|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7373 occurrences of 2496 keywords
|
|
|
Results
Found 28405 publication records. Showing 28395 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
29 | Minghui Zhou 0001, Hong Mei 0001, Lu Zhang 0023 |
A Multi-Property Trust Model for Reconfiguring Component Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QSIC ![In: Fifth International Conference on Quality Software (QSIC 2005), 19-20 September 2005, Melbourne, Australia, pp. 142-149, 2005, IEEE Computer Society, 0-7695-2472-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
QoS, component, dynamic reconfiguration, trust management |
29 | E. Michael Maximilien, Munindar P. Singh |
Agent-based trust model involving multiple qualities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), July 25-29, 2005, Utrecht, The Netherlands, pp. 519-526, 2005, ACM, 1-59593-094-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
quality of service, multi agent systems, service-oriented architecture, trust, semantic web services, service-oriented computing, service selection |
29 | Ronald Ashri, Sarvapali D. Ramchurn, Jordi Sabater, Michael Luck, Nicholas R. Jennings |
Trust evaluation through relationship analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), July 25-29, 2005, Utrecht, The Netherlands, pp. 1005-1011, 2005, ACM, 1-59593-094-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
multi-agent systems, trust, reputation, relationships |
29 | Adam Hess, Jason E. Holt, Jared Jacobson, Kent E. Seamons |
Content-triggered trust negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(3), pp. 428-456, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
authentication, access control, credentials, Trust negotiation |
29 | Nathan Dimmock, András Belokosztolszki, David M. Eyers, Jean Bacon, Ken Moody |
Using trust and risk in role-based access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 156-162, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
SECURE, access control, trust, risk, OASIS |
29 | Elizabeth Sillence, Pamela Briggs, Lesley Fishwick, Peter R. Harris |
Trust and mistrust of online health sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2004 Conference on Human Factors in Computing Systems, CHI 2004, Vienna, Austria, April 24 - 29, 2004, pp. 663-670, 2004, ACM, 1-58113-702-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Internet, trust, computer-mediated communication, health, credibility, social identity |
29 | Alessandro Agostini, Gianluca Moro |
Identification of Communities of Peers by Trust and Reputation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIMSA ![In: Artificial Intelligence: Methodology, Systems, and Applications, 11th International Conference, AIMSA 2004, Varna, Bulgaria, September 2-4, 2004, Proceedings, pp. 85-95, 2004, Springer, 3-540-22959-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
semantic routing, information retrieval, Peer-to-peer systems, peer-to-peer communities, trust and reputation |
29 | Nathan Griffiths, Michael Luck |
Coalition formation through motivation and trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: The Second International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2003, July 14-18, 2003, Melbourne, Victoria, Australia, Proceedings, pp. 17-24, 2003, ACM, 1-58113-683-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
clans, trust, cooperation, motivation, coalitions |
29 | Matt Blaze, John Ioannidis, Angelos D. Keromytis |
Trust management for IPsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 5(2), pp. 95-118, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
network security, policy, trust management, IPsec, Credentials, KeyNote |
29 | Bhiru Shelat, Florian N. Egger |
What makes people trust online gambling sites? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended abstracts of the 2002 Conference on Human Factors in Computing Systems, CHI 2002, Minneapolis, Minnesota, USA, April 20-25, 2002, pp. 852-853, 2002, ACM, 1-58113-454-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
user experience strategy, trust, credibility, gambling |
29 | Melanie J. Ashleigh, Neville A. Stanton |
Trust: Key Elements in Human Supervisory Control Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cogn. Technol. Work. ![In: Cogn. Technol. Work. 3(2), pp. 92-100, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Human supervisory control, Trust, Technology, Teams |
29 | Timothy W. Bickmore, Justine Cassell |
Relational agents: a model and implementation of building user trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the CHI 2001 Conference on Human Factors in Computing Systems, Seattle, WA, USA, March 31 - April 5, 2001., pp. 396-403, 2001, ACM, 1-58113-327-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
small talk, trust, personality, natural language, embodied conversational agent, social interface |
29 | P. Venkat Rangan |
Trust Requirements and Performance of a Fast Subtransprot-Level Protocol for Secure Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 19(2), pp. 181-186, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
trust requirements, fast subtransport-level protocol, authenticated datagram protocol, host-to-host secure channels, agent-to-agent channels, average latency, performance, protocols, data integrity, Ethernet, security of data, secure communication, Sun workstations, maximum throughput |
28 | Glenn Bewsell, Rodger Jamieson, Adrian Gardiner, Deborah Bunker |
