Trust Management III

Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009. Proceedings

Editors:

ISBN: 978-3-642-02055-1 (Print) 978-3-642-02056-8 (Online)

Table of contents (23 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Social Aspects and Usability

    1. No Access

      Book Chapter

      Pages 1-14

      Spiral of Hatred: Social Effects in Buyer-Seller Cross-Comments Left on Internet Auctions

    2. No Access

      Book Chapter

      Pages 15-29

      Graphical Passwords as Browser Extension: Implementation and Usability Study

  3. Trust Reasoning and Processing

    1. No Access

      Book Chapter

      Pages 30-46

      Trust-Enhanced Recommender Systems for Efficient On-Line Collaboration

    2. No Access

      Book Chapter

      Pages 47-64

      Towards Understanding the Requirements and Limitations of Reputation-Based Systems

    3. No Access

      Book Chapter

      Pages 65-80

      Elimination of Subjectivity from Trust Recommendation

  4. Data Security

    1. No Access

      Book Chapter

      Pages 81-98

      Security in Wiki-Style Authoring Systems

    2. No Access

      Book Chapter

      Pages 99-116

      On Usage Control in Data Grids

    3. No Access

      Book Chapter

      Pages 117-132

      Detection and Prevention of Insider Threats in Database Driven Web Services

  5. Enhancements to Subjective Logic

    1. No Access

      Book Chapter

      Pages 133-148

      Inferring Trust Based on Similarity with TILLIT

    2. No Access

      Book Chapter

      Pages 149-163

      Analogical Trust Reasoning

  6. Information Sharing

    1. No Access

      Book Chapter

      Pages 164-175

      TIUPAM: A Framework for Trustworthiness-Centric Information Sharing

    2. No Access

      Book Chapter

      Pages 176-195

      TrustBuilder2: A Reconfigurable Framework for Trust Negotiation

    3. No Access

      Book Chapter

      Pages 196-214

      A Relational Wrapper for RDF Reification

  7. Risk Assessment

    1. No Access

      Book Chapter

      Pages 215-233

      Employing Key Indicators to Provide a Dynamic Risk Picture with a Notion of Confidence

    2. No Access

      Book Chapter

      Pages 234-251

      A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy

  8. Simulation of Trust and Reputation Systems

    1. No Access

      Book Chapter

      Pages 252-266

      An Experimental Testbed for Evaluation of Trust and Reputation Systems

    2. No Access

      Book Chapter

      Pages 267-282

      Evaluating the STORE Reputation System in Multi-Agent Simulations

    3. No Access

      Book Chapter

      Pages 283-297

      Comparison of the Beta and the Hidden Markov Models of Trust in Dynamic Environments

  9. Demonstration Abstracts

    1. No Access

      Book Chapter

      Pages 298-301

      WRS: The Wikipedia Recommender System

    2. No Access

      Book Chapter

      Pages 302-305

      Distributed Systems Security Governance, a SOA Based Approach

previous Page of 2