Jie Zhang, and Wee Keong Ng A Provenance-Based Trust Model for Delay Tolerant Networks, p.52 ,
and Devesh Jinwala From Subjective Reputation to Verifiable Experiences ? Augmenting Peer-Control Mechanisms for Open Service Ecosystems, p.142 ,
Kutvonen Integrating Indicators of Trustworthiness into Reputation-Based Trust Models: Insurance, Certification, p.158 ,
Sheikh Mahbub Habib, and Max Mühlhäuser Finding Trusted Publish/Subscribe Trees, p.174 ,
Table of Contents Short Papers Rendering unto Caesar the Things That Are Caesar's: Complex Trust Models and Human Understanding Natasha Dwyer Trust Management Framework for Attenuation of Application Layer DDoS Attack in Cloud Computing, 201 Dipen Contractor and Dhiren R ,
Automated Evaluation of Annotators for Museum Collections Using Subjective Logic, p.232 ,
Fokkink A New Data Integrity Checking Protocol with Public Verifiability in Cloud Storage, p.240 ,
Gohil Document and Author Promotion Strategies in the Secure Wiki Model, p.247 ,
Keynote Papers Robustness of Trust and Reputation Systems: Does It Matter?, p.253 ,
263 Rajat Moona Operational Challenges in Deploying Trust Management Systems - A Practical Perspective 264 Sundeep Oberoi A Perspective on the Evolution of the International Trust Management Research Community in the Last Decade, Trusted and Secure File System (Abstract), p.267 ,