1 | -- | 2 | Sjouke Mauw, Valérie Issarny, Cas J. F. Cremers. Preface |
3 | -- | 9 | Dieter Gollmann. Why Trust is Bad for Security |
11 | -- | 25 | Daniel Cvrcek, Petr Svenda. Smart Dust Security - Key Infection Revisited |
27 | -- | 41 | Simona Orzan, Erik P. de Vink. Multiparty Contract Signing Over a Reliable Network |
43 | -- | 59 | J. Todd McDonald, Alec Yasinsac. Application Security Models for Mobile Agent Systems |
61 | -- | 78 | Roberto Gorrieri, Fabio Martinelli, Marinella Petrocchi. A Formalization of Credit and Responsibility Within the GNDC Schema |
79 | -- | 94 | Katja Schmidt-Samoa. A New Rabin-type Trapdoor Permutation Equivalent to Factoring |
95 | -- | 111 | Elizabeth Gray, Christian Damsgaard Jensen, Paul O Connell, Stefan Weber, Jean-Marc Seigneur, Yong Chen. Trust Evolution Policies for Security in Collaborative Ad Hoc Applications |
113 | -- | 130 | Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Jerry den Hartog. Nonmonotonic Trust Management for P2P Applications |
131 | -- | 142 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati, Marco Viviani. A WOWA-based Aggregation Technique on Trust Values Connected to Metadata |
143 | -- | 158 | Thomas B. Quillinan, Simon N. Foley. Synchronisation in Trust Management Using Push Authorisation |