Abstract is missing.
- How to Develop a Security Controls Oriented Reference Architecture for Cloud, IoT and SDN/NFV PlatformsTheo Dimitrakos. 1-14 [doi]
- Continuous User Authentication Using Smartwatch Motion Sensor DataNeamah Al-Naffakh, Nathan L. Clarke, Fudong Li. 15-28 [doi]
- Privacy Policy Annotation for Semi-automated Analysis: A Cost-Effective ApproachDhiren A. Audich, Rozita Dara, Blair Nonnecke. 29-44 [doi]
- The Impact of Competence and Benevolence in a Computational Model of TrustAmeneh Deljoo, Tom M. van Engers, Leon Gommans, Cees de Laat. 45-57 [doi]
- CodeTrust - Trusting Software SystemsChristian Damsgaard Jensen, Michael Bøndergaard Nielsen. 58-74 [doi]
- Visualisation of Trust and Quality Information for Geospatial Dataset Selection and Use: Drawing Trust Presentation Comparisons with B2C e-CommerceVictoria Lush, Jo Lumsden, Lucy Bastin. 75-90 [doi]
- Crowdsourcing Under Attack: Detecting Malicious Behaviors in WazeLuis Sanchez, Erika Rosas, Nicolas Hidalgo. 91-106 [doi]
- From Knowledge to Trust: A Logical Framework for Pre-trust ComputationsMirko Tagliaferri, Alessandro Aldini. 107-123 [doi]
- Towards a Computational Model of Information TrustTosan Atele-Williams, Stephen Marsh 0001. 124-136 [doi]
- Public Privacy and Brick Houses Made of GlassStephen Marsh 0001, Ada Diaconescu, David Evans, Tracy Ann Kosa, Peter R. Lewis, Sheikh Mahbub Habib. 137-148 [doi]
- The Social Construction of "Shared Reality" in Socio-Technical SystemsKristina Milanovic, Jeremy Pitt. 149-159 [doi]