default search action
9. IFIPTM 2015: Hamburg, Germany
- Christian Damsgaard Jensen, Stephen Marsh, Theo Dimitrakos, Yuko Murayama:
Trust Management IX - 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology 454, Springer 2015, ISBN 978-3-319-18490-6
Winsborough Award Invited Paper
- Ehud Gudes:
Reputation - from Social Perception to Internet Security. 3-10
Full Papers
- Md. Sadek Ferdous, Gethin Norman, Audun Jøsang, Ron Poet:
Mathematical Modelling of Trust Issues in Federated Identity Management. 13-29 - Yongzheng Wu, Roland H. C. Yap:
Simple and Practical Integrity Models for Binaries and Files. 30-46 - Nikos Fotiou, George C. Polyzos:
Enabling NAME-Based Security and Trust. 47-59 - Thibaud Antignac, Daniel Le Métayer:
Trust Driven Strategies for Privacy by Design. 60-75 - Anirban Basu, Juan Camilo Corena, Jaideep Vaidya, Jon Crowcroft, Shinsaku Kiyomoto, Stephen Marsh, Yung Shin Van Der Sype, Toru Nakamura:
Lightweight Practical Private One-Way Anonymous Messaging. 76-91 - Paul Lajoie-Mazenc, Emmanuelle Anceaume, Gilles Guette, Thomas Sirvent, Valérie Viet Triem Tong:
Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings. 92-108 - Jamal Ali Hussein, Luc Moreau, Vladimiro Sassone:
Obscuring Provenance Confidential Information via Graph Transformation. 109-125 - Natasha Dwyer, Stephen Marsh:
Social Network Culture Needs the Lens of Critical Trust Research. 126-133 - Archana Nottamkandath, Jasper Oosterman, Davide Ceolin, Gerben Klaas Dirk de Vries, Wan J. Fokkink:
Predicting Quality of Crowdsourced Annotations Using Graph Kernels. 134-148 - Andrew Wong, Vicky Liu, William J. Caelli, Tony Sahama:
An Architecture for Trustworthy Open Data Services. 149-162
Short Papers
- Ijlal Loutfi, Audun Jøsang:
1, 2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space. 165-176 - Alexandru Butoi, Mircea Moca, Nicolae Tomai:
Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation. 177-184 - Natasha Dwyer, Stephen Marsh:
The Detail of Trusted Messages: Retweets in a Context of Health and Fitness. 185-194 - Johannes Sänger, Christian Richthammer, Artur Rösch, Günther Pernul:
Reusable Defense Components for Online Reputation Systems. 195-202 - Jingjing Guo, Christian Damsgaard Jensen, Jianfeng Ma:
Continuous Context-Aware Device Comfort Evaluation Method. 203-211
Special Session: Toward Trusted Cloud Ecosystems
- Theo Dimitrakos:
Foreword: Towards Trusted Cloud Ecosystems. 215-216 - Panagiotis Gouvas, Konstantinos Kalaboukas, Giannis Ledakis, Theo Dimitrakos, Joshua Daniel, Gery Ducatel, Nuria Rodriguez Dominguez:
A Cloud Orchestrator for Deploying Public Services on the Cloud - The Case of STRATEGIC Project. 217-225 - Joshua Daniel, Fadi Ali El-Moussa, Gery Ducatel, Pramod S. Pawar, Ali Sajjad, Robert Rowlingson, Theo Dimitrakos:
Integrating Security Services in Cloud Service Stores. 226-239 - Michele Vescovi, Corrado Moiso, Mattia Pasolli, Lorenzo Cordin, Fabrizio Antonelli:
Building an Eco-System of Trusted Services via User Control and Transparency on Personal Data. 240-250 - Pramod S. Pawar, Ali Sajjad, Theo Dimitrakos, David W. Chadwick:
Security-as-a-Service in Multi-cloud and Federated Cloud Environments. 251-261 - Ana Juan Ferrer, Enric Pages i Montanera:
The Role of SLAs in Building a Trusted Cloud for Europe. 262-275
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.