default search action
4. iTrust 2006: Pisa, Italy
- Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio Massacci:
Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings. Lecture Notes in Computer Science 3986, Springer 2006, ISBN 3-540-34295-8
Invited Talks
- Cristiano Castelfranchi:
Why We Need a Non-reductionist Approach to Trust. 1-2
Full Papers
- Mehran Ahsant, Mike Surridge, Thomas Leonard, Ananth Krishna, Olle Mulmo:
Dynamic Trust Federation in Grids. 3-18 - Cristiano Castelfranchi, Rino Falcone, Francesca Marzo:
Being Trusted in a Social Network: Trust as Relational Capital. 19-32 - Suroop Mohan Chandran, Korporn Panyim, James B. D. Joshi:
A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments. 33-47 - Dag Elgesem:
Normative Structures in Trust Management. 48-61 - Colin English, Sotirios Terzis:
Gathering Experience in Trust-Based Interactions. 62-76 - Noria Foukia, Li Zhou, B. Clifford Neuman:
Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail. 77-92 - Jennifer Golbeck:
Generating Predictive Movie Recommendations from Trust in Social Networks. 93-104 - Peter Herrmann:
Temporal Logic-Based Specification and Verification of Trust Models. 105-119 - Gert Jan Hofstede, Catholijn M. Jonker, Sebastiaan A. Meijer, Tim Verwaart:
Modelling Trade and Trust Across Cultures. 120-134 - Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray:
Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. 135-149 - Christian Damsgaard Jensen, Paul O'Connell:
Trust-Based Route Selection in Dynamic Source Routing. 150-163 - Jacek Jonczy, Rolf Haenni:
Implementing Credential Networks. 164-178 - Audun Jøsang, Stephen Marsh, Simon Pope:
Exploring Different Types of Trust Propagation. 179-192 - Florian Kerschbaum, Jochen Haller, Yücel Karabulut, Philip Robinson:
PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation. 193-205 - Tomas Klos, Han La Poutré:
A Versatile Approach to Combining Trust Values for Making Binary Decisions. 206-220 - Evangelos Kotsovinos, Petros Zerfos, Nischal M. Piratla, Niall Cameron, Sachin Agarwal:
Jiminy: A Scalable Incentive-Based Architecture for Improving Rating Quality. 221-235 - Adam J. Lee, Marianne Winslett:
Virtual Fingerprinting as a Foundation for Reputation in Open Systems. 236-251 - Siani Pearson:
Towards Automated Evaluation of Trust Constraints. 252-266 - Siani Pearson, Marco Casassa Mont:
Provision of Trusted Identity Management Using Trust Credentials. 267-282 - Wolter Pieters:
Acceptance of Voting Technology: Between Confidence and Trust. 283-297 - Daniele Quercia, Stephen Hailes, Licia Capra:
B-Trust: Bayesian Trust Framework for Pervasive Computing. 298-312 - Daniele Quercia, Stephen Hailes, Licia Capra:
TATA: Towards Anonymous Trusted Authentication. 313-323 - Karl Quinn, Declan O'Sullivan, David Lewis, Vincent P. Wade:
The Design, Generation, and Utilisation of a Semantically Rich Personalised Model of Trust. 324-338 - Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya:
A Trust Assignment Model Based on Alternate Actions Payoff. 339-353 - Giovanni Sartor:
Privacy, Reputation, and Trust: Some Implications for Data Protection. 354-366 - Christoph Sorge, Martina Zitterbart:
A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks. 367-381 - Jonathan Traupman, Robert Wilensky:
Robust Reputations for Peer-to-Peer Marketplaces. 382-396 - Asimina Vasalou, Jeremy Pitt, Guillaume Piolle:
From Theory to Practice: Forgiveness as a Mechanism to Repair Conflicts in CMC. 397-411 - Kouki Yonezawa:
A Novel Protocol for Communicating Reputation in P2P Networks. 412-422 - Xiaoqing Zheng, Zhaohui Wu, Huajun Chen, Yuxin Mao:
A Scalable Probabilistic Approach to Trust Evaluation. 423-438
Demonstration Overviews
- Karen Fullam, Tomas Klos, Guillaume Muller, Jordi Sabater-Mir, K. Suzanne Barber, Laurent Vercouter:
The Agent Reputation and Trust (ART) Testbed. 439-442 - Laurent Gomez, Ulrich Jansen:
Trust Establishment in Emergency Case. 443-448 - Jacek Jonczy:
Evaluating Trust and Authenticity with Caution. 449-453 - Evangelos Kotsovinos, Petros Zerfos, Nischal M. Piratla, Niall Cameron:
Using Jiminy for Run-Time User Classification Based on Rating Behaviour. 454-457 - Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch:
Traust: A Trust Negotiation Based Authorization Service. 458-462 - Philipp Obreiter, Birgitta König-Ries:
The Interactive Cooperation Tournament. 463-466 - Judith E. Y. Rossebø, Scott Cadzow, Paul Sijben:
eTVRA, a Threat, Vulnerability and Risk Assessment Tool for eEurope. 467-471
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.