. For-cloud, S. Iot, and .. Nfv-platforms, How to Develop a Security Controls Oriented Reference Architecture

, Theo Dimitrakos Continuous User Authentication Using Smartwatch Motion Sensor Data, p.15

N. Al-naffakh, N. C. , and .. , and Fudong Li Privacy Policy Annotation for Semi-automated Analysis: A Cost-Effective Approach, p.29

A. Dhiren, R. Audich, and B. Dara, Nonnecke The Impact of Competence and Benevolence in a Computational Model of Trust, p.45

A. Deljoo, T. Van-engers, L. Gommans, C. De-laat-codetrust, and .. , , p.58

C. Damsgaard-jensen, M. Bøndergaard-nielsen, and .. , Visualisation of Trust and Quality Information for Geospatial Dataset Selection and Use: Drawing Trust Presentation Comparisons with B2C e-Commerce, p.75

V. Lush, J. Lumsden, and L. , Bastin Crowdsourcing Under Attack: Detecting Malicious Behaviors in Waze, p.91

L. Sanchez, E. Rosas, N. Hidalgo-from-knowledge-to-trust, and .. , A Logical Framework for Pre-trust Computations 107 Mirko Tagliaferri and Alessandro Aldini Towards a Computational Model of Information Trust

, The Social Construction of " Shared Reality, Socio-Technical Systems. . . . 149 Kristina Milanovi? and Jeremy Pitt

A. Index and .. , , p.161