Conferences in DBLP
Cristiano Castelfranchi Why We Need a Non-reductionist Approach to Trust. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:1-2 [Conf ] Mehran Ahsant , Mike Surridge , Thomas Leonard , Ananth Krishna , Olle Mulmo Dynamic Trust Federation in Grids. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:3-18 [Conf ] Cristiano Castelfranchi , Rino Falcone , Francesca Marzo Being Trusted in a Social Network: Trust as Relational Capital. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:19-32 [Conf ] Suroop Mohan Chandran , Korporn Panyim , James B. D. Joshi A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:33-47 [Conf ] Dag Elgesem Normative Structures in Trust Management. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:48-61 [Conf ] Colin English , Sotirios Terzis Gathering Experience in Trust-Based Interactions. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:62-76 [Conf ] Noria Foukia , Li Zhou , Clifford Neuman Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:77-92 [Conf ] Jennifer Golbeck Generating Predictive Movie Recommendations from Trust in Social Networks. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:93-104 [Conf ] Peter Herrmann Temporal Logic-Based Specification and Verification of Trust Models. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:105-119 [Conf ] Gert Jan Hofstede , Catholijn M. Jonker , Sebastiaan Meijer , Tim Verwaart Modelling Trade and Trust Across Cultures. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:120-134 [Conf ] Siv Hilde Houmb , Indrakshi Ray , Indrajit Ray Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:135-149 [Conf ] Christian Damsgaard Jensen , Paul O'Connell Trust-Based Route Selection in Dynamic Source Routing. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:150-163 [Conf ] Jacek Jonczy , Rolf Haenni Implementing Credential Networks. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:164-178 [Conf ] Audun Jøsang , Stephen Marsh , Simon Pope Exploring Different Types of Trust Propagation. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:179-192 [Conf ] Florian Kerschbaum , Jochen Haller , Yücel Karabulut , Philip Robinson PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:193-205 [Conf ] Tomas Klos , Han La Poutré A Versatile Approach to Combining Trust Values for Making Binary Decisions. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:206-220 [Conf ] Evangelos Kotsovinos , Petros Zerfos , Nischal M. Piratla , Niall Cameron , Sachin Agarwal Jiminy: A Scalable Incentive-Based Architecture for Improving Rating Quality. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:221-235 [Conf ] Adam J. Lee , Marianne Winslett Virtual Fingerprinting as a Foundation for Reputation in Open Systems. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:236-251 [Conf ] Siani Pearson Towards Automated Evaluation of Trust Constraints. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:252-266 [Conf ] Siani Pearson , Marco Casassa Mont Provision of Trusted Identity Management Using Trust Credentials. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:267-282 [Conf ] Wolter Pieters Acceptance of Voting Technology: Between Confidence and Trust. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:283-297 [Conf ] Daniele Quercia , Stephen Hailes , Licia Capra B-Trust: Bayesian Trust Framework for Pervasive Computing. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:298-312 [Conf ] Daniele Quercia , Stephen Hailes , Licia Capra TATA: Towards Anonymous Trusted Authentication. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:313-323 [Conf ] Karl Quinn , Declan O'Sullivan , David Lewis , Vincent P. Wade The Design, Generation, and Utilisation of a Semantically Rich Personalised Model of Trust. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:324-338 [Conf ] Vidyaraman Sankaranarayanan , Shambhu J. Upadhyaya A Trust Assignment Model Based on Alternate Actions Payoff. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:339-353 [Conf ] Giovanni Sartor Privacy, Reputation, and Trust: Some Implications for Data Protection. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:354-366 [Conf ] Christoph Sorge , Martina Zitterbart A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:367-381 [Conf ] Jonathan Traupman , Robert Wilensky Robust Reputations for Peer-to-Peer Marketplaces. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:382-396 [Conf ] Asimina Vasalou , Jeremy Pitt , Guillaume Piolle From Theory to Practice: Forgiveness as a Mechanism to Repair Conflicts in CMC. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:397-411 [Conf ] Kouki Yonezawa A Novel Protocol for Communicating Reputation in P2P Networks. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:412-422 [Conf ] Xiaoqing Zheng , Zhaohui Wu , Huajun Chen , Yuxin Mao A Scalable Probabilistic Approach to Trust Evaluation. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:423-438 [Conf ] Karen Fullam , Tomas Klos , Guillaume Muller , Jordi Sabater-Mir , K. Suzanne Barber , Laurent Vercouter The Agent Reputation and Trust (ART) Testbed. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:439-442 [Conf ] Laurent Gomez , Ulrich Jansen Trust Establishment in Emergency Case. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:443-448 [Conf ] Jacek Jonczy Evaluating Trust and Authenticity with Caution. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:449-453 [Conf ] Evangelos Kotsovinos , Petros Zerfos , Nischal M. Piratla , Niall Cameron Using Jiminy for Run-Time User Classification Based on Rating Behaviour. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:454-457 [Conf ] Adam J. Lee , Marianne Winslett , Jim Basney , Von Welch Traust: A Trust Negotiation Based Authorization Service. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:458-462 [Conf ] Philipp Obreiter , Birgitta König-Ries The Interactive Cooperation Tournament. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:463-466 [Conf ] Judith E. Y. Rossebø , Scott Cadzow , Paul Sijben e TVRA, a Threat, Vulnerability and Risk Assessment Tool for e Europe. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:467-471 [Conf ]