default search action
7. IFIPTM 2013: Malaga, Spain
- M. Carmen Fernández Gago, Fabio Martinelli, Siani Pearson, Isaac Agudo:
Trust Management VII - 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings. IFIP Advances in Information and Communication Technology 401, Springer 2013, ISBN 978-3-642-38322-9
Full Papers
- Meilof Veeningen, Benne de Weger, Nicola Zannone:
Symbolic Privacy Analysis through Linkability and Detectability. 1-16 - Alexandre Bouard, Maximilian Graf, Dennis Burgkhardt:
Middleware-Based Security and Privacy for In-car Integration of Third-Party Applications. 17-32 - David W. Chadwick, Mark Hibbert:
Towards Automated Trust Establishment in Federated Identity Management. 33-48 - Tim Muller, Patrick Schweitzer:
On Beta Models with Trust Chains. 49-65 - Hani Alzaid, Manal Alfaraj, Sebastian Ries, Audun Jøsang, Muneera Albabtain, Alhanof Abuhaimed:
Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review. 66-82 - Sarah Talboom, Jo Pierson:
Understanding Trust within Online Discussion Boards: Trust Formation in the Absence of Reputation Systems. 83-99 - Marianthi Theoharidou, Nikolaos Tsalis, Dimitris Gritzalis:
In Cloud We Trust: Risk-Assessment-as-a-Service. 100-110 - D. Harrison McKnight, Peng Liu:
An Empirical Test of How Events Turn the Cognitive Gears of Trust. 111-126 - Natasha Dwyer, Anirban Basu, Stephen Marsh:
Reflections on Measuring the Trust Empowerment Potential of a Digital Environment. 127-135 - Henrich Christopher Pöhls:
Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity. 136-150 - Juan Caubet, Oscar Esparza, Juanjo Alins, Jorge Mata-Díaz, Miguel Soriano:
Securing Identity Assignment Using Implicit Certificates in P2P Overlays. 151-165 - Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert:
Impact of Dataset Representation on Smartphone Malware Detection Performance. 166-176 - Christian Damsgaard Jensen, Kristine Geneser, Ida C. Willemoes-Wissing:
Sensor Enhanced Access Control: Extending Traditional Access Control Models with Context-Awareness. 177-192 - Simon N. Foley:
Noninterference Analysis of Delegation Subterfuge in Distributed Authorization Systems. 193-207
Short Papers
- Bo Ye, Mohammad Ghavami, Anjum Pervez, Maziar M. Nekovee:
An Automatic Trust Calculation Based on the Improved Kalman Filter Detection Algorithm. 208-222 - Jiwan Seo, Seungjin Choi, Sangyong Han:
The Method of Trust and Reputation Systems Based on Link Prediction and Clustering. 223-230 - Alessandro Celestini, Rocco De Nicola, Francesco Tiezzi:
Network-Aware Evaluation Environment for Reputation Systems. 231-238 - Pramod S. Pawar, Muttukrishnan Rajarajan, Theo Dimitrakos, Andrea Zisman:
Trust Model for Cloud Based on Cloud Characteristics. 239-246 - Sergiy Gladysh, Peter Herrmann:
Modeling Reactive Trust Acquisition Using State Transition Systems. 247-254 - Francisco Moyano, Benoit Baudry, Javier López:
Towards Trust-Aware and Self-adaptive Systems. 255-262 - Kalpana Singh, Lynn Margaret Batten:
An Attack-Resistant Hybrid Data-Privatization Method with Low Information Loss. 263-271 - Marina Egea, Federica Paci, Marinella Petrocchi, Nicola Zannone:
PERSONA - A Personalized Data Protection Framework. 272-280 - Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini:
A Socio-technical Understanding of TLS Certificate Validation. 281-288
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.