Table of Contents
|
Trust Management XIV Tim Muller, Carmen Fernandez-Gago, Davide Ceolin, Ehud Gudes, Nurit Gal-Oz |
Front Matter |
Continuous Authorization Architecture for Dynamic Trust Evaluation Hussein Joumaa, Ana Petrovska, Ali Hariri, Theo Dimitrakos, Bruno Crispo |
1-18 |
Behavior-Dependent Access Control Policies Amour Shmuel, Ehud Gudes |
19-36 |
Trust Level Evaluation Engine for Dynamic Trust Assessment with Reference to Subjective Logic Ana Petrovska, Gabriele Gelardi, Hüseyin Demirci, Emre Koçyiğit, Gabriele Lenzini, Artur Hermann, Nataša Trkulja, Frank Kargl, Ioannis Krontiris, Theo Dimitrakos |
37-55 |
A User Study of an ABAC Model for Online Social Networks Adi Swissa, Ehud Gudes |
56-71 |
A Pre-signature Scheme for Trustworthy Offline V2V Communication Dimah Almani, Tim Muller, Steven Furnell, Xavier Carpent, Takahito Yoshizawa |
72-88 |
Categorizing Review Helpfulness Using Abstract Dialectical Frameworks Atefeh Keshavarzi Zafarghandi, Davide Ceolin |
89-104 |
Software and its Perceived Trustworthiness Anirban Basu, Satoshi Kai |
105-120 |
Why Zero Trust Architectures Are Not Replacing Trust Christian Damsgaard Jensen |
121-135 |
Evaluation of Entity Trustworthiness Based on Public and Private Data Marc Sel, Hasin Ishraq Reefat, Naghmeh Karimi, Konstantinos Mersinas |
136-145 |
A Difficulty in Trust Modelling Tim Muller |
146-154 |
Designed by Inria-IES Team : Hosted by HAL : 
|