Abstract is missing.
- From Access Control to Trust Management, and Back - A PetitionDieter Gollmann. 1-8 [doi]
- Familiarity Breeds Con-victims: Why We Need More Effective Trust SignalingMartina Angela Sasse, Iacovos Kirlappos. 9-12 [doi]
- The Evolution of TrustPam Briggs. 13-16 [doi]
- Detecting and Reacting to Changes in Reputation FlowsSini Ruohomaa, Aleksi Hankalahti, Lea Kutvonen. 19-34 [doi]
- Validation and Verification of Agent Models for Trust: Independent Compared to Relative TrustMark Hoogendoorn, S. Waqar Jaffry, Peter-Paul van Maanen. 35-50 [doi]
- Composing Trust Models towards Interoperable Trust ManagementRachid Saadi, Mohammad Ashiqur Rahaman, Valérie Issarny, Alessandra Toninelli. 51-66 [doi]
- Identifying Knots of Trust in Virtual CommunitiesNurit Gal-Oz, Ran Yahalom, Ehud Gudes. 67-81 [doi]
- Clustering Recommenders in Collaborative Filtering Using Explicit Trust InformationGeorgios Pitsilis, Xiangliang Zhang, Wei Wang. 82-97 [doi]
- From Reputation Models and Systems to Reputation OntologiesRehab Alnemr, Christoph Meinel. 98-116 [doi]
- Enhancing Data Privacy in the CloudYanbin Lu, Gene Tsudik. 117-132 [doi]
- Longitude: A Privacy-Preserving Location Sharing Protocol for Mobile ApplicationsChangyu Dong, Naranker Dulay. 133-148 [doi]
- Physiological Measurement of Trust-Related Behavior in Trust-Neutral and Trust-Critical SituationsKarin Leichtenstern, Nikolaus Bee, Elisabeth André, Ulrich Berkmüller, Johannes Wagner. 165-172 [doi]
- Trusted Principal-Hosted Certificate RevocationSufatrio, Roland H. C. Yap. 173-189 [doi]
- On Tradeoffs between Trust and Survivability Using a Game Theoretic ApproachJin-Hee Cho, Ananthram Swami. 190-205 [doi]
- Prob-Cog: An Adaptive Filtering Model for Trust EvaluationZeinab Noorian, Stephen Marsh, Michael Fleming. 206-222 [doi]
- Privacy-Respecting Reputation for Wiki UsersBenjamin Kellermann, Stefanie Pötzsch, Sandra Steinbrecher. 223-239 [doi]
- Security and Privacy in E-consumer Protection in Victoria, AustraliaHuong Ha. 240-252 [doi]
- Proximity-Based Trust Inference for Mobile Social NetworkingAmir Seyedi, Rachid Saadi, Valérie Issarny. 253-264 [doi]
- Trust-Threshold Based Routing in Delay Tolerant NetworksMoonjeong Chang, Ing-Ray Chen, Fenye Bao, Jin-Hee Cho. 265-276 [doi]
- A Trust Management Framework for Detecting Malicious and Selfish Behaviour in Ad-Hoc Wireless Networks Using Fuzzy Sets and Grey TheoryJi Guo, Alan Marshall, Bosheng Zhou. 277-289 [doi]
- Regulatory Impact of Data Protection and Privacy in the CloudSakshi Porwal, Srijith K. Nair, Theo Dimitrakos. 290-299 [doi]
- Assessment of the Trustworthiness of Digital RecordsJianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård. 300-311 [doi]
- Taste and TrustAudun Jøsang, Walter Quattrociocchi, Dino Karabeg. 312-322 [doi]
- Trust Dynamics: A Data-Driven Simulation ApproachOlufunmilola Onolaja, Rami Bahsoon, Georgios Theodoropoulos. 323-334 [doi]