The SCEAS System
Navigation Menu

Conferences in DBLP

iTrust (itrust)
2006 (conf/itrust/2006)

  1. Cristiano Castelfranchi
    Why We Need a Non-reductionist Approach to Trust. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:1-2 [Conf]
  2. Mehran Ahsant, Mike Surridge, Thomas Leonard, Ananth Krishna, Olle Mulmo
    Dynamic Trust Federation in Grids. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:3-18 [Conf]
  3. Cristiano Castelfranchi, Rino Falcone, Francesca Marzo
    Being Trusted in a Social Network: Trust as Relational Capital. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:19-32 [Conf]
  4. Suroop Mohan Chandran, Korporn Panyim, James B. D. Joshi
    A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:33-47 [Conf]
  5. Dag Elgesem
    Normative Structures in Trust Management. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:48-61 [Conf]
  6. Colin English, Sotirios Terzis
    Gathering Experience in Trust-Based Interactions. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:62-76 [Conf]
  7. Noria Foukia, Li Zhou, Clifford Neuman
    Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:77-92 [Conf]
  8. Jennifer Golbeck
    Generating Predictive Movie Recommendations from Trust in Social Networks. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:93-104 [Conf]
  9. Peter Herrmann
    Temporal Logic-Based Specification and Verification of Trust Models. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:105-119 [Conf]
  10. Gert Jan Hofstede, Catholijn M. Jonker, Sebastiaan Meijer, Tim Verwaart
    Modelling Trade and Trust Across Cultures. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:120-134 [Conf]
  11. Siv Hilde Houmb, Indrakshi Ray, Indrajit Ray
    Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:135-149 [Conf]
  12. Christian Damsgaard Jensen, Paul O'Connell
    Trust-Based Route Selection in Dynamic Source Routing. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:150-163 [Conf]
  13. Jacek Jonczy, Rolf Haenni
    Implementing Credential Networks. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:164-178 [Conf]
  14. Audun Jøsang, Stephen Marsh, Simon Pope
    Exploring Different Types of Trust Propagation. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:179-192 [Conf]
  15. Florian Kerschbaum, Jochen Haller, Yücel Karabulut, Philip Robinson
    PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:193-205 [Conf]
  16. Tomas Klos, Han La Poutré
    A Versatile Approach to Combining Trust Values for Making Binary Decisions. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:206-220 [Conf]
  17. Evangelos Kotsovinos, Petros Zerfos, Nischal M. Piratla, Niall Cameron, Sachin Agarwal
    Jiminy: A Scalable Incentive-Based Architecture for Improving Rating Quality. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:221-235 [Conf]
  18. Adam J. Lee, Marianne Winslett
    Virtual Fingerprinting as a Foundation for Reputation in Open Systems. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:236-251 [Conf]
  19. Siani Pearson
    Towards Automated Evaluation of Trust Constraints. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:252-266 [Conf]
  20. Siani Pearson, Marco Casassa Mont
    Provision of Trusted Identity Management Using Trust Credentials. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:267-282 [Conf]
  21. Wolter Pieters
    Acceptance of Voting Technology: Between Confidence and Trust. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:283-297 [Conf]
  22. Daniele Quercia, Stephen Hailes, Licia Capra
    B-Trust: Bayesian Trust Framework for Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:298-312 [Conf]
  23. Daniele Quercia, Stephen Hailes, Licia Capra
    TATA: Towards Anonymous Trusted Authentication. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:313-323 [Conf]
  24. Karl Quinn, Declan O'Sullivan, David Lewis, Vincent P. Wade
    The Design, Generation, and Utilisation of a Semantically Rich Personalised Model of Trust. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:324-338 [Conf]
  25. Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya
    A Trust Assignment Model Based on Alternate Actions Payoff. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:339-353 [Conf]
  26. Giovanni Sartor
    Privacy, Reputation, and Trust: Some Implications for Data Protection. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:354-366 [Conf]
  27. Christoph Sorge, Martina Zitterbart
    A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:367-381 [Conf]
  28. Jonathan Traupman, Robert Wilensky
    Robust Reputations for Peer-to-Peer Marketplaces. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:382-396 [Conf]
  29. Asimina Vasalou, Jeremy Pitt, Guillaume Piolle
    From Theory to Practice: Forgiveness as a Mechanism to Repair Conflicts in CMC. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:397-411 [Conf]
  30. Kouki Yonezawa
    A Novel Protocol for Communicating Reputation in P2P Networks. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:412-422 [Conf]
  31. Xiaoqing Zheng, Zhaohui Wu, Huajun Chen, Yuxin Mao
    A Scalable Probabilistic Approach to Trust Evaluation. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:423-438 [Conf]
  32. Karen Fullam, Tomas Klos, Guillaume Muller, Jordi Sabater-Mir, K. Suzanne Barber, Laurent Vercouter
    The Agent Reputation and Trust (ART) Testbed. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:439-442 [Conf]
  33. Laurent Gomez, Ulrich Jansen
    Trust Establishment in Emergency Case. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:443-448 [Conf]
  34. Jacek Jonczy
    Evaluating Trust and Authenticity with Caution. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:449-453 [Conf]
  35. Evangelos Kotsovinos, Petros Zerfos, Nischal M. Piratla, Niall Cameron
    Using Jiminy for Run-Time User Classification Based on Rating Behaviour. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:454-457 [Conf]
  36. Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch
    Traust: A Trust Negotiation Based Authorization Service. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:458-462 [Conf]
  37. Philipp Obreiter, Birgitta König-Ries
    The Interactive Cooperation Tournament. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:463-466 [Conf]
  38. Judith E. Y. Rossebø, Scott Cadzow, Paul Sijben
    eTVRA, a Threat, Vulnerability and Risk Assessment Tool for eEurope. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:467-471 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002