Abstract is missing.
- Co-evolving Trust Mechanisms for Catering User BehaviorTanja Azderska. 1-16 [doi]
- Perturbation Based Privacy Preserving Slope One Predictors for Collaborative FilteringAnirban Basu, Jaideep Vaidya, Hiroaki Kikuchi. 17-35 [doi]
- Robustness of Trust Models and Combinations for Handling Unfair RatingsLizi Zhang, Siwei Jiang, Jie Zhang, Wee Keong Ng. 36-51 [doi]
- A Provenance-Based Trust Model for Delay Tolerant NetworksJin-Hee Cho, Moonjeong Chang, Ing-Ray Chen, Ananthram Swami. 52-67 [doi]
- Trust Transitivity and Conditional Belief ReasoningAudun Jøsang, Tanja Azderska, Stephen Marsh. 68-83 [doi]
- Incorporating Honeypot for Intrusion Detection in Cloud InfrastructureBhavesh Borisaniya, Avi Patel, Dhiren R. Patel, Hiren Patel. 84-96 [doi]
- Trust Model for Optimized Cloud ServicesPramod S. Pawar, Muttukrishnan Rajarajan, Srijith Krishnan Nair, Andrea Zisman. 97-112 [doi]
- Post-Session AuthenticationNaveed Ahmed, Christian Damsgaard Jensen. 113-128 [doi]
- An Efficient Approach for Privacy Preserving Distributed K-Means Clustering Based on Shamir's Secret Sharing SchemeSankita Patel, Sweta Garasia, Devesh C. Jinwala. 129-141 [doi]
- From Subjective Reputation to Verifiable Experiences - Augmenting Peer-Control Mechanisms for Open Service EcosystemsSini Ruohomaa, Puneet Kaur, Lea Kutvonen. 142-157 [doi]
- Integrating Indicators of Trustworthiness into Reputation-Based Trust Models - Insurance, Certification, and CoalitionsSascha Hauke, Florian Volk, Sheikh Mahbub Habib, Max Mühlhäuser. 158-173 [doi]
- Finding Trusted Publish/Subscribe TreesStephen Naicken, Ian Wakeman, Dan Chalmers. 174-190 [doi]
- Rendering unto Cæsar the Things That Are Cæsar's: Complex Trust Models and Human UnderstandingStephen Marsh, Anirban Basu, Natasha Dwyer. 191-200 [doi]
- Trust Management Framework for Attenuation of Application Layer DDoS Attack in Cloud ComputingDipen Contractor, Dhiren R. Patel. 201-208 [doi]
- An Incentive Mechanism to Promote Honesty in E-marketplaces with Limited InventoryYuan Liu, Jie Zhang, Qin Li. 209-216 [doi]
- How Events Affect Trust: A Baseline Information Processing Model with Three ExtensionsD. Harrison McKnight, Peng Liu 0012, Brian T. Pentland. 217-224 [doi]
- Improvements over Extended LMAP+: RFID Authentication ProtocolJitendra B. Gurubani, Harsh Thakkar, Dhiren R. Patel. 225-231 [doi]
- Automated Evaluation of Annotators for Museum Collections Using Subjective LogicDavide Ceolin, Archana Nottamkandath, Wan Fokkink. 232-239 [doi]
- A New Data Integrity Checking Protocol with Public Verifiability in Cloud StorageMihir R. Gohel, Bhavesh N. Gohil. 240-246 [doi]
- Document and Author Promotion Strategies in the Secure Wiki ModelKasper Lindberg, Christian Damsgaard Jensen. 247-252 [doi]
- Robustness of Trust and Reputation Systems: Does It Matter?Audun Jøsang. 253-262 [doi]
- transCryptFS: A Trusted and Secure File SystemRajat Moona. 263 [doi]
- Operational Challenges in Deploying Trust Management Systems - A Practical PerspectiveSundeep Oberoi. 264-266 [doi]
- A Perspective on the Evolution of the International Trust Management Research Community in the Last DecadeTheo Dimitrakos. 267-280 [doi]