


default search action
2. IFIPTM 2008: Trondheim, Norway
- Yücel Karabulut, John Mitchell, Peter Herrmann

, Christian Damsgaard Jensen:
Trust Management II - Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway. IFIP Advances in Information and Communication Technology 263, Springer 2008, ISBN 978-0-387-09427-4 - Marcin Czenko, Jeroen Doumen, Sandro Etalle:

Trust Management in P2P Systems Using Standard TuLiP. 1-16 - Reto Kohlas, Jacek Jonczy, Rolf Haenni:

A Trust Evaluation Method Based on Logic and Probability Theory. 17-32 - Atle Refsdal, Bjørnar Solhaug, Ketil Stølen:

A UML-based Method for the Development of Policies to Support Trust Management. 33-49 - Sebastian Ries, Andreas Heinemann:

Analyzing the Robustness of CertainTrust. 51-67 - Kaiyu Wan, Vasu S. Alagar:

An Intensional Functional Model of Trust. 69-85 - Pierpaolo Dondio

, Luca Longo
, Stephen Barrett:
A Translation Mechanism for Recommendations. 87-102 - Georgios Pitsilis, Lindsay F. Marshall

:
Modeling Trust for Recommender Systems using Similarity Metrics. 103-118 - Neal Lathia, Stephen Hailes, Licia Capra:

Trust-Based Collaborative Filtering. 119-134 - Matteo Dell'Amico

, Licia Capra:
SOFIA: Social Filtering for Robust Recommendations. 135-150 - Audun Jøsang

, Xixi Luo, Xiaowu Chen:
Continuous Ratings in Discrete Bayesian Reputation Systems. 151-166 - Nurit Gal-Oz, Ehud Gudes, Danny Hendler:

A Robust and Knot-Aware Trust-Based Reputation Model. 167-182 - Jon Robinson, Ian Wakeman

, Dan Chalmers, Anirban Basu:
The North Laine Shopping Guide: A Case Study in Modelling Trust in Applications. 183-197 - Rowan Martin-Hughes

:
Cooperation in Growing Communities. 199-214 - Roberto Speicys Cardoso, Valérie Issarny:

A Model for Reasoning About the Privacy Impact of Composite Service Execution in Pervasive Computing. 215-230 - Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri

:
Protecting Location Privacy through Semantics-aware Obfuscation Techniques. 231-245 - Erik Buchmann, Klemens Böhm, Oliver Raabe:

Privacy2.0: Towards Collaborative Data-Privacy Protection. 247-262 - Stéphanie Delaune, Mark Ryan

, Ben Smyth:
Automatic Verification of Privacy Properties in the Applied pi Calculus. 263-278 - Leonardo Mostarda, Changyu Dong, Naranker Dulay:

Place and Time Authentication of Cultural Assets. 279-294 - Felix Halim, Rajiv Ramnath, Sufatrio, Yongzheng Wu, Roland H. C. Yap:

A Lightweight Binary Authentication System for Windows. 295-310 - Adam J. Lee, Marianne Winslett:

Towards Standards-Compliant Trust Negotiation for Web Services. 311-326 - Keith Irwin, Ting Yu, William H. Winsborough:

Assigning Responsibility for Failed Obligations. 327-342 - Mohd M. Anwar, Jim E. Greer:

Role- and Relationship-Based Identity Management for Private yet Accountable E-Learning. 343-358 - Clive Cox:

Using Rummble as a Personalised Travel Guide. 359-362 - Nicola Dragoni

, Fabio Massacci
, Katsiaryna Naliuka:
An Inline Monitoring System for .NET Mobile Devices. 363-366 - Jochen Haller:

STORE Stochastic Reputation Service for Virtual Organisations. 367-370

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














