IFIP TC6 Open Digital Library

7. IFIPTM 2013: Malaga, Spain

Trust Management VII - 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings

M. Carmen Fernández Gago, Fabio Martinelli, Siani Pearson, Isaac Agudo

Springer, IFIP Advances in Information and Communication Technology 401, ISBN: 978-3-642-38322-9


Full Papers

Symbolic Privacy Analysis through Linkability and Detectability.

Meilof Veeningen, Benne de Weger, Nicola Zannone


Middleware-Based Security and Privacy for In-car Integration of Third-Party Applications.

Alexandre Bouard, Maximilian Graf, Dennis Burgkhardt


Towards Automated Trust Establishment in Federated Identity Management.

David W. Chadwick, Mark Hibbert


On Beta Models with Trust Chains.

Tim Muller, Patrick Schweitzer


Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review.

Hani Alzaid, Manal Alfaraj, Sebastian Ries, Audun Jøsang, Muneera Albabtain, Alhanof Abuhaimed


Understanding Trust within Online Discussion Boards: Trust Formation in the Absence of Reputation Systems.

Sarah Talboom, Jo Pierson


In Cloud We Trust: Risk-Assessment-as-a-Service.

Marianthi Theoharidou, Nikolaos Tsalis, Dimitris Gritzalis


An Empirical Test of How Events Turn the Cognitive Gears of Trust.

D. Harrison McKnight, Peng Liu 0012


Reflections on Measuring the Trust Empowerment Potential of a Digital Environment.

Natasha Dwyer, Anirban Basu, Stephen Marsh


Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity.

Henrich Christopher Pöhls


Securing Identity Assignment Using Implicit Certificates in P2P Overlays.

Juan Caubet, Oscar Esparza, Juanjo Alins, Jorge Mata-Díaz, Miguel Soriano


Impact of Dataset Representation on Smartphone Malware Detection Performance.

Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert


Sensor Enhanced Access Control: Extending Traditional Access Control Models with Context-Awareness.

Christian Damsgaard Jensen, Kristine Geneser, Ida C. Willemoes-Wissing


Noninterference Analysis of Delegation Subterfuge in Distributed Authorization Systems.

Simon N. Foley


Short Papers

An Automatic Trust Calculation Based on the Improved Kalman Filter Detection Algorithm.

Bo Ye, Mohammad Ghavami, Anjum Pervez, Maziar Nekovee


The Method of Trust and Reputation Systems Based on Link Prediction and Clustering.

Jiwan Seo, Seungjin Choi, Sangyong Han


Network-Aware Evaluation Environment for Reputation Systems.

Alessandro Celestini, Rocco De Nicola, Francesco Tiezzi


Trust Model for Cloud Based on Cloud Characteristics.

Pramod S. Pawar, Muttukrishnan Rajarajan, Theo Dimitrakos, Andrea Zisman


Modeling Reactive Trust Acquisition Using State Transition Systems.

Sergiy Gladysh, Peter Herrmann


Towards Trust-Aware and Self-adaptive Systems.

Francisco Moyano, Benoit Baudry, Javier Lopez


An Attack-Resistant Hybrid Data-Privatization Method with Low Information Loss.

Kalpana Singh, Lynn Margaret Batten


PERSONA - A Personalized Data Protection Framework.

Marina Egea, Federica Paci, Marinella Petrocchi, Nicola Zannone


A Socio-technical Understanding of TLS Certificate Validation.

Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini