Skip to Main content Skip to Navigation
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Trust Management IX
Christian Damsgaard Jensen, Stephen Marsh, Theo Dimitrakos, Yuko Murayama  (Eds.)
Front Matter

Winsborough Award Invited Paper


Reputation - from Social Perception to Internet Security
Ehud Gudes
3-10

Full Papers


Mathematical Modelling of Trust Issues in Federated Identity Management
Md. Ferdous, Gethin Norman, Audun Jøsang, Ron Poet
13-29
Simple and Practical Integrity Models for Binaries and Files
Yongzheng Wu, Roland Yap
30-46
Enabling NAME-Based Security and Trust
Nikos Fotiou, George Polyzos
47-59
Trust Driven Strategies for Privacy by Design
Thibaud Antignac, Daniel Le Métayer
60-75
Lightweight Practical Private One-Way Anonymous Messaging
Anirban Basu, Juan Corena, Jaideep Vaidya, Jon Crowcroft, Shinsaku Kiyomoto, Stephen Marsh, Yung Sype, Toru Nakamura
76-91
Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings
Paul Lajoie-Mazenc, Emmanuelle Anceaume, Gilles Guette, Thomas Sirvent, Valérie Viet Triem Tong
92-108
Obscuring Provenance Confidential Information via Graph Transformation
Jamal Hussein, Luc Moreau, Vladimiro Sassone
109-125
Social Network Culture Needs the Lens of Critical Trust Research
Natasha Dwyer, Stephen Marsh
126-133
Predicting Quality of Crowdsourced Annotations Using Graph Kernels
Archana Nottamkandath, Jasper Oosterman, Davide Ceolin, Gerben Vries, Wan Fokkink
134-148
An Architecture for Trustworthy Open Data Services
Andrew Wong, Vicky Liu, William Caelli, Tony Sahama
149-162

Short Papers


1,2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space
Ijlal Loutfi, Audun Jøsang
165-176
Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation
Alexandru Butoi, Mircea Moca, Nicolae Tomai
177-184
The Detail of Trusted Messages: Retweets in a Context of Health and Fitness
Natasha Dwyer, Stephen Marsh
185-194
Reusable Defense Components for Online Reputation Systems
Johannes Sänger, Christian Richthammer, Artur Rösch, Günther Pernul
195-202
Continuous Context-Aware Device Comfort Evaluation Method
Jingjing Guo, Christian Jensen, Jianfeng Ma
203-211

Special Session: Toward Trusted Cloud Ecosystems


Foreword: Towards Trusted Cloud Ecosystems
Theo Dimitrakos
215-216
A Cloud Orchestrator for Deploying Public Services on the Cloud – The Case of STRATEGIC Project
Panagiotis Gouvas, Konstantinos Kalaboukas, Giannis Ledakis, Theo Dimitrakos, Joshua Daniel, Géry Ducatel, Nuria Dominguez
217-225
Integrating Security Services in Cloud Service Stores
Joshua Daniel, Fadi El-Moussa, Géry Ducatel, Pramod Pawar, Ali Sajjad, Robert Rowlingson, Theo Dimitrakos
226-239
Building an Eco-System of Trusted Services via User Control and Transparency on Personal Data
Michele Vescovi, Corrado Moiso, Mattia Pasolli, Lorenzo Cordin, Fabrizio Antonelli
240-250
Security-as-a-Service in Multi-cloud and Federated Cloud Environments
Pramod Pawar, Ali Sajjad, Theo Dimitrakos, David Chadwick
251-261
The Role of SLAs in Building a Trusted Cloud for Europe
Ana Ferrer, Enric I Montanera
262-275

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/