researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Filter by Tag
[+]
OR
AND
NOT
1
C++
Markov
Meta-Environment
Spiral
access control
access control policies
analysis
certification
collaborative filtering
data-flow
e-science
mobile
protocol
recommender systems
reputation
rule-based
security
social
systematic-approach
wiki
Filter by Author
[+]
OR
AND
NOT
1
Anirban Basu
Audun Jøsang
Changyu Dong
Christian Damsgaard Jensen
Davide Ceolin
Ehud Gudes
Georgios Pitsilis
Jie Zhang
Jin-Hee Cho
Naranker Dulay
Natasha Dwyer
Nurit Gal-Oz
Peter Herrmann
Pramod S. Pawar
Shinsaku Kiyomoto
Stephen Marsh
Stephen Marsh 0001
Theo Dimitrakos
Tim Muller
Valérie Issarny
Filter by Top terms
[+]
OR
AND
NOT
1
approach
cloud
data
ifiptm
information
international
management
model
models
networks
privacy
proceedings
reputation
security
service
system
systems
towards
trust
using
IFIPTM (ifiptm)
Editions
Publications
Viewing Publication 1 - 100 from 283
2019
A Framework for Blockchain-Based Verification of Integrity and Authenticity
Anirban Basu
,
Theo Dimitrakos
,
Yuto Nakano
,
Shinsaku Kiyomoto
.
ifiptm 2019
:
196-208
[doi]
A Granular Approach to Source Trustworthiness for Negative Trust Assessment
Davide Ceolin
,
Giuseppe Primiero
.
ifiptm 2019
:
108-121
[doi]
SDKSE-KGA: A Secure Dynamic Keyword Searchable Encryption Scheme Against Keyword Guessing Attacks
Hongyuan Chen
,
Zhenfu Cao
,
Xiaolei Dong
,
Jiachen Shen
.
ifiptm 2019
:
162-177
[doi]
Trusting the IoT: There Is More to Trust Than Trustworthiness
Piotr Cofta
.
ifiptm 2019
:
98-107
[doi]
GDPR Modelling for Log-Based Compliance Checking
Colombe de Montety
,
Thibaud Antignac
,
Christophe Slim
.
ifiptm 2019
:
1-18
[doi]
User Recognition Based on Daily Actigraphy Patterns
Enrique Garcia-Ceja
,
Brice Morin
.
ifiptm 2019
:
73-80
[doi]
Value-Based Core Areas of Trustworthiness in Online Services
Danny S. Guamán
,
José M. del Álamo
,
Hristina Veljanova
,
Stefan Reichmann
,
Anna Haselbacher
.
ifiptm 2019
:
81-97
[doi]
On Trust Confusional, Trust Ignorant, and Trust Transitions
Yoshinobu Kawabe
,
Yuki Koizumi
,
Tetsushi Ohki
,
Masakatsu Nishigaki
,
Toru Hasegawa
,
Tetsuhisa Oda
.
ifiptm 2019
:
178-195
[doi]
Trust Management XIII - 13th IFIP WG 11.11 International Conference, IFIPTM 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings
Weizhi Meng
,
Piotr Cofta
,
Christian Damsgaard Jensen
,
Tyrone Grandison
, editors,
Volume 563 of
IFIP Advances in Information and Communication Technology
, Springer,
2019.
[doi]
An Unforeseen Equivalence Between Uncertainty and Entropy
Tim Muller
.
ifiptm 2019
:
57-72
[doi]
TPL: A Trust Policy Language
Sebastian Mödersheim
,
Anders Schlichtkrull
,
Georg Wagner
,
Stefan More
,
Lukas Alber
.
ifiptm 2019
:
209-223
[doi]
CrowdLED: Towards Crowd-Empowered and Privacy-Preserving Data Sharing Using Smart Contracts
Constantinos Pouyioukka
,
Thanassis Giannetsos
,
Weizhi Meng
.
ifiptm 2019
:
147-161
[doi]
Why We Trust Dynamic Consent to Deliver on Privacy
Arianna Schuler Scott
,
Michael Goldsmith
,
Harriet Teare
,
Helena Webb
,
Sadie Creese
.
ifiptm 2019
:
28-38
[doi]
A Fair (t, n)-Threshold Secret Sharing Scheme with Efficient Cheater Identifying
Hua Shen
,
Daijie Sun
,
Lan Zhao
,
Mingwu Zhang
.
ifiptm 2019
:
122-132
[doi]
The Reputation Lag Attack
Sean Sirur
,
Tim Muller
.
