Abstract is missing.
- Symbolic Privacy Analysis through Linkability and DetectabilityMeilof Veeningen, Benne de Weger, Nicola Zannone. 1-16 [doi]
- Middleware-Based Security and Privacy for In-car Integration of Third-Party ApplicationsAlexandre Bouard, Maximilian Graf, Dennis Burgkhardt. 17-32 [doi]
- Towards Automated Trust Establishment in Federated Identity ManagementDavid W. Chadwick, Mark Hibbert. 33-48 [doi]
- On Beta Models with Trust ChainsTim Muller, Patrick Schweitzer. 49-65 [doi]
- Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive ReviewHani Alzaid, Manal Alfaraj, Sebastian Ries, Audun Jøsang, Muneera Albabtain, Alhanof Abuhaimed. 66-82 [doi]
- Understanding Trust within Online Discussion Boards: Trust Formation in the Absence of Reputation SystemsSarah Talboom, Jo Pierson. 83-99 [doi]
- In Cloud We Trust: Risk-Assessment-as-a-ServiceMarianthi Theoharidou, Nikolaos Tsalis, Dimitris Gritzalis. 100-110 [doi]
- An Empirical Test of How Events Turn the Cognitive Gears of TrustD. Harrison McKnight, Peng Liu 0012. 111-126 [doi]
- Reflections on Measuring the Trust Empowerment Potential of a Digital EnvironmentNatasha Dwyer, Anirban Basu, Stephen Marsh. 127-135 [doi]
- Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak IntegrityHenrich Christopher Pöhls. 136-150 [doi]
- Securing Identity Assignment Using Implicit Certificates in P2P OverlaysJuan Caubet, Oscar Esparza, Juanjo Alins, Jorge Mata-Díaz, Miguel Soriano. 151-165 [doi]
- Impact of Dataset Representation on Smartphone Malware Detection PerformanceAbdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert. 166-176 [doi]
- Sensor Enhanced Access Control: Extending Traditional Access Control Models with Context-AwarenessChristian Damsgaard Jensen, Kristine Geneser, Ida C. Willemoes-Wissing. 177-192 [doi]
- Noninterference Analysis of Delegation Subterfuge in Distributed Authorization SystemsSimon N. Foley. 193-207 [doi]
- An Automatic Trust Calculation Based on the Improved Kalman Filter Detection AlgorithmBo Ye, Mohammad Ghavami, Anjum Pervez, Maziar Nekovee. 208-222 [doi]
- The Method of Trust and Reputation Systems Based on Link Prediction and ClusteringJiwan Seo, Seungjin Choi, Sangyong Han. 223-230 [doi]
- Network-Aware Evaluation Environment for Reputation SystemsAlessandro Celestini, Rocco De Nicola, Francesco Tiezzi. 231-238 [doi]
- Trust Model for Cloud Based on Cloud CharacteristicsPramod S. Pawar, Muttukrishnan Rajarajan, Theo Dimitrakos, Andrea Zisman. 239-246 [doi]
- Modeling Reactive Trust Acquisition Using State Transition SystemsSergiy Gladysh, Peter Herrmann. 247-254 [doi]
- Towards Trust-Aware and Self-adaptive SystemsFrancisco Moyano, Benoit Baudry, Javier Lopez. 255-262 [doi]
- An Attack-Resistant Hybrid Data-Privatization Method with Low Information LossKalpana Singh, Lynn Margaret Batten. 263-271 [doi]
- PERSONA - A Personalized Data Protection FrameworkMarina Egea, Federica Paci, Marinella Petrocchi, Nicola Zannone. 272-280 [doi]
- A Socio-technical Understanding of TLS Certificate ValidationGiampaolo Bella, Rosario Giustolisi, Gabriele Lenzini. 281-288 [doi]