Being trusted in a social network: trust as relational capital
|
2006 |
Castelfranchi, Cristiano |
Normative structures in trust management
|
2006 |
Elgesem, Dag |
Temporal logic-based specification and verification of trust models
|
2006 |
Herrmann, Peter |
Exploring different types of trust propagation
|
2006 |
Jøsang, Audun |
Robust reputations for Peer-to-Peer marketplaces
|
2006 |
Traupman, Jonathan |
From theory to practice: forgiveness as a mechanism to repair conflicts in CMC
|
2006 |
Vasalou, Asimina |
Traust: a true negotiation based authorization service
|
2006 |
|
The interactive Cooperation Tournament : how to identify opportunities for selfish behavior of of computational entities
|
2006 |
Obreiter, Philipp |
eTVRA, a threat, vulnerability and risk assessment tool for eEurope
|
2006 |
Rossebø, Judith E. Y. |
A requirements-driven trust framework for secure interoperation in open environments
|
2006 |
Chandran, Suroop Mohan |
Generating predictive movie recommmendations from trust in social networks
|
2006 |
Golbeck, Jennifer |
Virtual fingerprinting as a foundation for reputation in open systems
|
2006 |
Lee, Adam J. |
B-trust: Bayesian trust framework for pervasive computing
|
2006 |
Quercia, Daniele |
Evaluating trust and authenticity with caution
|
2006 |
Jonczy, Jacek |
Why we need a non-reductionist approach to trust
|
2006 |
Castelfranchi, Cristiano |
Trust-based route selection in dynamic source routing
|
2006 |
Jensen, Christian D. |
Implementing credential networks
|
2006 |
Jonczy, Jacek |
Path Trust: a trust-based reputation service for virtual organization formation
|
2006 |
|
Jiminy: a scalable incentive-based architecture for improving rating quality
|
2006 |
|
Acceptance of voting technology: between confidence and trust
|
2006 |
Pieters, Wolter |