ifiptm 2019
:
39-56
[doi]
emmy - Trust-Enhancing Authentication Library
Miha Stopar
,
Manca Bizjak
,
Jolanda Modic
,
Jan Hartman
,
Anze Zitnik
,
Tilen Marc
.
ifiptm 2019
:
133-146
[doi]
A Role and Trust Access Control Model for Preserving Privacy and Image Anonymization in Social Networks
Nadav Voloch
,
Priel Nissim
,
Mor Elmakies
,
Ehud Gudes
.
ifiptm 2019
:
19-27
[doi]
2018
Public Privacy and Brick Houses Made of Glass
Stephen Marsh 0001
,
Ada Diaconescu
,
David Evans
,
Tracy Ann Kosa
,
Peter R. Lewis
,
Sheikh Mahbub Habib
.
ifiptm 2018
:
137-148
[doi]
Continuous User Authentication Using Smartwatch Motion Sensor Data
Neamah Al-Naffakh
,
Nathan L. Clarke
,
Fudong Li
.
ifiptm 2018
:
15-28
[doi]
Towards a Computational Model of Information Trust
Tosan Atele-Williams
,
Stephen Marsh 0001
.
ifiptm 2018
:
124-136
[doi]
Privacy Policy Annotation for Semi-automated Analysis: A Cost-Effective Approach
Dhiren A. Audich
,
Rozita Dara
,
Blair Nonnecke
.
ifiptm 2018
:
29-44
[doi]
The Impact of Competence and Benevolence in a Computational Model of Trust
Ameneh Deljoo
,
Tom M. van Engers
,
Leon Gommans
,
Cees de Laat
.
ifiptm 2018
:
45-57
[doi]
How to Develop a Security Controls Oriented Reference Architecture for Cloud, IoT and SDN/NFV Platforms
Theo Dimitrakos
.
ifiptm 2018
:
1-14
[doi]
Trust Management XII - 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10-13, 2018, Proceedings
Nurit Gal-Oz
,
Peter R. Lewis
, editors,
Volume 528 of
IFIP Advances in Information and Communication Technology
, Springer,
2018.
[doi]
CodeTrust - Trusting Software Systems
Christian Damsgaard Jensen
,
Michael Bøndergaard Nielsen
.
ifiptm 2018
:
58-74
[doi]
Visualisation of Trust and Quality Information for Geospatial Dataset Selection and Use: Drawing Trust Presentation Comparisons with B2C e-Commerce
Victoria Lush
,
Jo Lumsden
,
Lucy Bastin
.
ifiptm 2018
:
75-90
[doi]
The Social Construction of "Shared Reality" in Socio-Technical Systems
Kristina Milanovic
,
Jeremy Pitt
.
ifiptm 2018
:
149-159
[doi]
Crowdsourcing Under Attack: Detecting Malicious Behaviors in Waze
Luis Sanchez
,
Erika Rosas
,
Nicolas Hidalgo
.
ifiptm 2018
:
91-106
[doi]
From Knowledge to Trust: A Logical Framework for Pre-trust Computations
Mirko Tagliaferri
,
Alessandro Aldini
.
ifiptm 2018
:
107-123
[doi]
2017
VIGraph - A Framework for Verifiable Information
Anirban Basu
,
Mohammad Shahriar Rahman
,
Rui Xu
,
Kazuhide Fukushima
,
Shinsaku Kiyomoto
.
ifiptm 2017
:
12-20
[doi]
Self-reported Verifiable Reputation with Rater Privacy
Rémi Bazin
,
Alexander Schaub
,
Omar Hasan
,
Lionel Brunie
.
ifiptm 2017
:
180-195
[doi]
Social Network Analysis for Trust Prediction
Davide Ceolin
,
Simone Potenza
.
ifiptm 2017
:
49-56
[doi]
A Flexible Privacy-Preserving Framework for Singular Value Decomposition Under Internet of Things Environment
Shuo Chen
,
Rongxing Lu
,
Jie Zhang
.
ifiptm 2017
:
21-37
[doi]
The Game of Trust: Using Behavioral Experiment as a Tool to Assess and Collect Trust-Related Data
Diego de Siqueira Braga
,
Marco Niemann
,
Bernd Hellingrath
,
Fernando Buarque de Lima Neto
.
ifiptm 2017
:
41-48
[doi]
Self-trust, Self-efficacy and Digital Learning
Natasha Dwyer
,
Stephen Marsh 0001
.
ifiptm 2017
:
110-115
[doi]
Partial Commitment - "Try Before You Buy" and "Buyer's Remorse" for Personal Data in Big Data & Machine Learning
Lothar Fritsch
.
ifiptm 2017
:
3-11
[doi]
Trust Trust Me (The Additivity)
Ken Mano
,
Hideki Sakurada
,
Yasuyuki Tsukada
.
