Abstract is missing.
- Reputation - from Social Perception to Internet SecurityEhud Gudes. 3-10 [doi]
- Mathematical Modelling of Trust Issues in Federated Identity ManagementMd. Sadek Ferdous, Gethin Norman, Audun Jøsang, Ron Poet. 13-29 [doi]
- Simple and Practical Integrity Models for Binaries and FilesYongzheng Wu, Roland H. C. Yap. 30-46 [doi]
- Enabling NAME-Based Security and TrustNikos Fotiou, George C. Polyzos. 47-59 [doi]
- Trust Driven Strategies for Privacy by DesignThibaud Antignac, Daniel Le Métayer. 60-75 [doi]
- Lightweight Practical Private One-Way Anonymous MessagingAnirban Basu, Juan Camilo Corena, Jaideep Vaidya, Jon Crowcroft, Shinsaku Kiyomoto, Stephen Marsh, Yung Shin Van Der Sype, Toru Nakamura. 76-91 [doi]
- Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative RatingsPaul Lajoie-Mazenc, Emmanuelle Anceaume, Gilles Guette, Thomas Sirvent, Valérie Viet Triem Tong. 92-108 [doi]
- Obscuring Provenance Confidential Information via Graph TransformationJamal Hussein, Luc Moreau, Vladimiro Sassone. 109-125 [doi]
- Social Network Culture Needs the Lens of Critical Trust ResearchNatasha Dwyer, Stephen Marsh. 126-133 [doi]
- Predicting Quality of Crowdsourced Annotations Using Graph KernelsArchana Nottamkandath, Jasper Oosterman, Davide Ceolin, Gerben Klaas Dirk de Vries, Wan Fokkink. 134-148 [doi]
- An Architecture for Trustworthy Open Data ServicesAndrew Wong, Vicky Liu, William J. Caelli, Tony Sahama. 149-162 [doi]
- 1, 2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions SpaceIjlal Loutfi, Audun Jøsang. 165-176 [doi]
- Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack EvaluationAlexandru Butoi, Mircea Moca, Nicolae Tomai. 177-184 [doi]
- The Detail of Trusted Messages: Retweets in a Context of Health and FitnessNatasha Dwyer, Stephen Marsh. 185-194 [doi]
- Reusable Defense Components for Online Reputation SystemsJohannes Sänger, Christian Richthammer, Artur Rösch, Günther Pernul. 195-202 [doi]
- Continuous Context-Aware Device Comfort Evaluation MethodJingjing Guo, Christian Damsgaard Jensen, Jianfeng Ma. 203-211 [doi]
- Foreword: Towards Trusted Cloud EcosystemsTheo Dimitrakos. 215-216 [doi]
- A Cloud Orchestrator for Deploying Public Services on the Cloud - The Case of STRATEGIC ProjectPanagiotis Gouvas, Konstantinos Kalaboukas, Giannis Ledakis, Theo Dimitrakos, Joshua Daniel, Gery Ducatel, Nuria Rodriguez Dominguez. 217-225 [doi]
- Integrating Security Services in Cloud Service StoresJoshua Daniel, Fadi El-Moussa, Gery Ducatel, Pramod S. Pawar, Ali Sajjad, Robert Rowlingson, Theo Dimitrakos. 226-239 [doi]
- Building an Eco-System of Trusted Services via User Control and Transparency on Personal DataMichele Vescovi, Corrado Moiso, Mattia Pasolli, Lorenzo Cordin, Fabrizio Antonelli. 240-250 [doi]
- Security-as-a-Service in Multi-cloud and Federated Cloud EnvironmentsPramod S. Pawar, Ali Sajjad, Theo Dimitrakos, David W. Chadwick. 251-261 [doi]
- The Role of SLAs in Building a Trusted Cloud for EuropeAna Juan Ferrer, Enric Pages i Montanera. 262-275 [doi]