An Investigation of Dispute Resolution Mechanisms on Power and Trust: A Domain Study of Online Trust in e-Auctions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 288-298, 2005, Springer, 3-540-28224-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Maryna Komarova, Michel Riguidel |
Adjustable Trust Model for Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 429-443, 2008, Springer, 978-3-540-69294-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Trust values, Trust evolution, Access Control |
28 | Mohamed Bishr, Werner Kuhn |
Geospatial Information Bottom-Up: A Matter of Trust and Semantics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AGILE Conf. ![In: The European Information Society: Leading the Way with Geo-information, Proceedings of the 10th AGILE Conference, Aalborg, Denmark, 8-11 May 2007, pp. 365-387, 2007, Springer, 978-3-540-72384-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Keyword trust, spatio-temporal trust, social semantics, social networks, quality |
28 | Xiaochun Zeng, Jiaoyan Zeng, Qiang Guo |
Research of trust on B2C electronic commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 221-225, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
mechanism of trust, trust, e-commerce, risk, B2C |
28 | Jiawen Su, Daniel W. Manchala |
Trust vs. Threats: Recovery and Survival in Electronic Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31 - June 4, 1999, pp. 126-133, 1999, IEEE Computer Society, 0-7695-0222-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Trust protocols, EC Threats, Trust, Anonymity, Electronic Commerce |
28 | Thomas Beth, Malte Borcherding, Birgit Klein |
Valuation of Trust in Open Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 3-18, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Trust values, Trust measures, Distributed systems |
27 | Indrajit Ray, Sudip Chakraborty |
A Framework for Flexible Access Control in Digital Library Systems. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings, pp. 252-266, 2006, Springer, 3-540-36796-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Yves Demazeau, Dimitri Melaye, Marie-Hélène Verrons |
A Decentralized Calendar System Featuring Sharing, Trusting and Negotiating. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE ![In: Advances in Applied Artificial Intelligence, 19th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2006, Annecy, France, June 27-30, 2006, Proceedings, pp. 731-740, 2006, Springer, 3-540-35453-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Tharam S. Dillon, Elizabeth Chang 0001, Farookh Khadeer Hussain |
A Framework for a Trusted Environment for Virtual Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: Advances in Web-Age Information Management: 5th International Conference, WAIM 2004, Dalian, China, July 15-17, 2004, pp. 1-12, 2004, Springer, 3-540-22418-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Eric Freudenthal, Lawrence Port, Tracy Pesin, Edward Keenan |
Switchboard: Secure, Monitored Connections for Client-Server Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 22nd International Conference on Distributed Computing Systems, Workshops (ICDCSW '02) July 2-5, 2002, Vienna, Austria, Proceedings, pp. 660-665, 2002, IEEE Computer Society, 0-7695-1588-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Brian Shand, Jean Bacon |
Policies in Accountable Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 5-7 June 2002, Monterey, CA, USA, pp. 80-91, 2002, IEEE Computer Society, 0-7695-1611-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Christopher Soghoian, Imad Aad |
Merx: Secure and Privacy Preserving Delegated Payments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, pp. 217-239, 2009, Springer, 978-3-642-00586-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Eric S. K. Yu, Lin Liu 0001 |
Modelling Trust for System Design Using the i* Strategic Actors Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trust in Cyber-societies ![In: Proceedings of the Fourth International Conference on Autonomous Agents, AGENTS 2000, Barcelona, Catalonia, Spain, June 3-7, 2000, pp. 175-194, 2000, ACM, 1-58113-230-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
27 | Rajatish Mukherjee, Bikramjit Banerjee, Sandip Sen |
Learning Mutual Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trust in Cyber-societies ![In: Proceedings of the Fourth International Conference on Autonomous Agents, AGENTS 2000, Barcelona, Catalonia, Spain, June 3-7, 2000, pp. 145-158, 2000, ACM, 1-58113-230-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
27 | Wayne Liu, Sudhir Aggarwal, Zhenhai Duan |
Incorporating accountability into internet email. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 875-882, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
email misuse, trust management, accountability |
27 | Jie Yu 0008, Chengfang Fang, Liming Lu, Zhoujun Li 0001 |
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infoscale ![In: Scalable Information Systems, 4th International ICST Conference, Infoscale 2009, Hong Kong, June 10-11, 2009, Revised Selected Papers, pp. 175-191, 2009, Springer, 978-3-642-10484-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Trust, DDoS Attacks, Lightweight, Application layer |
27 | Prakash Kolan, Ram Dantu |
