IFIP TC6 Open Digital Library

5. IFIPTM 2011: Copenhagen, Denmark

Trust Management V, 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, Denmark, June 29-July 1, 2011, Proceedings

Ian Wakeman, Ehud Gudes, Christian Damsgaard Jensen, Jason Crampton

Springer, IFIP Advances in Information and Communication Technology 358, ISBN: 978-3-642-22199-6



Contents

Extended Abstracts for Keynote Speakers

From Access Control to Trust Management, and Back - A Petition.

Dieter Gollmann

 1-8

Familiarity Breeds Con-victims: Why We Need More Effective Trust Signaling.

Martina Angela Sasse, Iacovos Kirlappos

 9-12

The Evolution of Trust.

Pam Briggs

 13-16

Full Papers

Detecting and Reacting to Changes in Reputation Flows.

Sini Ruohomaa, Aleksi Hankalahti, Lea Kutvonen

 19-34

Validation and Verification of Agent Models for Trust: Independent Compared to Relative Trust.

Mark Hoogendoorn, S. Waqar Jaffry, Peter-Paul van Maanen

 35-50

Composing Trust Models towards Interoperable Trust Management.

Rachid Saadi, Mohammad Ashiqur Rahaman, Valérie Issarny, Alessandra Toninelli

 51-66

Identifying Knots of Trust in Virtual Communities.

Nurit Gal-Oz, Ran Yahalom, Ehud Gudes

 67-81

Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information.

Georgios Pitsilis, Xiangliang Zhang, Wei Wang 0012

 82-97

From Reputation Models and Systems to Reputation Ontologies.

Rehab Alnemr, Christoph Meinel

 98-116

Enhancing Data Privacy in the Cloud.

Yanbin Lu, Gene Tsudik

 117-132

Longitude: A Privacy-Preserving Location Sharing Protocol for Mobile Applications.

Changyu Dong, Naranker Dulay

 133-148

Physiological Measurement of Trust-Related Behavior in Trust-Neutral and Trust-Critical Situations.

Karin Leichtenstern, Nikolaus Bee, Elisabeth André, Ulrich Berkmüller, Johannes Wagner

 165-172

Trusted Principal-Hosted Certificate Revocation.

Sufatrio, Roland H. C. Yap

 173-189

On Tradeoffs between Trust and Survivability Using a Game Theoretic Approach.

Jin-Hee Cho, Ananthram Swami

 190-205

Prob-Cog: An Adaptive Filtering Model for Trust Evaluation.

Zeinab Noorian, Stephen Marsh, Michael Fleming

 206-222

Privacy-Respecting Reputation for Wiki Users.

Benjamin Kellermann, Stefanie Pötzsch, Sandra Steinbrecher

 223-239

Short Papers

Security and Privacy in E-consumer Protection in Victoria, Australia.

Huong Ha

 240-252

Proximity-Based Trust Inference for Mobile Social Networking.

Amir Seyedi, Rachid Saadi, Valérie Issarny

 253-264

Trust-Threshold Based Routing in Delay Tolerant Networks.

Moonjeong Chang, Ing-Ray Chen, Fenye Bao, Jin-Hee Cho

 265-276

A Trust Management Framework for Detecting Malicious and Selfish Behaviour in Ad-Hoc Wireless Networks Using Fuzzy Sets and Grey Theory.

Ji Guo, Alan Marshall, Bosheng Zhou

 277-289

Regulatory Impact of Data Protection and Privacy in the Cloud.

Sakshi Porwal, Srijith K. Nair, Theo Dimitrakos

 290-299

Assessment of the Trustworthiness of Digital Records.

Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård

 300-311

Taste and Trust.

Audun Jøsang, Walter Quattrociocchi, Dino Karabeg

 312-322

Trust Dynamics: A Data-Driven Simulation Approach.

Olufunmilola Onolaja, Rami Bahsoon, Georgios Theodoropoulos

 323-334