ProceedingsClick on the image below to see the cover pages of the proceedings IFIP AICT 374.
Full Papers (12) 5 | An efficient approach for Privacy Preserving distributed K-Means clustering based on Shamir’s secret sharing | 16 | A Provenance-based Trust Model for Delay Tolerant Network | 19 | From subjective reputation to verifiable experiences -- augmenting peer-control mechanisms for open service ecosystems | 22 | Trust Model for Optimized Cloud Services | 24 | Post-Session Authentication | 27 | Robustness of Trust Models and Combinations for Handling Unfair Ratings | 28 | Perturbation based privacy preserving Slope One predictors for collaborative filtering | 29 | Incorporating Honeypot for Intrusion Detection in Cloud Infrastructure | 33 | Integrating Indicators of Trustworthiness into Reputation-based Trust Models Insurance, Certification, and Coalitions | 34 | Trust Transitivity and Conditional Belief Reasoning | 37 | Co-evolving trust mechanisms for catering user behavior | 39 | Finding Trusted Publish/Subscribe Trees |
Short Papers (8) 8 | An Incentive Mechanism to Promote Honesty in E-marketplaces with Limited Inventory | 10 | Collaborative Trust Evaluation for Wiki Security | 25 | How Events Affect Trust: A Baseline Information Processing Model with Three Extensions | 36 | Automated Evaluation of Annotators for Museum Collections using Subjective Logic | 43 | A New Data Integrity Checking Protocol with Public Verifiability in Cloud Storage | 45 | Improvements over Extended LMAP+: RFID Authentication Protocol | 48 | Rendering unto Caesar the Things that are Caesar’s: Complex Trust Models and Human Understanding | 49 | Trust Management Framework for attenuation of Application Layer DDoS Attack in Cloud Computing |
|