IFIP TC6 Open Digital Library

2. IFIPTM 2008: Trondheim, Norway

Trust Management II - Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway

Yücel Karabulut, John Mitchell, Peter Herrmann, Christian Damsgaard Jensen

Springer, IFIP Advances in Information and Communication Technology 263, ISBN: 978-0-387-09427-4


Trust Management in P2P Systems Using Standard TuLiP.

Marcin Czenko, Jeroen Doumen, Sandro Etalle


A Trust Evaluation Method Based on Logic and Probability Theory.

Reto Kohlas, Jacek Jonczy, Rolf Haenni


A UML-based Method for the Development of Policies to Support Trust Management.

Atle Refsdal, Bjørnar Solhaug, Ketil Stølen


Analyzing the Robustness of CertainTrust.

Sebastian Ries, Andreas Heinemann


An Intensional Functional Model of Trust.

Kaiyu Wan, Vasu S. Alagar


A Translation Mechanism for Recommendations.

Pierpaolo Dondio, Luca Longo, Stephen Barrett


Modeling Trust for Recommender Systems using Similarity Metrics.

Georgios Pitsilis, Lindsay F. Marshall


Trust-Based Collaborative Filtering.

Neal Lathia, Stephen Hailes, Licia Capra


SOFIA: Social Filtering for Robust Recommendations.

Matteo Dell'Amico, Licia Capra


Continuous Ratings in Discrete Bayesian Reputation Systems.

Audun Jøsang, Xixi Luo, Xiaowu Chen


A Robust and Knot-Aware Trust-Based Reputation Model.

Nurit Gal-Oz, Ehud Gudes, Danny Hendler


The North Laine Shopping Guide: A Case Study in Modelling Trust in Applications.

Jon Robinson, Ian Wakeman, Dan Chalmers, Anirban Basu


Cooperation in Growing Communities.

Rowan Martin-Hughes


A Model for Reasoning About the Privacy Impact of Composite Service Execution in Pervasive Computing.

Roberto Speicys Cardoso, Valérie Issarny


Protecting Location Privacy through Semantics-aware Obfuscation Techniques.

Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri


Privacy2.0: Towards Collaborative Data-Privacy Protection.

Erik Buchmann, Klemens Böhm, Oliver Raabe


Automatic Verification of Privacy Properties in the Applied pi Calculus.

Stéphanie Delaune, Mark Ryan, Ben Smyth


Place and Time Authentication of Cultural Assets.

Leonardo Mostarda, Changyu Dong, Naranker Dulay


A Lightweight Binary Authentication System for Windows.

Felix Halim, Rajiv Ramnath, Sufatrio, Yongzheng Wu, Roland H. C. Yap


Towards Standards-Compliant Trust Negotiation for Web Services.

Adam J. Lee, Marianne Winslett


Assigning Responsibility for Failed Obligations.

Keith Irwin, Ting Yu, William H. Winsborough


Role- and Relationship-Based Identity Management for Private yet Accountable E-Learning.

Mohd M. Anwar, Jim E. Greer


Using Rummble as a Personalised Travel Guide.

Clive Cox


An Inline Monitoring System for .NET Mobile Devices.

Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka


STORE Stochastic Reputation Service for Virtual Organisations.

Jochen Haller