IFIP TC6 Open Digital Library

7. IFIPTM 2013: Malaga, Spain

Trust Management VII - 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings

M. Carmen Fernández Gago, Fabio Martinelli, Siani Pearson, Isaac Agudo

Springer, IFIP Advances in Information and Communication Technology 401, ISBN: 978-3-642-38322-9



Contents

Full Papers

Symbolic Privacy Analysis through Linkability and Detectability.

Meilof Veeningen, Benne de Weger, Nicola Zannone

 1-16

Middleware-Based Security and Privacy for In-car Integration of Third-Party Applications.

Alexandre Bouard, Maximilian Graf, Dennis Burgkhardt

 17-32

Towards Automated Trust Establishment in Federated Identity Management.

David W. Chadwick, Mark Hibbert

 33-48

On Beta Models with Trust Chains.

Tim Muller, Patrick Schweitzer

 49-65

Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review.

Hani Alzaid, Manal Alfaraj, Sebastian Ries, Audun Jøsang, Muneera Albabtain, Alhanof Abuhaimed

 66-82

Understanding Trust within Online Discussion Boards: Trust Formation in the Absence of Reputation Systems.

Sarah Talboom, Jo Pierson

 83-99

In Cloud We Trust: Risk-Assessment-as-a-Service.

Marianthi Theoharidou, Nikolaos Tsalis, Dimitris Gritzalis

 100-110

An Empirical Test of How Events Turn the Cognitive Gears of Trust.

D. Harrison McKnight, Peng Liu 0012

 111-126

Reflections on Measuring the Trust Empowerment Potential of a Digital Environment.

Natasha Dwyer, Anirban Basu, Stephen Marsh

 127-135

Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity.

Henrich Christopher Pöhls

 136-150

Securing Identity Assignment Using Implicit Certificates in P2P Overlays.

Juan Caubet, Oscar Esparza, Juanjo Alins, Jorge Mata-Díaz, Miguel Soriano

 151-165

Impact of Dataset Representation on Smartphone Malware Detection Performance.

Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert

 166-176

Sensor Enhanced Access Control: Extending Traditional Access Control Models with Context-Awareness.

Christian Damsgaard Jensen, Kristine Geneser, Ida C. Willemoes-Wissing

 177-192

Noninterference Analysis of Delegation Subterfuge in Distributed Authorization Systems.

Simon N. Foley

 193-207

Short Papers

An Automatic Trust Calculation Based on the Improved Kalman Filter Detection Algorithm.

Bo Ye, Mohammad Ghavami, Anjum Pervez, Maziar Nekovee

 208-222

The Method of Trust and Reputation Systems Based on Link Prediction and Clustering.

Jiwan Seo, Seungjin Choi, Sangyong Han

 223-230

Network-Aware Evaluation Environment for Reputation Systems.

Alessandro Celestini, Rocco De Nicola, Francesco Tiezzi

 231-238

Trust Model for Cloud Based on Cloud Characteristics.

Pramod S. Pawar, Muttukrishnan Rajarajan, Theo Dimitrakos, Andrea Zisman

 239-246

Modeling Reactive Trust Acquisition Using State Transition Systems.

Sergiy Gladysh, Peter Herrmann

 247-254

Towards Trust-Aware and Self-adaptive Systems.

Francisco Moyano, Benoit Baudry, Javier Lopez

 255-262

An Attack-Resistant Hybrid Data-Privatization Method with Low Information Loss.

Kalpana Singh, Lynn Margaret Batten

 263-271

PERSONA - A Personalized Data Protection Framework.

Marina Egea, Federica Paci, Marinella Petrocchi, Nicola Zannone

 272-280

A Socio-technical Understanding of TLS Certificate Validation.

Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini

 281-288