ifiptm 2017
:
135-151
[doi]
Towards Statistical Trust Computation for Medical Smartphone Networks Based on Behavioral Profiling
Weizhi Meng
,
Man Ho Au
.
ifiptm 2017
:
152-159
[doi]
Investigating Security Capabilities in Service Level Agreements as Trust-Enhancing Instruments
Yudhistira Nugraha
,
Andrew Martin
.
ifiptm 2017
:
57-75
[doi]
Advanced Flow Models for Computing the Reputation of Internet Domains
Hussien Othman
,
Ehud Gudes
,
Nurit Gal-Oz
.
ifiptm 2017
:
119-134
[doi]
Strong Accountability and Its Contribution to Trustworthy Data Handling in the Information Society
Siani Pearson
.
ifiptm 2017
:
199-218
[doi]
Managing Software Uninstall with Negative Trust
Giuseppe Primiero
,
Jaap Boender
.
ifiptm 2017
:
79-93
[doi]
Reputation-Enhanced Recommender Systems
Christian Richthammer
,
Michael Weber
,
Günther Pernul
.
ifiptm 2017
:
163-179
[doi]
Trust Management XI - 11th IFIP WG 11.11 International Conference, IFIPTM 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedings
Jan-Philipp Steghöfer
,
Babak Esfandiari
, editors,
Volume 505 of
IFIP Advances in Information and Communication Technology
, Springer,
2017.
[doi]
Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions
Emmanouil Vasilomanolakis
,
Sheikh Mahbub Habib
,
Pavlos Milaszewicz
,
Rabee Sohail Malik
,
Max Mühlhäuser
.
ifiptm 2017
:
94-109
[doi]
2016
The Wisdom of Being Wise: A Brief Introduction to Computational Wisdom
Stephen Marsh 0001
,
Mark M. Dibben
,
Natasha Dwyer
.
ifiptm 2016
:
137-145
[doi]
Supporting Coordinated Maintenance of System Trustworthiness and User Trust at Runtime
Torsten Bandyszak
,
Micha Moffie
,
Abigail Goldsteen
,
Panos Melas
,
Bassem I. Nasser
,
Costas Kalogiros
,
Gabriele Barni
,
Sandro Hartenstein
,
Giorgos Giotis
,
Thorsten Weyer
.
ifiptm 2016
:
96-112
[doi]
A Model for Personalised Perception of Policies
Anirban Basu
,
Stephen Marsh 0001
,
Mohammad Shahriar Rahman
,
Shinsaku Kiyomoto
.
ifiptm 2016
:
52-62
[doi]
A Trust-Based Framework for Information Sharing Between Mobile Health Care Applications
Saghar Behrooz
,
Stephen Marsh 0001
.
ifiptm 2016
:
79-95
[doi]
Transparency, Privacy and Trust - Technology for Tracking and Controlling My Data Disclosures: Does This Work?
Simone Fischer-Hübner
,
Julio Angulo
,
Farzaneh Karegar
,
Tobias Pulls
.
ifiptm 2016
:
3-14
[doi]
Trust Management X - 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings
Sheikh Mahbub Habib
,
Julita Vassileva
,
Sjouke Mauw
,
Max Mühlhäuser
, editors,
Volume 473 of
IFIP Advances in Information and Communication Technology
, Springer,
2016.
[doi]
Towards Behavioural Computer Science
Christian Johansen
,
Tore Pedersen
,
Audun Jøsang
.
ifiptm 2016
:
154-163
[doi]
Trust and Regulation Conceptualisation: The Foundation for User-Defined Cloud Policies
Jörg Kebbedies
,
Felix Kluge
,
Iris Braun
,
Alexander Schill
.
ifiptm 2016
:
174-182
[doi]
Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation
Wenjuan Li
,
Lijun Jiang
,
Weizhi Meng
,
Lam-for Kwok
.
ifiptm 2016
:
146-153
[doi]
Enhancing Business Process Models with Trustworthiness Requirements
Nazila Gol Mohammadi
,
Maritta Heisel
.
ifiptm 2016
:
33-51
[doi]
Limitations on Robust Ratings and Predictions
Tim Muller
,
Yang Liu
,
Jie Zhang
.
ifiptm 2016
:
113-126
[doi]
How to Use Information Theory to Mitigate Unfair Rating Attacks
Tim Muller
,
Dongxia Wang
,
Yang Liu
,
Jie Zhang
.
ifiptm 2016
:
17-32
[doi]
I Don't Trust ICT: Research Challenges in Cyber Security
Félix Gómez Mármol
,
Manuel Gil Pérez
,
Gregorio Martínez Pérez
.