Socio-technical defense against voice spamming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Auton. Adapt. Syst. ![In: ACM Trans. Auton. Adapt. Syst. 2(1), pp. 2, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SIP (Session Initiation Protocol), SPIT (Spam over IP Telephony), Trust, reputation, behavior, tolerance |
27 | Jimmy McGibney, Dmitri Botvich |
Distributed Dynamic Protection of Services on Ad Hoc and Peer to Peer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPOM ![In: IP Operations and Management, 7th IEEE International Workshop, IPOM 2007, San José, USA, October 31 - November 2, 2007, Proceedings, pp. 95-106, 2007, Springer, 978-3-540-75852-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
distributed trust management, Intrusion detection, network security |
27 | Pedro Felix, Carlos Ribeiro |
A scalable and flexible web services authentication model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 4th ACM Workshop On Secure Web Services, SWS 2007, Fairfax, VA, USA, November 2, 2007, pp. 66-72, 2007, ACM, 978-1-59593-892-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authentication, trust management, web services security |
27 | Samuel Galice, Marine Minier, John Mullins, Stéphane Ubéda |
Cryptographic Protocol to Establish Trusted History of Interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers, pp. 136-149, 2006, Springer, 978-3-540-69172-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
trust management framework, cryptographic protocol, Identity based encryption |
27 | Sangmi Lee Pallickara, Beth Plale |
TrustCell: Towards the End-to-End Trustworthiness in Data-Oriented Scientific Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: 2006 International Conference on Parallel Processing Workshops (ICPP Workshops 2006), 14-18 August 2006, Columbus, Ohio, USA, pp. 33-42, 2006, IEEE Computer Society, 0-7695-2637-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Data-Oriented Grid Computing, LEAD, Grid Trust, Grid Security |
27 | Wei Wang 0033, Guosun Zeng, Lulai Yuan |
Ant-based Reputation Evidence Distribution in P2P Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing - GCC 2006, 5th International Conference, Changsha, Hunan, China, 21-23 October 2006, Proceedings, pp. 129-132, 2006, IEEE Computer Society, 0-7695-2694-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
evidence distribution, reputation, trust model, P2P networks, ant colony algorithms |
27 | Karl Krukow, Mogens Nielsen, Vladimiro Sassone |
A framework for concrete reputation-systems with applications to history-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 260-269, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
history-based access control, model checking, temporal logic, reputation, trust management |
27 | Anne Adams, Martina Angela Sasse |
Taming the wolf in sheep's clothing: privacy in multimedia communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia (1) ![In: Proceedings of the 7th ACM International Conference on Multimedia '99, Orlando, FL, USA, October 30 - November 5, 1999, Part 1., pp. 101-107, 1999, ACM, 1-58113-151-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
privacy, trust, multicasting, multimedia communications, grounded theory |
26 | Scott D. Stoller |
Trust Management and Trust Negotiation in an Extension of SQL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TGC ![In: Trustworthy Global Computing, 4th International Symposium, TGC 2008, Barcelona, Spain, November 3-4, 2008, Revised Selected Papers, pp. 186-200, 2008, Springer, 978-3-642-00944-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Yizhi Ren, Mingchu Li, Cheng Guo 0001, Yongrui Cui, Kouichi Sakurai |
Trust Similarity Measure in Trust Model for P2P Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC (2) ![In: 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops, pp. 107-112, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Karl Quinn, David Lewis 0001, Declan O'Sullivan, Vincent P. Wade |
Trust Meta-Policies for Flexible and Dynamic Policy Based Trust Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 5-7 June 2006, London, Ontario, Canada, pp. 145-148, 2006, IEEE Computer Society, 0-7695-2598-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Wolter Pieters |
Acceptance of Voting Technology: Between Confidence and Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings, pp. 283-297, 2006, Springer, 3-540-34295-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Cristiano Castelfranchi |
Why We Need a Non-reductionist Approach to Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings, pp. 1-2, 2006, Springer, 3-540-34295-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Gert Jan Hofstede, Catholijn M. Jonker, Sebastiaan A. Meijer, Tim Verwaart |
Modelling Trade and Trust Across Cultures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings, pp. 120-134, 2006, Springer, 3-540-34295-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Laurent Gomez, Ulrich Jansen |
Trust Establishment in Emergency Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings, pp. 443-448, 2006, Springer, 3-540-34295-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor |
Trust modelling for online transactions: a phishing scenario. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 11, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Marika Wojcik, Jan H. P. Eloff, H. S. Venter |
Trust Model Architecture: Defining Prejudice by Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings, pp. 182-191, 2006, Springer, 3-540-37750-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | David Ingram |
