Trust Management VI

6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings

ISBN: 978-3-642-29851-6 (Print) 978-3-642-29852-3 (Online)

Table of contents (24 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Full Papers

    1. No Access

      Book Chapter

      Pages 1-16

      Co-evolving Trust Mechanisms for Catering User Behavior

    2. No Access

      Book Chapter

      Pages 17-35

      Perturbation Based Privacy Preserving Slope One Predictors for Collaborative Filtering

    3. No Access

      Book Chapter

      Pages 36-51

      Robustness of Trust Models and Combinations for Handling Unfair Ratings

    4. No Access

      Book Chapter

      Pages 52-67

      A Provenance-Based Trust Model for Delay Tolerant Networks

    5. No Access

      Book Chapter

      Pages 68-83

      Trust Transitivity and Conditional Belief Reasoning

    6. No Access

      Book Chapter

      Pages 84-96

      Incorporating Honeypot for Intrusion Detection in Cloud Infrastructure

    7. No Access

      Book Chapter

      Pages 97-112

      Trust Model for Optimized Cloud Services

    8. No Access

      Book Chapter

      Pages 113-128

      Post-Session Authentication

    9. No Access

      Book Chapter

      Pages 129-141

      An Efficient Approach for Privacy Preserving Distributed K-Means Clustering Based on Shamir’s Secret Sharing Scheme

    10. No Access

      Book Chapter

      Pages 142-157

      From Subjective Reputation to Verifiable Experiences — Augmenting Peer-Control Mechanisms for Open Service Ecosystems

    11. No Access

      Book Chapter

      Pages 158-173

      Integrating Indicators of Trustworthiness into Reputation-Based Trust Models

    12. No Access

      Book Chapter

      Pages 174-190

      Finding Trusted Publish/Subscribe Trees

  3. Short Papers

    1. No Access

      Book Chapter

      Pages 191-200

      Rendering unto Cæsar the Things That Are Cæsar’s: Complex Trust Models and Human Understanding

    2. No Access

      Book Chapter

      Pages 201-208

      Trust Management Framework for Attenuation of Application Layer DDoS Attack in Cloud Computing

    3. No Access

      Book Chapter

      Pages 209-216

      An Incentive Mechanism to Promote Honesty in E-marketplaces with Limited Inventory

    4. No Access

      Book Chapter

      Pages 217-224

      How Events Affect Trust: A Baseline Information Processing Model with Three Extensions

    5. No Access

      Book Chapter

      Pages 225-231

      Improvements over Extended LMAP+: RFID Authentication Protocol

    6. No Access

      Book Chapter

      Pages 232-239

      Automated Evaluation of Annotators for Museum Collections Using Subjective Logic

    7. No Access

      Book Chapter

      Pages 240-246

      A New Data Integrity Checking Protocol with Public Verifiability in Cloud Storage

    8. No Access

      Book Chapter

      Pages 247-252

      Document and Author Promotion Strategies in the Secure Wiki Model

previous Page of 2