default search action
2. IFIPTM 2008: Trondheim, Norway
- Yücel Karabulut, John Mitchell, Peter Herrmann, Christian Damsgaard Jensen:
Trust Management II - Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway. IFIP Advances in Information and Communication Technology 263, Springer 2008, ISBN 978-0-387-09427-4 - Marcin Czenko, Jeroen Doumen, Sandro Etalle:
Trust Management in P2P Systems Using Standard TuLiP. 1-16 - Reto Kohlas, Jacek Jonczy, Rolf Haenni:
A Trust Evaluation Method Based on Logic and Probability Theory. 17-32 - Atle Refsdal, Bjørnar Solhaug, Ketil Stølen:
A UML-based Method for the Development of Policies to Support Trust Management. 33-49 - Sebastian Ries, Andreas Heinemann:
Analyzing the Robustness of CertainTrust. 51-67 - Kaiyu Wan, Vasu S. Alagar:
An Intensional Functional Model of Trust. 69-85 - Pierpaolo Dondio, Luca Longo, Stephen Barrett:
A Translation Mechanism for Recommendations. 87-102 - Georgios Pitsilis, Lindsay F. Marshall:
Modeling Trust for Recommender Systems using Similarity Metrics. 103-118 - Neal Lathia, Stephen Hailes, Licia Capra:
Trust-Based Collaborative Filtering. 119-134 - Matteo Dell'Amico, Licia Capra:
SOFIA: Social Filtering for Robust Recommendations. 135-150 - Audun Jøsang, Xixi Luo, Xiaowu Chen:
Continuous Ratings in Discrete Bayesian Reputation Systems. 151-166 - Nurit Gal-Oz, Ehud Gudes, Danny Hendler:
A Robust and Knot-Aware Trust-Based Reputation Model. 167-182 - Jon Robinson, Ian Wakeman, Dan Chalmers, Anirban Basu:
The North Laine Shopping Guide: A Case Study in Modelling Trust in Applications. 183-197 - Rowan Martin-Hughes:
Cooperation in Growing Communities. 199-214 - Roberto Speicys Cardoso, Valérie Issarny:
A Model for Reasoning About the Privacy Impact of Composite Service Execution in Pervasive Computing. 215-230 - Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri:
Protecting Location Privacy through Semantics-aware Obfuscation Techniques. 231-245 - Erik Buchmann, Klemens Böhm, Oliver Raabe:
Privacy2.0: Towards Collaborative Data-Privacy Protection. 247-262 - Stéphanie Delaune, Mark Ryan, Ben Smyth:
Automatic Verification of Privacy Properties in the Applied pi Calculus. 263-278 - Leonardo Mostarda, Changyu Dong, Naranker Dulay:
Place and Time Authentication of Cultural Assets. 279-294 - Felix Halim, Rajiv Ramnath, Sufatrio, Yongzheng Wu, Roland H. C. Yap:
A Lightweight Binary Authentication System for Windows. 295-310 - Adam J. Lee, Marianne Winslett:
Towards Standards-Compliant Trust Negotiation for Web Services. 311-326 - Keith Irwin, Ting Yu, William H. Winsborough:
Assigning Responsibility for Failed Obligations. 327-342 - Mohd M. Anwar, Jim E. Greer:
Role- and Relationship-Based Identity Management for Private yet Accountable E-Learning. 343-358 - Clive Cox:
Using Rummble as a Personalised Travel Guide. 359-362 - Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka:
An Inline Monitoring System for .NET Mobile Devices. 363-366 - Jochen Haller:
STORE Stochastic Reputation Service for Virtual Organisations. 367-370
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.