Table of Contents
|
Trust Management XII Nurit Gal-Oz, Peter R. Lewis |
Front Matter |
How to Develop a Security Controls Oriented Reference Architecture for Cloud, IoT and SDN/NFV Platforms Theo Dimitrakos |
1-14 |
Continuous User Authentication Using Smartwatch Motion Sensor Data Neamah Al-Naffakh, Nathan Clarke, Fudong Li |
15-28 |
Privacy Policy Annotation for Semi-automated Analysis: A Cost-Effective Approach Dhiren Audich, Rozita Dara, Blair Nonnecke |
29-44 |
The Impact of Competence and Benevolence in a Computational Model of Trust Ameneh Deljoo, Tom Engers, Leon Gommans, Cees Laat |
45-57 |
CodeTrust Christian Jensen, Michael Nielsen |
58-74 |
Visualisation of Trust and Quality Information for Geospatial Dataset Selection and Use: Drawing Trust Presentation Comparisons with B2C e-Commerce Victoria Lush, Jo Lumsden, Lucy Bastin |
75-90 |
Crowdsourcing Under Attack: Detecting Malicious Behaviors in Waze Luis Sanchez, Erika Rosas, Nicolas Hidalgo |
91-106 |
From Knowledge to Trust: A Logical Framework for Pre-trust Computations Mirko Tagliaferri, Alessandro Aldini |
107-123 |
Towards a Computational Model of Information Trust Tosan Atele-Williams, Stephen Marsh |
124-136 |
Public Privacy and Brick Houses Made of Glass Stephen Marsh, Ada Diaconescu, David Evans, Tracy Kosa, Peter Lewis, Sheikh Mahbub Habib |
137-148 |
The Social Construction of “Shared Reality” in Socio-Technical Systems Kristina Milanović, Jeremy Pitt |
149-159 |