |
281-288 |