4. iTrust 2006:
Pisa,
Italy
Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio Massacci (Eds.):
Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings.
Lecture Notes in Computer Science 3986 Springer 2006, ISBN 3-540-34295-8
Invited Talks
Full Papers
- Mehran Ahsant, Mike Surridge, Thomas Leonard, Ananth Krishna, Olle Mulmo:
Dynamic Trust Federation in Grids.
3-18
- Cristiano Castelfranchi, Rino Falcone, Francesca Marzo:
Being Trusted in a Social Network: Trust as Relational Capital.
19-32
- Suroop Mohan Chandran, Korporn Panyim, James B. D. Joshi:
A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments.
33-47
- Dag Elgesem:
Normative Structures in Trust Management.
48-61
- Colin English, Sotirios Terzis:
Gathering Experience in Trust-Based Interactions.
62-76
- Noria Foukia, Li Zhou, B. Clifford Neuman:
Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail.
77-92
- Jennifer Golbeck:
Generating Predictive Movie Recommendations from Trust in Social Networks.
93-104
- Peter Herrmann:
Temporal Logic-Based Specification and Verification of Trust Models.
105-119
- Gert Jan Hofstede, Catholijn M. Jonker, Sebastiaan Meijer, Tim Verwaart:
Modelling Trade and Trust Across Cultures.
120-134
- Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray:
Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation.
135-149
- Christian Damsgaard Jensen, Paul O'Connell:
Trust-Based Route Selection in Dynamic Source Routing.
150-163
- Jacek Jonczy, Rolf Haenni:
Implementing Credential Networks.
164-178
- Audun Jøsang, Stephen Marsh, Simon Pope:
Exploring Different Types of Trust Propagation.
179-192
- Florian Kerschbaum, Jochen Haller, Yücel Karabulut, Philip Robinson:
PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation.
193-205
- Tomas Klos, Han La Poutré:
A Versatile Approach to Combining Trust Values for Making Binary Decisions.
206-220
- Evangelos Kotsovinos, Petros Zerfos, Nischal M. Piratla, Niall Cameron, Sachin Agarwal:
Jiminy: A Scalable Incentive-Based Architecture for Improving Rating Quality.
221-235
- Adam J. Lee, Marianne Winslett:
Virtual Fingerprinting as a Foundation for Reputation in Open Systems.
236-251
- Siani Pearson:
Towards Automated Evaluation of Trust Constraints.
252-266
- Siani Pearson, Marco Casassa Mont:
Provision of Trusted Identity Management Using Trust Credentials.
267-282
- Wolter Pieters:
Acceptance of Voting Technology: Between Confidence and Trust.
283-297
- Daniele Quercia, Stephen Hailes, Licia Capra:
B-Trust: Bayesian Trust Framework for Pervasive Computing.
298-312
- Daniele Quercia, Stephen Hailes, Licia Capra:
TATA: Towards Anonymous Trusted Authentication.
313-323
- Karl Quinn, Declan O'Sullivan, David Lewis, Vincent P. Wade:
The Design, Generation, and Utilisation of a Semantically Rich Personalised Model of Trust.
324-338
- Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya:
A Trust Assignment Model Based on Alternate Actions Payoff.
339-353
- Giovanni Sartor:
Privacy, Reputation, and Trust: Some Implications for Data Protection.
354-366
- Christoph Sorge, Martina Zitterbart:
A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks.
367-381
- Jonathan Traupman, Robert Wilensky:
Robust Reputations for Peer-to-Peer Marketplaces.
382-396
- Asimina Vasalou, Jeremy Pitt, Guillaume Piolle:
From Theory to Practice: Forgiveness as a Mechanism to Repair Conflicts in CMC.
397-411
- Kouki Yonezawa:
A Novel Protocol for Communicating Reputation in P2P Networks.
412-422
- Xiaoqing Zheng, Zhaohui Wu, Huajun Chen, Yuxin Mao:
A Scalable Probabilistic Approach to Trust Evaluation.
423-438
Demonstration Overviews
- Karen Fullam, Tomas Klos, Guillaume Muller, Jordi Sabater-Mir, K. Suzanne Barber, Laurent Vercouter:
The Agent Reputation and Trust (ART) Testbed.
439-442
- Laurent Gomez, Ulrich Jansen:
Trust Establishment in Emergency Case.
443-448
- Jacek Jonczy:
Evaluating Trust and Authenticity with Caution.
449-453
- Evangelos Kotsovinos, Petros Zerfos, Nischal M. Piratla, Niall Cameron:
Using Jiminy for Run-Time User Classification Based on Rating Behaviour.
454-457
- Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch:
Traust: A Trust Negotiation Based Authorization Service.
458-462
- Philipp Obreiter, Birgitta König-Ries:
The Interactive Cooperation Tournament.
463-466
- Judith E. Y. Rossebø, Scott Cadzow, Paul Sijben:
eTVRA, a Threat, Vulnerability and Risk Assessment Tool for eEurope.
467-471
Copyright © Sun Mar 14 23:14:41 2010
by Michael Ley (ley@uni-trier.de)