An Evidence Based Architecture for Efficient, Attack-Resistant Computational Trust Dissemination in Peer-to-Peer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings, pp. 273-288, 2005, Springer, 3-540-26042-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Daniel Cvrcek, Ken Moody |
Combining Trust and Risk to Reduce the Cost of Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings, pp. 372-383, 2005, Springer, 3-540-26042-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Nathan Griffiths, Kuo-Ming Chao |
Experience-Based Trust: Enabling Effective Resource Selection in a Grid Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings, pp. 240-255, 2005, Springer, 3-540-26042-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Ching Lin, Vijay Varadharajan, Yan Wang 0002 |
Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 151-160, 2005, Springer, 3-540-28224-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Michael J. Butler, Michael Leuschel, Stéphane Lo Presti, Phillip Turner |
The Use of Formal Methods in the Analysis of Trust (Position Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, Second International Conference, iTrust 2004, Oxford, UK, March 29 - April 1, 2004, Proceedings, pp. 333-339, 2004, Springer, 3-540-21312-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Charles B. Haley, Robin C. Laney, Jonathan D. Moffett, Bashar Nuseibeh |
Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, Second International Conference, iTrust 2004, Oxford, UK, March 29 - April 1, 2004, Proceedings, pp. 347-354, 2004, Springer, 3-540-21312-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Paolo Massa, Bobby Bhattacharjee |
Using Trust in Recommender Systems: An Experimental Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, Second International Conference, iTrust 2004, Oxford, UK, March 29 - April 1, 2004, Proceedings, pp. 221-235, 2004, Springer, 3-540-21312-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Catholijn M. Jonker, Joost J. P. Schalken, Jan Theeuwes, Jan Treur |
Human Experiments in Trust Dynamics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, Second International Conference, iTrust 2004, Oxford, UK, March 29 - April 1, 2004, Proceedings, pp. 206-220, 2004, Springer, 3-540-21312-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Yücel Karabulut |
Implementation of an Agent-Oriented Trust Management Infrastructure Based on a Hybrid PKI Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, First International Conference, iTrust 2003, Heraklion, Crete, Greece, May 28-30, 2002, Proceedings, pp. 318-331, 2003, Springer, 3-540-40224-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Yi Hu, Zhichun Xiao, Brajendra Panda |
Modeling deceptive information dissemination using a holistic approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 1591-1598, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
information flow, trust management, web of trust |
26 | Cristiano Longo, Paolo Giarrusso |
A protocol to preserve a code of conduct. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 1579-1585, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
local network view, providing guarantees, trust protocol, peer-to-peer, trust, reputation, online communities |
26 | Cristina Satizábal, Rafael Páez, Jordi Forné |
PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructures Security, First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006, Revised Papers, pp. 151-165, 2006, Springer, 3-540-69083-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
hierarchical trust model, peer-to-peer trust model, certification path discovery, critical information systems, Public Key Infrastructure (PKI) |
26 | Eugenia Kondratova, Stephen Marsh 0001, Ali A. Ghorbani 0001 |
Trust-based contextual information filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 51, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy and trust, mobility, context, information filtering |
26 | Behrang Zadjabbari, Pornpit Wongthongtham, Farookh Khadeer Hussain |
Knowledge Sharing Effectiveness Measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010, Perth, Australia, 20-13 April 2010, pp. 1249-1254, 2010, IEEE Computer Society, 978-0-7695-4018-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
knowledge complexity, trust competency, trust benevolence, trust, knowledge sharing, knowledge transformability |
26 | Danna Voth, Benjamin Alfonsi |
In the News. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Intell. Syst. ![In: IEEE Intell. Syst. 19(5), pp. 4-7, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
trust, peer-to-peer networks, trust management, pervasive systems, trust ontology |
26 | Lauren Fell, Peter Bruza |
Proto-trust and trust attribution: a theory of intuitive, affective forms of trust and the means by which trust decisions are made. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CogSci ![In: Proceedings of the 44th Annual Meeting of the Cognitive Science Society, CogSci 2022, Toronto, ON, Canada, July 27-30, 2022, 2022, cognitivesciencesociety.org. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
26 | Andrew Hryniowski, Xiao Yu Wang 0010, Alexander Wong |
Where Does Trust Break Down? A Quantitative Trust Analysis of Deep Neural Networks via Trust Matrix and Conditional Trust Densities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2009.14701, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
