Being trusted in a social network: trust as relational capital
|
2006 |
Castelfranchi, Cristiano |
Normative structures in trust management
|
2006 |
Elgesem, Dag |
Temporal logic-based specification and verification of trust models
|
2006 |
Herrmann, Peter |
Exploring different types of trust propagation
|
2006 |
Jøsang, Audun |
Robust reputations for Peer-to-Peer marketplaces
|
2006 |
Traupman, Jonathan |
From theory to practice: forgiveness as a mechanism to repair conflicts in CMC
|
2006 |
Vasalou, Asimina |
Traust: a true negotiation based authorization service
|
2006 |
|
The interactive Cooperation Tournament : how to identify opportunities for selfish behavior of of computational entities
|
2006 |
Obreiter, Philipp |
eTVRA, a threat, vulnerability and risk assessment tool for eEurope
|
2006 |
Rossebø, Judith E. Y. |
A requirements-driven trust framework for secure interoperation in open environments
|
2006 |
Chandran, Suroop Mohan |
Generating predictive movie recommmendations from trust in social networks
|
2006 |
Golbeck, Jennifer |
Virtual fingerprinting as a foundation for reputation in open systems
|
2006 |
Lee, Adam J. |
B-trust: Bayesian trust framework for pervasive computing
|
2006 |
Quercia, Daniele |
Evaluating trust and authenticity with caution
|
2006 |
Jonczy, Jacek |
Dynamic trust federation in Grids
|
2006 |
|
Gathering experience in trust-based interactions
|
2006 |
English, Colin |
Multilateral decisions for collaborative defense against unsolicited Bulk E-mail
|
2006 |
Foukia, Noria |
Modelling trade and trust across cultures
|
2006 |
|
Estimating the relative trustworthiness of information sources in security solution evaluation
|
2006 |
Holumb, Siv Hilde |
A versatile approach to combining trust values for making binary decisions
|
2006 |
Klos, Tomas |