Abstract is missing.
- Private Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of TrustDanfeng Yao, Roberto Tamassia, Seth Proctor. 1-16 [doi]
- Trust Transfer in Distributed SystemsChangyu Dong, Giovanni Russello, Naranker Dulay. 17-29 [doi]
- Trust without TruthMichel Deriaz. 31-45 [doi]
- Mining and Detecting Connection-Chains in Network TrafficAhmad Almulhem, Issa Traoré. 47-57 [doi]
- A Privacy-Aware Service Discovery Middleware for Pervasive EnvironmentsRoberto Speicys Cardoso, Pierre-Guillaume Raverdy, Valérie Issarny. 59-74 [doi]
- Analysis of the implicit trust within the OLSR protocolAsmaa Adnane, Rafael Timóteo de Sousa Júnior, Christophe Bidan, Ludovic Mé. 75-90 [doi]
- Validating a Trust-based Access Control SystemWilliam Joseph Adams, Nathaniel J. Davis IV. 91-106 [doi]
- Negotiation for Authorisation in Virtual OrganisationsShamimabi Paurobally. 107-122 [doi]
- A Geo Time Authentication SystemLeonardo Mostarda, Arianna Tocchio, Paola Inverardi, Stefania Costantini. 123-138 [doi]
- Content Trust Model for Detecting Web SpamWei Wang 0033, Guosun Zeng. 139-152 [doi]
- Applied Computational Trust in Utilities Management: a Case Study on The Town Council of Cava de' TirreniPierpaolo Dondio, Edmondo Manzo, Stephen Barrett. 153-168 [doi]
- A trust protocol for community collaborationSamuel Galice, Marine Minier, Stéphane Ubéda. 169-184 [doi]
- Towards an Understanding of Security, Privacy and Safety in Maritime Self-Reporting SystemsMark McIntyre, Lynne Genik, Peter Mason, Tim Hammond. 185-206 [doi]
- Dismantling the Twelve Privacy PurposesSabah Al-Fedaghi. 207-222 [doi]
- A Framework for Privacy-Preserving E-learningEsma Aïmeur, Hicham Hage, Flavien Serge Mani Onana. 223-238 [doi]
- Exploiting Trust and Suspicion for Real-time Attack Recognition in Recommender ApplicationsEbrahim Bagheri, Ali A. Ghorbani. 239-254 [doi]
- Self-Selection Bias in Reputation SystemsMark A. Kramer. 255-268 [doi]
- Resisting Sybils in Peer-to-peer MarketsJonathan Traupman. 269-284 [doi]
- A Trust Model for an Open, Decentralized Reputation SystemAndreas Gutscher. 285-300 [doi]
- Control Flow Based Pointcuts for Security Hardening ConcernsMarc-André Laverdière, Azzam Mourad, Andrei Soeanu, Mourad Debbabi. 301-316 [doi]
- Design of Trusted Systems with Reusable Collaboration ModelsPeter Herrmann, Frank Alexander Kraemer. 317-332 [doi]
- MUQAMI: A Locally Distributed Key Management Scheme for Clustered Sensor NetworksSyed Muhammad Khaliq-ur-Rahman Raazi, Adil Mehmood Khan, Faraz Idris Khan, Sungyoung Lee, Young-Jae Song, Young-Koo Lee. 333-348 [doi]
- Trust based Approach for Improving Data Reliability in Industrial Sensor NetworksTatyana Ryutov, B. Clifford Neuman. 349-365 [doi]
- The AI Hardness of CAPTCHAs does not imply Robust Network SecurityAllan Caine, Urs Hengartner. 367-382 [doi]
- Resilia: a Safe and Secure Distributed Backup System for Small and Medium EnterprisesChristian Damsgaard Jensen, Fernando Meira, Jacob Nittegaard-Nielsen. 383-398 [doi]
- Integrity in Open Collaborative Authoring SystemsChristian Damsgaard Jensen. 399-402 [doi]
- Service-Oriented Approach to Visualize IT Security Performance MetricsClemens Martin, Mustapha Refai. 403-406 [doi]
- From Early Requirements Analysis towards Secure WorkflowsGanna Frankova, Fabio Massacci, Magali Seguran. 407-410 [doi]
- Monitors for Usage ControlManuel Hilty, Alexander Pretschner, David A. Basin, Christian Schaefer, Thomas Walter. 411-414 [doi]
- Design of Trusted Systems with Reusable Collaboration ModelsPeter Herrmann, Frank Alexander Kraemer. 417 [doi]