Full Text Documents

Search


Table of Contents
Trust Management VI
Theo Dimitrakos, Rajat Moona, Dhiren Patel, D. Harrison McKnight (Eds.)
Front Matter

Full Papers


Co-evolving Trust Mechanisms for Catering User Behavior
Tanja Ažderska
1-16
Perturbation Based Privacy Preserving Slope One Predictors for Collaborative Filtering
Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi
17-35
Robustness of Trust Models and Combinations for Handling Unfair Ratings
Lizi Zhang, Siwei Jiang, Jie Zhang, Wee Ng
36-51
A Provenance-Based Trust Model for Delay Tolerant Networks
Jin-Hee Cho, Moonjeong Chang, Ing-Ray Chen, Ananthram Swami
52-67
Trust Transitivity and Conditional Belief Reasoning
Audun Josang, Tanja Ažderska, Stephen Marsh
68-83
Incorporating Honeypot for Intrusion Detection in Cloud Infrastructure
Bhavesh Borisaniya, Avi Patel, Dhiren Patel, Hiren Patel
84-96
Trust Model for Optimized Cloud Services
P. Pawar, M. Rajarajan, S. Nair, A. Zisman
97-112
Post-Session Authentication
Naveed Ahmed, Christian Jensen
113-128
An Efficient Approach for Privacy Preserving Distributed K-Means Clustering Based on Shamir’s Secret Sharing Scheme
Sankita Patel, Sweta Garasia, Devesh Jinwala
129-141
From Subjective Reputation to Verifiable Experiences — Augmenting Peer-Control Mechanisms for Open Service Ecosystems
Sini Ruohomaa, Puneet Kaur, Lea Kutvonen
142-157
Integrating Indicators of Trustworthiness into Reputation-Based Trust Models
Sascha Hauke, Florian Volk, Sheikh Habib, Max Mühlhäuser
158-173
Finding Trusted Publish/Subscribe Trees
Stephen Naicken, Ian Wakeman, Dan Chalmers
174-190

Short Papers


Rendering unto Cæsar the Things That Are Cæsar’s: Complex Trust Models and Human Understanding
Stephen Marsh, Anirban Basu, Natasha Dwyer
191-200
Trust Management Framework for Attenuation of Application Layer DDoS Attack in Cloud Computing
Dipen Contractor, Dhiren Patel
201-208
An Incentive Mechanism to Promote Honesty in E-marketplaces with Limited Inventory
Yuan Liu, Jie Zhang, Qin Li
209-216
How Events Affect Trust: A Baseline Information Processing Model with Three Extensions
D. Mcknight, Peng Liu, Brian Pentland
217-224
Improvements over Extended LMAP+: RFID Authentication Protocol
Jitendra Gurubani, Harsh Thakkar, Dhiren Patel
225-231
Automated Evaluation of Annotators for Museum Collections Using Subjective Logic
Davide Ceolin, Archana Nottamkandath, Wan Fokkink
232-239
A New Data Integrity Checking Protocol with Public Verifiability in Cloud Storage
Mihir Gohel, Bhavesh Gohil
240-246
Document and Author Promotion Strategies in the Secure Wiki Model
Kasper Lindberg, Christian Jensen
247-252

Invited Keynote Papers


Robustness of Trust and Reputation Systems: Does It Matter?
Audun Josang
253-262
transCryptFS: A Trusted and Secure File System
Rajat Moona
263-263
Operational Challenges in Deploying Trust Management Systems - A Practical Perspective
Sundeep Oberoi
264-266
A Perspective on the Evolution of the International Trust Management Research Community in the Last Decade
Theo Dimitrakos
267-280

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/