The SCEAS System
Navigation Menu

Conferences in DBLP

iTrust (itrust)
2005 (conf/itrust/2005)

  1. Steven O. Kimbrough
    Foraging for Trust: Exploring Rationality and the Stag Hunt Game. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:1-16 [Conf]
  2. Stephen Marsh, Mark R. Dibben
    Trust, Untrust, Distrust and Mistrust - An Exploration of the Dark(er) Side. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:17-33 [Conf]
  3. Stefano Zanero
    Security and Trust in the Italian Legal Digital Signature Framework. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:34-44 [Conf]
  4. Fredrik Vraalsen, Mass Soldal Lund, Tobias Mahler, Xavier Parent, Ketil Stølen
    Specifying Legal Risk Scenarios Using the CORAS Threat Modelling Language. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:45-60 [Conf]
  5. Michael Michalakopoulos, Maria Fasli
    On Deciding to Trust. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:61-76 [Conf]
  6. Sini Ruohomaa, Lea Kutvonen
    Trust Management Survey. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:77-92 [Conf]
  7. Audun Jøsang, Claudia Keser, Theodosis Dimitrakos
    Can We Manage Trust? [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:93-107 [Conf]
  8. David W. Chadwick
    Operational Models for Reputation Servers. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:108-115 [Conf]
  9. Isaac Agudo, Javier Lopez, José A. Montenegro
    A Representation Model of Trust Relationships with Delegation Extensions. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:116-130 [Conf]
  10. Lewis Hassell
    Affect and Trust. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:131-145 [Conf]
  11. Asimina Vasalou, Jeremy Pitt
    Reinventing Forgiveness: A Formal Investigation of Moral Facilitation. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:146-160 [Conf]
  12. Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone
    Modeling Social and Individual Trust in Requirements Engineering Methodologies. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:161-176 [Conf]
  13. Michael Kinateder, Ernesto Baschny, Kurt Rothermel
    Towards a Generic Trust Model - Comparison of Various Trust Update Algorithms. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:177-192 [Conf]
  14. Jigar Patel, W. T. Luke Teacy, Nicholas R. Jennings, Michael Luck
    A Probabilistic Trust Model for Handling Inaccurate Reputation Sources. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:193-209 [Conf]
  15. Georgios Pitsilis, Lindsay Marshall
    Trust as a Key to Improving Recommendation Systems. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:210-223 [Conf]
  16. Manos Papagelis, Dimitris Plexousakis, Themistoklis Kutsuras
    Alleviating the Sparsity Problem of Collaborative Filtering Using Trust Inferences. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:224-239 [Conf]
  17. Nathan Griffiths, Kuo-Ming Chao
    Experience-Based Trust: Enabling Effective Resource Selection in a Grid Environment. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:240-255 [Conf]
  18. Hristo Koshutanski, Fabio Massacci
    Interactive Credential Negotiation for Stateful Business Processes. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:256-272 [Conf]
  19. David Ingram
    An Evidence Based Architecture for Efficient, Attack-Resistant Computational Trust Dissemination in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:273-288 [Conf]
  20. Ciarán Bryce, Nathan Dimmock, Karl Krukow, Jean-Marc Seigneur, Vinny Cahill, Waleed Wagealla
    Towards an Evaluation Methodology for Computational Trust Systems. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:289-304 [Conf]
  21. Siani Pearson
    Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:305-320 [Conf]
  22. Jean-Marc Seigneur, Alan Gray, Christian Damsgaard Jensen
    Trust Transfer: Encouraging Self-recommendations Without Sybil Attack. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:321-337 [Conf]
  23. Tran Khanh Dang
    Privacy-Preserving Search and Updates for Outsourced Tree-Structured Data on Untrusted Servers. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:338-354 [Conf]
  24. Siani Pearson, Marco Casassa Mont, Stephen Crane
    Persistent and Dynamic Trust: Analysis and the Related Impact of Trusted Platforms. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:355-363 [Conf]
  25. Nathan Dimmock, Jean Bacon, David Ingram, Ken Moody
    Risk Models for Trust-Based Access Control(TBAC). [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:364-371 [Conf]
  26. Daniel Cvrcek, Ken Moody
    Combining Trust and Risk to Reduce the Cost of Attacks. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:372-383 [Conf]
  27. Ilya Zaihrayeu, Paulo Pinheiro da Silva, Deborah L. McGuinness
    IWTrust: Improving User Trust in Answers from the Web. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:384-392 [Conf]
  28. Adrian Baldwin, Yolanta Beres, David Plaquin, Simon Shiu
    Trust Record: High-Level Assurance and Compliance. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:393-396 [Conf]
  29. Ciarán Bryce, Paul Couderc, Jean-Marc Seigneur, Vinny Cahill
    Implementation of the SECURE Trust Engine. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:397-401 [Conf]
  30. Fredrik Vraalsen, Folker den Braber, Mass Soldal Lund, Ketil Stølen
    The CORAS Tool for Security Risk Analysis. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:402-405 [Conf]
  31. Theodosis Dimitrakos, Giuseppe Laria, Ivan Djordjevic, N. Romano, F. D'Andria, V. Trpkovski, P. Kearney, Matteo Gaeta, Pierluigi Ritrovato, L. Schubert, Bassem Serhan, Leonid Titkov, Stefan Wesner
    Towards a Grid Platform Enabling Dynamic Virtual Organisations for Business Applications. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:406-410 [Conf]
  32. Miguel Soriano, Marcel Fernandez, Elisa Sayrol, Joan Tomas, Joan Casanellas, Josep Pegueroles, Juan Hernández-Serrano
    Multimedia Copyright Protection Platform Demonstrator. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:411-414 [Conf]
  33. Paolo Giorgini, Fabio Massacci, John Mylopoulos, A. Siena, Nicola Zannone
    ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:415-419 [Conf]
  34. Periklis Akritidis, Yiannis Chatzikian, Manos Dramitinos, Evangelos Michalopoulos, Dimitrios Tsigos, Nikolaos Ventouras
    The VoteSecureTM Secure Internet Voting System. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:420-423 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002