Abstract is missing.
- Why We Need a Non-reductionist Approach to TrustCristiano Castelfranchi. 1-2 [doi]
- Dynamic Trust Federation in GridsMehran Ahsant, Mike Surridge, Thomas Leonard, Ananth Krishna, Olle Mulmo. 3-18 [doi]
- Being Trusted in a Social Network: Trust as Relational CapitalCristiano Castelfranchi, Rino Falcone, Francesca Marzo. 19-32 [doi]
- A Requirements-Driven Trust Framework for Secure Interoperation in Open EnvironmentsSuroop Mohan Chandran, Korporn Panyim, James B. D. Joshi. 33-47 [doi]
- Normative Structures in Trust ManagementDag Elgesem. 48-61 [doi]
- Gathering Experience in Trust-Based InteractionsColin English, Sotirios Terzis. 62-76 [doi]
- Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mailNoria Foukia, Li Zhou, B. Clifford Neuman. 77-92 [doi]
- Generating Predictive Movie Recommendations from Trust in Social NetworksJennifer Golbeck. 93-104 [doi]
- Temporal Logic-Based Specification and Verification of Trust ModelsPeter Herrmann. 105-119 [doi]
- Modelling Trade and Trust Across CulturesGert Jan Hofstede, Catholijn M. Jonker, Sebastiaan Meijer, Tim Verwaart. 120-134 [doi]
- Estimating the Relative Trustworthiness of Information Sources in Security Solution EvaluationSiv Hilde Houmb, Indrakshi Ray, Indrajit Ray. 135-149 [doi]
- Trust-Based Route Selection in Dynamic Source RoutingChristian Damsgaard Jensen, Paul O Connell. 150-163 [doi]
- Implementing Credential NetworksJacek Jonczy, Rolf Haenni. 164-178 [doi]
- Exploring Different Types of Trust PropagationAudun Jøsang, Stephen Marsh, Simon Pope. 179-192 [doi]
- PathTrust: A Trust-Based Reputation Service for Virtual Organization FormationFlorian Kerschbaum, Jochen Haller, Yücel Karabulut, Philip Robinson. 193-205 [doi]
- A Versatile Approach to Combining Trust Values for Making Binary DecisionsTomas Klos, Han La Poutré. 206-220 [doi]
- Jiminy: A Scalable Incentive-Based Architecture for Improving Rating QualityEvangelos Kotsovinos, Petros Zerfos, Nischal M. Piratla, Niall Cameron, Sachin Agarwal. 221-235 [doi]
- Virtual Fingerprinting as a Foundation for Reputation in Open SystemsAdam J. Lee, Marianne Winslett. 236-251 [doi]
- Towards Automated Evaluation of Trust ConstraintsSiani Pearson. 252-266 [doi]
- Provision of Trusted Identity Management Using Trust CredentialsSiani Pearson, Marco Casassa Mont. 267-282 [doi]
- Acceptance of Voting Technology: Between Confidence and TrustWolter Pieters. 283-297 [doi]
- B-Trust: Bayesian Trust Framework for Pervasive ComputingDaniele Quercia, Stephen Hailes, Licia Capra. 298-312 [doi]
- TATA: Towards Anonymous Trusted AuthenticationDaniele Quercia, Stephen Hailes, Licia Capra. 313-323 [doi]
- The Design, Generation, and Utilisation of a Semantically Rich Personalised Model of TrustKarl Quinn, Declan O Sullivan, David Lewis, Vincent P. Wade. 324-338 [doi]
- A Trust Assignment Model Based on Alternate Actions PayoffVidyaraman Sankaranarayanan, Shambhu J. Upadhyaya. 339-353 [doi]
- Privacy, Reputation, and Trust: Some Implications for Data ProtectionGiovanni Sartor. 354-366 [doi]
- A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer NetworksChristoph Sorge, Martina Zitterbart. 367-381 [doi]
- Robust Reputations for Peer-to-Peer MarketplacesJonathan Traupman, Robert Wilensky. 382-396 [doi]
- From Theory to Practice: Forgiveness as a Mechanism to Repair Conflicts in CMCAsimina Vasalou, Jeremy Pitt, Guillaume Piolle. 397-411 [doi]
- A Novel Protocol for Communicating Reputation in P2P NetworksKouki Yonezawa. 412-422 [doi]
- A Scalable Probabilistic Approach to Trust EvaluationXiaoqing Zheng, Zhaohui Wu, Huajun Chen, Yuxin Mao. 423-438 [doi]
- The Agent Reputation and Trust (ART) TestbedKaren Fullam, Tomas Klos, Guillaume Muller, Jordi Sabater-Mir, K. Suzanne Barber, Laurent Vercouter. 439-442 [doi]
- Trust Establishment in Emergency CaseLaurent Gomez, Ulrich Jansen. 443-448 [doi]
- Evaluating Trust and Authenticity with CautionJacek Jonczy. 449-453 [doi]
- Using Jiminy for Run-Time User Classification Based on Rating BehaviourEvangelos Kotsovinos, Petros Zerfos, Nischal M. Piratla, Niall Cameron. 454-457 [doi]
- Traust: A Trust Negotiation Based Authorization ServiceAdam J. Lee, Marianne Winslett, Jim Basney, Von Welch. 458-462 [doi]
- The Interactive Cooperation TournamentPhilipp Obreiter, Birgitta König-Ries. 463-466 [doi]
- ::::e::::TVRA, a Threat, Vulnerability and Risk Assessment Tool for ::::e::::EuropeJudith E. Y. Rossebø, Scott Cadzow, Paul Sijben. 467-471 [doi]