default search action
1st IFIPTM 2007: Moncton, New Brunswick, Canada
- Sandro Etalle, Stephen Marsh:
Trust Management - Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30- August 2, 2007, Moncton, New Brunswick, Canada. IFIP 238, Springer 2007, ISBN 978-0-387-73654-9 - Danfeng Yao, Roberto Tamassia, Seth Proctor:
Private Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust. 1-16 - Changyu Dong, Giovanni Russello, Naranker Dulay:
Trust Transfer in Distributed Systems. 17-29 - Michel Deriaz:
Trust without Truth. 31-45 - Ahmad Almulhem, Issa Traoré:
Mining and Detecting Connection-Chains in Network Traffic. 47-57 - Roberto Speicys Cardoso, Pierre-Guillaume Raverdy, Valérie Issarny:
A Privacy-Aware Service Discovery Middleware for Pervasive Environments. 59-74 - Asmaa Adnane, Rafael Timóteo de Sousa Júnior, Christophe Bidan, Ludovic Mé:
Analysis of the implicit trust within the OLSR protocol. 75-90 - William Joseph Adams, Nathaniel J. Davis IV:
Validating a Trust-based Access Control System. 91-106 - Shamimabi Paurobally:
Negotiation for Authorisation in Virtual Organisations. 107-122 - Leonardo Mostarda, Arianna Tocchio, Paola Inverardi, Stefania Costantini:
A Geo Time Authentication System. 123-138 - Wei Wang, Guosun Zeng:
Content Trust Model for Detecting Web Spam. 139-152 - Pierpaolo Dondio, Edmondo Manzo, Stephen Barrett:
Applied Computational Trust in Utilities Management: a Case Study on The Town Council of Cava de' Tirreni. 153-168 - Samuel Galice, Marine Minier, Stéphane Ubéda:
A trust protocol for community collaboration. 169-184 - Mark McIntyre, Lynne Genik, Peter Mason, Tim Hammond:
Towards an Understanding of Security, Privacy and Safety in Maritime Self-Reporting Systems. 185-206 - Sabah Al-Fedaghi:
Dismantling the Twelve Privacy Purposes. 207-222 - Esma Aïmeur, Hicham Hage, Flavien Serge Mani Onana:
A Framework for Privacy-Preserving E-learning. 223-238 - Ebrahim Bagheri, Ali A. Ghorbani:
Exploiting Trust and Suspicion for Real-time Attack Recognition in Recommender Applications. 239-254 - Mark A. Kramer:
Self-Selection Bias in Reputation Systems. 255-268 - Jonathan Traupman:
Resisting Sybils in Peer-to-peer Markets. 269-284 - Andreas Gutscher:
A Trust Model for an Open, Decentralized Reputation System. 285-300 - Marc-André Laverdière, Azzam Mourad, Andrei Soeanu, Mourad Debbabi:
Control Flow Based Pointcuts for Security Hardening Concerns. 301-316 - Peter Herrmann, Frank Alexander Kraemer:
Design of Trusted Systems with Reusable Collaboration Models. 317-332 - Syed Muhammad Khaliq-ur-Rahman Raazi, Adil Mehmood Khan, Faraz Idris Khan, Sungyoung Lee, Young Jae Song, Young-Koo Lee:
MUQAMI: A Locally Distributed Key Management Scheme for Clustered Sensor Networks. 333-348 - Tatyana Ryutov, B. Clifford Neuman:
Trust based Approach for Improving Data Reliability in Industrial Sensor Networks. 349-365 - Allan Caine, Urs Hengartner:
The AI Hardness of CAPTCHAs does not imply Robust Network Security. 367-382 - Christian Damsgaard Jensen, Fernando Meira, Jacob Nittegaard-Nielsen:
Resilia: a Safe and Secure Distributed Backup System for Small and Medium Enterprises. 383-398 - Christian Damsgaard Jensen:
Integrity in Open Collaborative Authoring Systems. 399-402 - Clemens Martin, Mustapha Refai:
Service-Oriented Approach to Visualize IT Security Performance Metrics. 403-406 - Ganna Frankova, Fabio Massacci, Magali Seguran:
From Early Requirements Analysis towards Secure Workflows. 407-410 - Manuel Hilty, Alexander Pretschner, David A. Basin, Christian Schaefer, Thomas Walter:
Monitors for Usage Control. 411-414 - Peter Herrmann, Frank Alexander Kraemer:
Design of Trusted Systems with Reusable Collaboration Models. 417
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.