26 | Viet-An Nguyen, Ee-Peng Lim, Hwee-Hoon Tan, Jing Jiang 0001, Aixin Sun |
Do You Trust to Get Trust? A Study of Trust Reciprocity Behaviors and Reciprocal Trust Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SDM ![In: Proceedings of the SIAM International Conference on Data Mining, SDM 2010, April 29 - May 1, 2010, Columbus, Ohio, USA, pp. 72-83, 2010, SIAM, 978-0-89871-703-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Yoshinobu Kawabe, Yuki Koizumi, Tetsushi Ohki, Masakatsu Nishigaki, Toru Hasegawa, Tetsuhisa Oda |
On Trust Confusional, Trust Ignorant, and Trust Transitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIPTM ![In: Trust Management XIII - 13th IFIP WG 11.11 International Conference, IFIPTM 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings, pp. 178-195, 2019, Springer, 978-3-030-33715-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Karin Leichtenstern, Nikolaus Bee, Elisabeth André, Ulrich Berkmüller, Johannes Wagner 0001 |
Physiological Measurement of Trust-Related Behavior in Trust-Neutral and Trust-Critical Situations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIPTM ![In: Trust Management V, 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, Denmark, June 29-July 1, 2011, Proceedings, pp. 165-172, 2011, Springer, 978-3-642-22199-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Mark Hoogendoorn, S. Waqar Jaffry, Jan Treur |
Incorporating Interdependency of Trust Values in Existing Trust Models for Trust Dynamics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIPTM ![In: Trust Management IV - 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010. Proceedings, pp. 263-276, 2010, Springer, 978-3-642-13445-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Ruo-Fei Han, Hou-Xiang Wang, Yu-Hua Wang, Kai-Ling Zuo |
Membership-Based Access Control for Trust Negotiation in Open Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 189-192, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Shaomin Zhang, Xiayan Zhang, Baoyi Wang |
History and Future Information Based Trust Model in C2C E-commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 491-494, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Sibo Liu, Liaojun Pang, Qingqi Pei, Hua Ma, Qingquan Peng |
Distributed Event-Triggered Trust Management for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 291-294, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao, Jonathan M. McCune, King-Hang Wang, Maxwell N. Krohn, Phen-Lan Lin, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang |
SPATE: small-group PKI-less authenticated trust establishment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services (MobiSys 2009), Kraków, Poland, June 22-25, 2009, pp. 1-14, 2009, ACM, 978-1-60558-566-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
group protocol, security, implementation, key exchange |
25 | Naima Iltaf, Mukhtar Hussain, Farrukh Kamran |
A Mathematical Approach towards Trust Based Security in Pervasive Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 702-711, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Eugen Staab, Thomas Engel 0001 |
Tuning Evidence-Based Trust Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 92-99, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Yun Yang, Juhua Chen |
A Dynamic Trust Evaluation Model on C2C Marketplaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 482-485, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Latifa Boursas, Wolfgang Hommel |
Multidimensional Dynamic Trust Management for Federated Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (2) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 684-689, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Olivier Heen, Gilles Guette, Thomas Genet |
On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings, pp. 1-11, 2009, Springer, 978-3-642-03943-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Zheng Yan 0002, Rong Yan |
Formalizing Trust Based on Usage Behaviours for Mobile Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 6th International Conference, ATC 2009, Brisbane, Australia, July 7-9, 2009, Proceedings, pp. 194-208, 2009, Springer, 978-3-642-02703-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Hongjun Qiu, Jiming Liu 0001, Ning Zhong 0001 |
A Dynamic Trust Network for Autonomy-Oriented Partner Finding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMT ![In: Active Media Technology, 5th International Conference, AMT 2009, Beijing, China, October 22-24, 2009. Proceedings, pp. 323-334, 2009, Springer, 978-3-642-04874-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Ladislav Huraj, Vladimír Siládi |
Authorization through trust chains in ad hoc grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EATIS ![In: Proceedings of the 2009 Euro American conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship, EATIS 2009, Prague, Czech Republic, June 3-5, 2009, pp. 13, 2009, 978-1-60558-398-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
certificate chain, authorization, delegation, ad hoc grid |
25 | Chung-Wei Hang, Yonghong Wang, Munindar P. Singh |
Operators for propagating trust and their evaluation in social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS (2) ![In: 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), Budapest, Hungary, May 10-15, 2009, Volume 2, pp. 1025-1032, 2009, IFAAMAS, 978-0-9817381-7-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
25 | Célia da Costa Pereira, Andrea Tettamanzi |