ifiptm 2016
:
129-136
[doi]
A Calculus for Distrust and Mistrust
Giuseppe Primiero
.
ifiptm 2016
:
183-190
[doi]
Improving Interpretations of Trust Claims
Marc Sel
.
ifiptm 2016
:
164-173
[doi]
Evaluation of Privacy-ABC Technologies - a Study on the Computational Efficiency
Fatbardh Veseli
,
Jetzabel Serna
.
ifiptm 2016
:
63-78
[doi]
2015
Trust Driven Strategies for Privacy by Design
Thibaud Antignac
,
Daniel Le Métayer
.
ifiptm 2015
:
60-75
[doi]
Lightweight Practical Private One-Way Anonymous Messaging
Anirban Basu
,
Juan Camilo Corena
,
Jaideep Vaidya
,
Jon Crowcroft
,
Shinsaku Kiyomoto
,
Stephen Marsh
,
Yung Shin Van Der Sype
,
Toru Nakamura
.
ifiptm 2015
:
76-91
[doi]
Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation
Alexandru Butoi
,
Mircea Moca
,
Nicolae Tomai
.
ifiptm 2015
:
177-184
[doi]
Integrating Security Services in Cloud Service Stores
Joshua Daniel
,
Fadi El-Moussa
,
Gery Ducatel
,
Pramod S. Pawar
,
Ali Sajjad
,
Robert Rowlingson
,
Theo Dimitrakos
.
ifiptm 2015
:
226-239
[doi]
Foreword: Towards Trusted Cloud Ecosystems
Theo Dimitrakos
.
ifiptm 2015
:
215-216
[doi]
The Detail of Trusted Messages: Retweets in a Context of Health and Fitness
Natasha Dwyer
,
Stephen Marsh
.
ifiptm 2015
:
185-194
[doi]
Social Network Culture Needs the Lens of Critical Trust Research
Natasha Dwyer
,
Stephen Marsh
.
ifiptm 2015
:
126-133
[doi]
Mathematical Modelling of Trust Issues in Federated Identity Management
Md. Sadek Ferdous
,
Gethin Norman
,
Audun Jøsang
,
Ron Poet
.
ifiptm 2015
:
13-29
[doi]
The Role of SLAs in Building a Trusted Cloud for Europe
Ana Juan Ferrer
,
Enric Pages i Montanera
.
ifiptm 2015
:
262-275
[doi]
Enabling NAME-Based Security and Trust
Nikos Fotiou
,
George C. Polyzos
.
ifiptm 2015
:
47-59
[doi]
A Cloud Orchestrator for Deploying Public Services on the Cloud - The Case of STRATEGIC Project
Panagiotis Gouvas
,
Konstantinos Kalaboukas
,
Giannis Ledakis
,
Theo Dimitrakos
,
Joshua Daniel
,
Gery Ducatel
,
Nuria Rodriguez Dominguez
.
ifiptm 2015
:
217-225
[doi]
Reputation - from Social Perception to Internet Security
Ehud Gudes
.
ifiptm 2015
:
3-10
[doi]
Continuous Context-Aware Device Comfort Evaluation Method
Jingjing Guo
,
Christian Damsgaard Jensen
,
Jianfeng Ma
.
ifiptm 2015
:
203-211
[doi]
Obscuring Provenance Confidential Information via Graph Transformation
Jamal Hussein
,
Luc Moreau
,
Vladimiro Sassone
.
ifiptm 2015
:
109-125
[doi]
Trust Management IX - 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings
Christian Damsgaard Jensen
,
Stephen Marsh
,
Theo Dimitrakos
,
Yuko Murayama
, editors,
Volume 454 of
IFIP Advances in Information and Communication Technology
, Springer,
2015.
[doi]
Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings
Paul Lajoie-Mazenc
,
Emmanuelle Anceaume
,
Gilles Guette
,
Thomas Sirvent
,
Valérie Viet Triem Tong
.
ifiptm 2015
:
92-108
[doi]
1, 2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space
Ijlal Loutfi
,
Audun Jøsang
.
ifiptm 2015
:
165-176
[doi]
Predicting Quality of Crowdsourced Annotations Using Graph Kernels
Archana Nottamkandath
,
Jasper Oosterman
,
Davide Ceolin
,
Gerben Klaas Dirk de Vries
,
Wan Fokkink
.
ifiptm 2015
:
134-148
[doi]
Security-as-a-Service in Multi-cloud and Federated Cloud Environments
Pramod S. Pawar
,
Ali Sajjad
,
Theo Dimitrakos
,
David W. Chadwick
.
