2. IFIPTM 2008: Trondheim, Norway
Trust Management II - Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway
Yücel Karabulut, John Mitchell, Peter Herrmann, Christian Damsgaard Jensen
Springer, IFIP Advances in Information and Communication Technology 263, ISBN: 978-0-387-09427-4
Contents
Trust Management in P2P Systems Using Standard TuLiP.
Marcin Czenko, Jeroen Doumen, Sandro Etalle
1-16
A Trust Evaluation Method Based on Logic and Probability Theory.
Reto Kohlas, Jacek Jonczy, Rolf Haenni
17-32
A UML-based Method for the Development of Policies to Support Trust Management.
Atle Refsdal, Bjørnar Solhaug, Ketil Stølen
33-49
Modeling Trust for Recommender Systems using Similarity Metrics.
Georgios Pitsilis, Lindsay F. Marshall
103-118
Continuous Ratings in Discrete Bayesian Reputation Systems.
Audun Jøsang, Xixi Luo, Xiaowu Chen
151-166
A Robust and Knot-Aware Trust-Based Reputation Model.
Nurit Gal-Oz, Ehud Gudes, Danny Hendler
167-182
The North Laine Shopping Guide: A Case Study in Modelling Trust in Applications.
Jon Robinson, Ian Wakeman, Dan Chalmers, Anirban Basu
183-197
Roberto Speicys Cardoso, Valérie Issarny
215-230
Protecting Location Privacy through Semantics-aware Obfuscation Techniques.
Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri
231-245
Privacy2.0: Towards Collaborative Data-Privacy Protection.
Erik Buchmann, Klemens Böhm, Oliver Raabe
247-262
Automatic Verification of Privacy Properties in the Applied pi Calculus.
Stéphanie Delaune, Mark Ryan, Ben Smyth
263-278
Place and Time Authentication of Cultural Assets.
Leonardo Mostarda, Changyu Dong, Naranker Dulay
279-294
A Lightweight Binary Authentication System for Windows.
Felix Halim, Rajiv Ramnath, Sufatrio, Yongzheng Wu, Roland H. C. Yap
295-310
Towards Standards-Compliant Trust Negotiation for Web Services.
Adam J. Lee, Marianne Winslett
311-326
Assigning Responsibility for Failed Obligations.
Keith Irwin, Ting Yu, William H. Winsborough
327-342
Role- and Relationship-Based Identity Management for Private yet Accountable E-Learning.
Mohd M. Anwar, Jim E. Greer
343-358
An Inline Monitoring System for .NET Mobile Devices.
Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka
363-366