Table of Contents
|
Trust Management IX Christian Damsgaard Jensen, Stephen Marsh, Theo Dimitrakos, Yuko Murayama (Eds.)
|
Front Matter |
Winsborough Award Invited Paper
|
Reputation - from Social Perception to Internet Security Ehud Gudes |
3-10 |
Full Papers
|
Mathematical Modelling of Trust Issues in Federated Identity Management Md. Ferdous, Gethin Norman, Audun Jøsang, Ron Poet |
13-29 |
Simple and Practical Integrity Models for Binaries and Files Yongzheng Wu, Roland Yap |
30-46 |
Enabling NAME-Based Security and Trust Nikos Fotiou, George Polyzos |
47-59 |
Trust Driven Strategies for Privacy by Design Thibaud Antignac, Daniel Le Métayer |
60-75 |
Lightweight Practical Private One-Way Anonymous Messaging Anirban Basu, Juan Corena, Jaideep Vaidya, Jon Crowcroft, Shinsaku Kiyomoto, Stephen Marsh, Yung Sype, Toru Nakamura |
76-91 |
Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings Paul Lajoie-Mazenc, Emmanuelle Anceaume, Gilles Guette, Thomas Sirvent, Valérie Viet Triem Tong |
92-108 |
Obscuring Provenance Confidential Information via Graph Transformation Jamal Hussein, Luc Moreau, Vladimiro Sassone |
109-125 |
Social Network Culture Needs the Lens of Critical Trust Research Natasha Dwyer, Stephen Marsh |
126-133 |
Predicting Quality of Crowdsourced Annotations Using Graph Kernels Archana Nottamkandath, Jasper Oosterman, Davide Ceolin, Gerben Vries, Wan Fokkink |
134-148 |
An Architecture for Trustworthy Open Data Services Andrew Wong, Vicky Liu, William Caelli, Tony Sahama |
149-162 |
Short Papers
|
1,2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space Ijlal Loutfi, Audun Jøsang |
165-176 |
Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation Alexandru Butoi, Mircea Moca, Nicolae Tomai |
177-184 |
The Detail of Trusted Messages: Retweets in a Context of Health and Fitness Natasha Dwyer, Stephen Marsh |
185-194 |
Reusable Defense Components for Online Reputation Systems Johannes Sänger, Christian Richthammer, Artur Rösch, Günther Pernul |
195-202 |
Continuous Context-Aware Device Comfort Evaluation Method Jingjing Guo, Christian Jensen, Jianfeng Ma |
203-211 |
Special Session: Toward Trusted Cloud Ecosystems
|
Foreword: Towards Trusted Cloud Ecosystems Theo Dimitrakos |
215-216 |
A Cloud Orchestrator for Deploying Public Services on the Cloud – The Case of STRATEGIC Project Panagiotis Gouvas, Konstantinos Kalaboukas, Giannis Ledakis, Theo Dimitrakos, Joshua Daniel, Géry Ducatel, Nuria Dominguez |
217-225 |
Integrating Security Services in Cloud Service Stores Joshua Daniel, Fadi El-Moussa, Géry Ducatel, Pramod Pawar, Ali Sajjad, Robert Rowlingson, Theo Dimitrakos |
226-239 |
Building an Eco-System of Trusted Services via User Control and Transparency on Personal Data Michele Vescovi, Corrado Moiso, Mattia Pasolli, Lorenzo Cordin, Fabrizio Antonelli |
240-250 |
Security-as-a-Service in Multi-cloud and Federated Cloud Environments Pramod Pawar, Ali Sajjad, Theo Dimitrakos, David Chadwick |
251-261 |
The Role of SLAs in Building a Trusted Cloud for Europe Ana Ferrer, Enric I Montanera |
262-275 |