Goal generation from beliefs based on trust and distrust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS (2) ![In: 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), Budapest, Hungary, May 10-15, 2009, Volume 2, pp. 1127-1128, 2009, IFAAMAS, 978-0-9817381-7-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
desires and goals, fuzzy logic, beliefs |
25 | Jahan Hassan, Harsha R. Sirisena, Björn Landfeldt |
Trust-Based Fast Authentication for Multiowner Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 7(2), pp. 247-261, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Fast authentication, inter-domain authentication, Markov Models, handoff, IEEE802.11 |
25 | Ejike Ofuonye, Patricia Beatty, Ian Reay, Scott Dick, James Miller 0001 |
How Do We Build Trust into E-commerce Web Sites? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 25(5), pp. 7-9, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Limao Yang, Xuan Tang |
Research of C2C E-Business Trust Evaluation Model Based on Entropy Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 599-602, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Indrajit Ray, Sudip Chakraborty |
Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 605-620, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Stefano Bistarelli, Fabio Martinelli, Francesco Santini 0001 |
Weighted Datalog and Levels of Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1128-1134, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Cristina Satizábal, Jordi Forné, Rafael Martínez-Peláez, Francisco Rico-Novella |
Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1000-1007, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Certification Architectures, Ad-Hoc Networks, Ant Algorithms, Public Key Infrastructure (PKI), Certification Path |
25 | Natarajan Shankar |
Trust and Automation in Verification Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATVA ![In: Automated Technology for Verification and Analysis, 6th International Symposium, ATVA 2008, Seoul, Korea, October 20-23, 2008. Proceedings, pp. 4-17, 2008, Springer, 978-3-540-88386-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Wen-Kung Lin, Chieh-Peng Lin, Chou-Kang Chiu |
Understanding Cyber Trust Using a Triadic Functioning Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 662-667, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Lei Jiang 0007, Jianxun Liu 0001 |
Research on Web Services Maiden Business Trust Metrics, Appraisal and Filtration Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 850-855, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Sheikh Iqbal Ahamed, Moushumi Sharmin, Shameem Ahmed |
A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 17-21 March 2008, Hong Kong, pp. 590-595, 2008, IEEE Computer Society, 978-0-7695-3113-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Secure Service and Device discovery, Resource Discovery, MARKS, Risk model |
25 | Xue Wang, Fan Zhang |
A New Trust Model Based on Social Characteristic and Reputation Mechanism for the Semantic Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the International Workshop on Knowledge Discovery and Data Mining, WKDD 2008, Adelaide, Australia, 23-24 January 2008, pp. 414-417, 2008, IEEE Computer Society, 0-7695-3090-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Muniz Bandeira Duarte, Guy Pujolle |
Analyzing a human-based trust model for mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco, pp. 240-245, 2008, IEEE Computer Society, 978-1-4244-2702-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Zheng Yan 0002, Valtteri Niemi, Yan Dong, Guoliang Yu |
A User Behavior Based Trust Model for Mobile Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 455-469, 2008, Springer, 978-3-540-69294-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Deqing Zou, Jong Hyuk Park, Laurence Tianruo Yang, Zhensong Liao, Tai-Hoon Kim |
A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 35-45, 2008, Springer, 978-3-540-69292-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Mozhgan Tavakolifard, Svein J. Knapskog, Peter Herrmann |
Cross-Situation Trust Reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intelligence/IAT Workshops ![In: Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, 9-12 December 2008, Sydney, NSW, Australia, pp. 67-71, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Hock Chuan Lim, Rob Stocker, Henry Larkin |
Ethical Trust and Social Moral Norms Simulation: A Bio-inspired Agent-Based Modelling Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAT ![In: Proceedings of the 2008 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, Sydney, NSW, Australia, December 9-12, 2008, pp. 245-251, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Jian-ping Qiu, Li-Chao Chen |
Trust Management for Semantec Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 778-781, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Sun Jing, Ma Yu-Jian, Zhao Hui-Qun, Xiao Hui-Bin |
A Study on the Design and Implementation of EPCIS Trust Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 713-716, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Yong Wang 0010, Ming Li, Eamonn Dillon, Lingguo Cui, Jingjing Hu, Lejian Liao |
A Context-aware Computational Trust Model for Multi-agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, Hainan, China, 6-8 April 2008, pp. 1119-1124, 2008, IEEE, 978-1-4244-1685-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
|
|