index - Trust Management VII
   


Full Text Documents

23

Search


Table of Contents
Book Title (Part xxx)
Scientific Editor 1, Scientific Editor2 (Eds.)
Front Matter

Full Papers


Symbolic Privacy Analysis through Linkability and Detectability
Meilof Veeningen, Benne Weger, Nicola Zannone
1-16
Middleware-Based Security and Privacy for In-car Integration of Third-Party Applications
Alexandre Bouard, Maximilian Graf, Dennis Burgkhardt
17-32
Towards Automated Trust Establishment in Federated Identity Management
David Chadwick, Mark Hibbert
33-48
On Beta Models with Trust Chains
Tim Muller, Patrick Schweitzer
49-65
Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review
Hani Alzaid, Manal Alfaraj, Sebastian Ries, Audun Jøsang, Muneera Albabtain, Alhanof Abuhaimed
66-82
Understanding Trust within Online Discussion Boards: Trust Formation in the Absence of Reputation Systems
Sarah Talboom, Jo Pierson
83-99
In Cloud We Trust: Risk-Assessment-as-a-Service
Marianthi Theoharidou, Nikolaos Tsalis, Dimitris Gritzalis
100-110
An Empirical Test of How Events Turn the Cognitive Gears of Trust
D. Mcknight, Peng Liu
111-126
Reflections on Measuring the Trust Empowerment Potential of a Digital Environment
Natasha Dwyer, Anirban Basu, Stephen Marsh
127-135
Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity
Henrich Pöhls
136-150
Securing Identity Assignment Using Implicit Certificates in P2P Overlays
Juan Caubet, Oscar Esparza, Juanjo Alins, Jorge Mata-Díaz, Miguel Soriano
151-165
Impact of Dataset Representation on Smartphone Malware Detection Performance
Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert
166-176
Sensor Enhanced Access Control: Extending Traditional Access Control Models with Context-Awareness
Christian Jensen, Kristine Geneser, Ida Willemoes-Wissing
177-192
Noninterference Analysis of Delegation Subterfuge in Distributed Authorization Systems
Simon Foley
193-207

Short Papers


An Automatic Trust Calculation Based on the Improved Kalman Filter Detection Algorithm
Bo Ye, Mohammad Ghavami, Anjum Pervez, Maziar Nekovee
208-222
The Method of Trust and Reputation Systems Based on Link Prediction and Clustering
Jiwan Seo, Seungjin Choi, Sangyong Han
223-230
Network-Aware Evaluation Environment for Reputation Systems
Alessandro Celestini, Rocco Nicola, Francesco Tiezzi
231-238
Trust Model for Cloud Based on Cloud Characteristics
Pramod Pawar, Muttukrishnan Rajarajan, Theo Dimitrakos, Andrea Zisman
239-246
Modeling Reactive Trust Acquisition Using State Transition Systems
Sergiy Gladysh, Peter Herrmann
247-254
Towards Trust-Aware and Self-adaptive Systems
Francisco Moyano, Benoit Baudry, Javier Lopez
255-262
An Attack-Resistant Hybrid Data-Privatization Method with Low Information Loss
Kalpana Singh, Lynn Batten
263-271
PERSONA - A Personalized Data Protection Framework
Marina Egea, Federica Paci, Marinella Petrocchi, Nicola Zannone
272-280
A Socio-technical Understanding of TLS Certificate Validation
Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini
281-288

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/