ifiptm 2015
:
251-261
[doi]
Reusable Defense Components for Online Reputation Systems
Johannes Sänger
,
Christian Richthammer
,
Artur Rösch
,
Günther Pernul
.
ifiptm 2015
:
195-202
[doi]
Building an Eco-System of Trusted Services via User Control and Transparency on Personal Data
Michele Vescovi
,
Corrado Moiso
,
Mattia Pasolli
,
Lorenzo Cordin
,
Fabrizio Antonelli
.
ifiptm 2015
:
240-250
[doi]
An Architecture for Trustworthy Open Data Services
Andrew Wong
,
Vicky Liu
,
William J. Caelli
,
Tony Sahama
.
ifiptm 2015
:
149-162
[doi]
Simple and Practical Integrity Models for Binaries and Files
Yongzheng Wu
,
Roland H. C. Yap
.
ifiptm 2015
:
30-46
[doi]
2014
A Calculus for Trust and Reputation Systems
Alessandro Aldini
.
ifiptm 2014
:
173-188
[doi]
On the Tradeoff among Trust, Privacy, and Cost in Incentive-Based Networks
Alessandro Aldini
,
Alessandro Bogliolo
,
Carlos Ballester Lafuente
,
Jean-Marc Seigneur
.
ifiptm 2014
:
205-212
[doi]
A Privacy Risk Model for Trajectory Data
Anirban Basu
,
Anna Monreale
,
Juan Camilo Corena
,
Fosca Giannotti
,
Dino Pedreschi
,
Shinsaku Kiyomoto
,
Yutaka Miyake
,
Tadashi Yanagihara
,
Roberto Trasarti
.
ifiptm 2014
:
125-140
[doi]
Abstract Accountability Language
Walid Benghabrit
,
Hervé Grall
,
Jean-Claude Royer
,
Mohamed Sellami
,
Karin Bernsmed
,
Anderson Santana de Oliveira
.
ifiptm 2014
:
229-236
[doi]
Anomaly Detection for Mobile Device Comfort
Mehmet Vefa Bicakci
,
Babak Esfandiari
,
Stephen Marsh
.
ifiptm 2014
:
93-108
[doi]
Reputation-Based Cooperation in the Clouds
Alessandro Celestini
,
Alberto Lluch-Lafuente
,
Philip Mayer
,
Stefano Sebastio
,
Francesco Tiezzi
.
ifiptm 2014
:
213-220
[doi]
Knots Maintenance for Optimal Management of Trust Relations
Libi Gur
,
Nurit Gal-Oz
,
Ehud Gudes
.
ifiptm 2014
:
189-204
[doi]
Improving the Exchange of Lessons Learned in Security Incident Reports: Case Studies in the Privacy of Electronic Patient Records
Ying He
,
Chris Johnson
,
Yu Lyu
,
Arniyati Ahmad
.
ifiptm 2014
:
109-124
[doi]
The Importance of Trust in Computer Security
Christian Damsgaard Jensen
.
ifiptm 2014
:
1-12
[doi]
Extending Trust Management with Cooperation Incentives: Achieving Collaborative Wi-Fi Sharing Using Trust Transfer to Stimulate Cooperative Behaviours
Carlos Ballester Lafuente
,
Jean-Marc Seigneur
.
ifiptm 2014
:
157-172
[doi]
Trust Assessment Using Cloud Broker
Pramod S. Pawar
,
Muttukrishnan Rajarajan
,
Theo Dimitrakos
,
Andrea Zisman
.
ifiptm 2014
:
237-244
[doi]
Introducing Patient and Dentist Profiling and Crowdsourcing to Improve Trust in Dental Care Recommendation Systems
Sojen Pradhan
,
Valérie Gay
.
ifiptm 2014
:
221-228
[doi]
Reusability for Trust and Reputation Systems
Johannes Sänger
,
Günther Pernul
.
ifiptm 2014
:
28-43
[doi]
Providing Trustworthy Advice Online - An Exploratory Study on the Potential of Discursive Psychology in Trust Research
Sarah Talboom
,
Jo Pierson
.
ifiptm 2014
:
141-156
[doi]
TrustMUSE: A Model-Driven Approach for Trust Management
Mark Vinkovits
,
René Reiners
,
Andreas Zimmermann
.
ifiptm 2014
:
13-27
[doi]
Trust Management VIII - 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014. Proceedings
Jianying Zhou
,
Nurit Gal-Oz
,
Jie Zhang 0002
,
Ehud Gudes
, editors,
Volume 430 of
IFIP Advances in Information and Communication Technology
, Springer,
2014.
[doi]
Sign in
or
sign up
to see more results.