7. IFIPTM 2013: Malaga, Spain
Trust Management VII - 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings
M. Carmen Fernández Gago, Fabio Martinelli, Siani Pearson, Isaac Agudo
Springer, IFIP Advances in Information and Communication Technology 401, ISBN: 978-3-642-38322-9
Contents
Full Papers
Symbolic Privacy Analysis through Linkability and Detectability.
Meilof Veeningen, Benne de Weger, Nicola Zannone
1-16
Middleware-Based Security and Privacy for In-car Integration of Third-Party Applications.
Alexandre Bouard, Maximilian Graf, Dennis Burgkhardt
17-32
Towards Automated Trust Establishment in Federated Identity Management.
David W. Chadwick, Mark Hibbert
33-48
Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review.
Hani Alzaid, Manal Alfaraj, Sebastian Ries, Audun Jøsang, Muneera Albabtain, Alhanof Abuhaimed
66-82
Sarah Talboom, Jo Pierson
83-99
In Cloud We Trust: Risk-Assessment-as-a-Service.
Marianthi Theoharidou, Nikolaos Tsalis, Dimitris Gritzalis
100-110
An Empirical Test of How Events Turn the Cognitive Gears of Trust.
D. Harrison McKnight, Peng Liu 0012
111-126
Reflections on Measuring the Trust Empowerment Potential of a Digital Environment.
Natasha Dwyer, Anirban Basu, Stephen Marsh
127-135
Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity.
Henrich Christopher Pöhls
136-150
Securing Identity Assignment Using Implicit Certificates in P2P Overlays.
Juan Caubet, Oscar Esparza, Juanjo Alins, Jorge Mata-Díaz, Miguel Soriano
151-165
Impact of Dataset Representation on Smartphone Malware Detection Performance.
Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert
166-176
Sensor Enhanced Access Control: Extending Traditional Access Control Models with Context-Awareness.
Christian Damsgaard Jensen, Kristine Geneser, Ida C. Willemoes-Wissing
177-192
Noninterference Analysis of Delegation Subterfuge in Distributed Authorization Systems.
Simon N. Foley
193-207
Short Papers
An Automatic Trust Calculation Based on the Improved Kalman Filter Detection Algorithm.
Bo Ye, Mohammad Ghavami, Anjum Pervez, Maziar Nekovee
208-222
The Method of Trust and Reputation Systems Based on Link Prediction and Clustering.
Jiwan Seo, Seungjin Choi, Sangyong Han
223-230
Network-Aware Evaluation Environment for Reputation Systems.
Alessandro Celestini, Rocco De Nicola, Francesco Tiezzi
231-238
Trust Model for Cloud Based on Cloud Characteristics.
Pramod S. Pawar, Muttukrishnan Rajarajan, Theo Dimitrakos, Andrea Zisman
239-246
Modeling Reactive Trust Acquisition Using State Transition Systems.
Sergiy Gladysh, Peter Herrmann
247-254
Towards Trust-Aware and Self-adaptive Systems.
Francisco Moyano, Benoit Baudry, Javier Lopez
255-262
An Attack-Resistant Hybrid Data-Privatization Method with Low Information Loss.
Kalpana Singh, Lynn Margaret Batten
263-271
PERSONA - A Personalized Data Protection Framework.
Marina Egea, Federica Paci, Marinella Petrocchi, Nicola Zannone
272-280
A Socio-technical Understanding of TLS Certificate Validation.
Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini
281-288