Full Text Documents

Search


Table of Contents
Trust Management IX
Christian Damsgaard Jensen, Stephen Marsh, Theo Dimitrakos, Yuko Murayama  (Eds.)
Front Matter

Winsborough Award Invited Paper


Reputation - from Social Perception to Internet Security
Ehud Gudes
3-10

Full Papers


Mathematical Modelling of Trust Issues in Federated Identity Management
Md. Ferdous, Gethin Norman, Audun Jøsang, Ron Poet
13-29
Simple and Practical Integrity Models for Binaries and Files
Yongzheng Wu, Roland Yap
30-46
Enabling NAME-Based Security and Trust
Nikos Fotiou, George Polyzos
47-59
Trust Driven Strategies for Privacy by Design
Thibaud Antignac, Daniel Le Métayer
60-75
Lightweight Practical Private One-Way Anonymous Messaging
Anirban Basu, Juan Corena, Jaideep Vaidya, Jon Crowcroft, Shinsaku Kiyomoto, Stephen Marsh, Yung Sype, Toru Nakamura
76-91
Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings
Paul Lajoie-Mazenc, Emmanuelle Anceaume, Gilles Guette, Thomas Sirvent, Valérie Viet Triem Tong
92-108
Obscuring Provenance Confidential Information via Graph Transformation
Jamal Hussein, Luc Moreau, Vladimiro Sassone
109-125
Social Network Culture Needs the Lens of Critical Trust Research
Natasha Dwyer, Stephen Marsh
126-133
Predicting Quality of Crowdsourced Annotations Using Graph Kernels
Archana Nottamkandath, Jasper Oosterman, Davide Ceolin, Gerben Vries, Wan Fokkink
134-148
An Architecture for Trustworthy Open Data Services
Andrew Wong, Vicky Liu, William Caelli, Tony Sahama
149-162

Short Papers


1,2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space
Ijlal Loutfi, Audun Jøsang
165-176
Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation
Alexandru Butoi, Mircea Moca, Nicolae Tomai
177-184
The Detail of Trusted Messages: Retweets in a Context of Health and Fitness
Natasha Dwyer, Stephen Marsh
185-194
Reusable Defense Components for Online Reputation Systems
Johannes Sänger, Christian Richthammer, Artur Rösch, Günther Pernul
195-202
Continuous Context-Aware Device Comfort Evaluation Method
Jingjing Guo, Christian Jensen, Jianfeng Ma
203-211

Special Session: Toward Trusted Cloud Ecosystems


Foreword: Towards Trusted Cloud Ecosystems
Theo Dimitrakos
215-216
A Cloud Orchestrator for Deploying Public Services on the Cloud – The Case of STRATEGIC Project
Panagiotis Gouvas, Konstantinos Kalaboukas, Giannis Ledakis, Theo Dimitrakos, Joshua Daniel, Géry Ducatel, Nuria Dominguez
217-225
Integrating Security Services in Cloud Service Stores
Joshua Daniel, Fadi El-Moussa, Géry Ducatel, Pramod Pawar, Ali Sajjad, Robert Rowlingson, Theo Dimitrakos
226-239
Building an Eco-System of Trusted Services via User Control and Transparency on Personal Data
Michele Vescovi, Corrado Moiso, Mattia Pasolli, Lorenzo Cordin, Fabrizio Antonelli
240-250
Security-as-a-Service in Multi-cloud and Federated Cloud Environments
Pramod Pawar, Ali Sajjad, Theo Dimitrakos, David Chadwick
251-261
The Role of SLAs in Building a Trusted Cloud for Europe
Ana Ferrer, Enric I Montanera
262-275

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/