Skip to Main content Skip to Navigation
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Trust Management VI
Theo Dimitrakos, Rajat Moona, Dhiren Patel, D. Harrison McKnight (Eds.)
Front Matter

Full Papers


Co-evolving Trust Mechanisms for Catering User Behavior
Tanja Ažderska
1-16
Perturbation Based Privacy Preserving Slope One Predictors for Collaborative Filtering
Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi
17-35
Robustness of Trust Models and Combinations for Handling Unfair Ratings
Lizi Zhang, Siwei Jiang, Jie Zhang, Wee Ng
36-51
A Provenance-Based Trust Model for Delay Tolerant Networks
Jin-Hee Cho, Moonjeong Chang, Ing-Ray Chen, Ananthram Swami
52-67
Trust Transitivity and Conditional Belief Reasoning
Audun Josang, Tanja Ažderska, Stephen Marsh
68-83
Incorporating Honeypot for Intrusion Detection in Cloud Infrastructure
Bhavesh Borisaniya, Avi Patel, Dhiren Patel, Hiren Patel
84-96
Trust Model for Optimized Cloud Services
P. Pawar, M. Rajarajan, S. Nair, A. Zisman
97-112
Post-Session Authentication
Naveed Ahmed, Christian Jensen
113-128
An Efficient Approach for Privacy Preserving Distributed K-Means Clustering Based on Shamir’s Secret Sharing Scheme
Sankita Patel, Sweta Garasia, Devesh Jinwala
129-141
From Subjective Reputation to Verifiable Experiences — Augmenting Peer-Control Mechanisms for Open Service Ecosystems
Sini Ruohomaa, Puneet Kaur, Lea Kutvonen
142-157
Integrating Indicators of Trustworthiness into Reputation-Based Trust Models
Sascha Hauke, Florian Volk, Sheikh Habib, Max Mühlhäuser
158-173
Finding Trusted Publish/Subscribe Trees
Stephen Naicken, Ian Wakeman, Dan Chalmers
174-190

Short Papers


Rendering unto Cæsar the Things That Are Cæsar’s: Complex Trust Models and Human Understanding
Stephen Marsh, Anirban Basu, Natasha Dwyer
191-200
Trust Management Framework for Attenuation of Application Layer DDoS Attack in Cloud Computing
Dipen Contractor, Dhiren Patel
201-208
An Incentive Mechanism to Promote Honesty in E-marketplaces with Limited Inventory
Yuan Liu, Jie Zhang, Qin Li
209-216
How Events Affect Trust: A Baseline Information Processing Model with Three Extensions
D. Mcknight, Peng Liu, Brian Pentland
217-224
Improvements over Extended LMAP+: RFID Authentication Protocol
Jitendra Gurubani, Harsh Thakkar, Dhiren Patel
225-231
Automated Evaluation of Annotators for Museum Collections Using Subjective Logic
Davide Ceolin, Archana Nottamkandath, Wan Fokkink
232-239
A New Data Integrity Checking Protocol with Public Verifiability in Cloud Storage
Mihir Gohel, Bhavesh Gohil
240-246
Document and Author Promotion Strategies in the Secure Wiki Model
Kasper Lindberg, Christian Jensen
247-252

Invited Keynote Papers


Robustness of Trust and Reputation Systems: Does It Matter?
Audun Josang
253-262
transCryptFS: A Trusted and Secure File System
Rajat Moona
263-263
Operational Challenges in Deploying Trust Management Systems - A Practical Perspective
Sundeep Oberoi
264-266
A Perspective on the Evolution of the International Trust Management Research Community in the Last Decade
Theo Dimitrakos
267-280

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/