6. IFIPTM 2012: Surat, India
Trust Management VI - 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings
Theo Dimitrakos, Rajat Moona, Dhiren Patel, D. Harrison McKnight
Springer, IFIP Advances in Information and Communication Technology 374, ISBN: 978-3-642-29851-6
Contents
Full Papers
Perturbation Based Privacy Preserving Slope One Predictors for Collaborative Filtering.
Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi
17-35
Robustness of Trust Models and Combinations for Handling Unfair Ratings.
Lizi Zhang, Siwei Jiang, Jie Zhang 0002, Wee Keong Ng
36-51
A Provenance-Based Trust Model for Delay Tolerant Networks.
Jin-Hee Cho, Moonjeong Chang, Ing-Ray Chen, Ananthram Swami
52-67
Trust Transitivity and Conditional Belief Reasoning.
Audun Jøsang, Tanja Azderska, Stephen Marsh
68-83
Incorporating Honeypot for Intrusion Detection in Cloud Infrastructure.
Bhavesh Borisaniya, Avi Patel, Dhiren R. Patel, Hiren Patel
84-96
Trust Model for Optimized Cloud Services.
Pramod S. Pawar, Muttukrishnan Rajarajan, Srijith Krishnan Nair, Andrea Zisman
97-112
Sankita Patel, Sweta Garasia, Devesh C. Jinwala
129-141
Sini Ruohomaa, Puneet Kaur, Lea Kutvonen
142-157
Sascha Hauke, Florian Volk, Sheikh Mahbub Habib, Max Mühlhäuser
158-173
Short Papers
Rendering unto Cæsar the Things That Are Cæsar's: Complex Trust Models and Human Understanding.
Stephen Marsh, Anirban Basu, Natasha Dwyer
191-200
Trust Management Framework for Attenuation of Application Layer DDoS Attack in Cloud Computing.
Dipen Contractor, Dhiren R. Patel
201-208
An Incentive Mechanism to Promote Honesty in E-marketplaces with Limited Inventory.
Yuan Liu, Jie Zhang 0002, Qin Li
209-216
How Events Affect Trust: A Baseline Information Processing Model with Three Extensions.
D. Harrison McKnight, Peng Liu 0012, Brian T. Pentland
217-224
Improvements over Extended LMAP+: RFID Authentication Protocol.
Jitendra B. Gurubani, Harsh Thakkar, Dhiren R. Patel
225-231
Automated Evaluation of Annotators for Museum Collections Using Subjective Logic.
Davide Ceolin, Archana Nottamkandath, Wan Fokkink
232-239
A New Data Integrity Checking Protocol with Public Verifiability in Cloud Storage.
Mihir R. Gohel, Bhavesh N. Gohil
240-246
Document and Author Promotion Strategies in the Secure Wiki Model.
Kasper Lindberg, Christian Damsgaard Jensen
247-252
Invited Keynote Papers
Operational Challenges in Deploying Trust Management Systems - A Practical Perspective.
Sundeep Oberoi
264-266