L. Zhang and S. Jiang, Jie Zhang, and Wee Keong Ng A Provenance-Based Trust Model for Delay Tolerant Networks, p.52

S. Patel, S. Garasia, and .. , and Devesh Jinwala From Subjective Reputation to Verifiable Experiences ? Augmenting Peer-Control Mechanisms for Open Service Ecosystems, p.142

S. Ruohomaa, P. Kaur, L. , and C. , Kutvonen Integrating Indicators of Trustworthiness into Reputation-Based Trust Models: Insurance, Certification, p.158

S. Hauke, F. Volk, and .. , Sheikh Mahbub Habib, and Max Mühlhäuser Finding Trusted Publish/Subscribe Trees, p.174

S. Naicken, I. Wakeman, D. Chalmers, and X. , Table of Contents Short Papers Rendering unto Caesar the Things That Are Caesar's: Complex Trust Models and Human Understanding Natasha Dwyer Trust Management Framework for Attenuation of Application Layer DDoS Attack in Cloud Computing, 201 Dipen Contractor and Dhiren R

B. Jitendra, H. Gurubani, D. R. Thakkar, and .. Patel, Automated Evaluation of Annotators for Museum Collections Using Subjective Logic, p.232

D. Ceolin, A. Nottamkandath, and W. , Fokkink A New Data Integrity Checking Protocol with Public Verifiability in Cloud Storage, p.240

R. Mihir, . Gohel, and N. Bhavesh, Gohil Document and Author Promotion Strategies in the Secure Wiki Model, p.247

K. Lindberg and C. , Keynote Papers Robustness of Trust and Reputation Systems: Does It Matter?, p.253

A. Jøsang and T. , 263 Rajat Moona Operational Challenges in Deploying Trust Management Systems - A Practical Perspective 264 Sundeep Oberoi A Perspective on the Evolution of the International Trust Management Research Community in the Last Decade, Trusted and Secure File System (Abstract), p.267