Skip to main content



Page 1 of 1

  1. Content type: Research

    We introduce the notion of digital-arbitration which enables resolving disputes between servers and users with the aid of arbitrators. Arbitrators are semi-trusted entities in the social network that facilitate c...

    Authors: Dan Brownstein, Shlomi Dolev, Niv Gilboa and Ofer Hermoni

    Citation: Journal of Trust Management 2016 3:3

    Published on:

  2. Content type: Research

    The extent to which an agent trusts another naturally depends on the outcomes of their interactions. Previous computational approaches have treated the outcomes in a domain-specific way. Specifically, these ap...

    Authors: Anup K. Kalia, Zhe Zhang and Munindar P. Singh

    Citation: Journal of Trust Management 2016 3:1

    Published on:

  3. Content type: Research

    The amount and variety of information currently available online is astounding. Information can be found covering any subject and is accessible from any part of the globe. While this is beneficial for countles...

    Authors: Jason R. C. Nurse, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese and Koen Lamberts

    Citation: Journal of Trust Management 2015 2:10

    Published on:

  4. Content type: Research

    Time sequence data relating to users, such as medical histories and mobility data, are good candidates for data mining, but often contain highly sensitive information. Different methods in privacy-preserving d...

    Authors: Anirban Basu, Anna Monreale, Roberto Trasarti, Juan C. Corena, Fosca Giannotti, Dino Pedreschi, Shinsaku Kiyomoto, Yutaka Miyake and Tadashi Yanagihara

    Citation: Journal of Trust Management 2015 2:9

    Published on:

  5. Content type: Research

    While trust management systems can be used in isolation in order to provide robustness to a given architecture, cooperation incentives can be used to complement and collaborate with trust management systems as...

    Authors: Carlos Ballester Lafuente and Jean-Marc Seigneur

    Citation: Journal of Trust Management 2015 2:7

    Published on:

  6. Content type: Research

    This paper explores whether trust, developed in one context, transfers into another, distinct context and, if so, attempts to quantify the influence this prior trust exerts. Specifically, we investigate the ef...

    Authors: Cody Buntain and Jennifer Golbeck

    Citation: Journal of Trust Management 2015 2:6

    Published on:

  7. Content type: Research

    Reputation systems have been extensively explored in various disciplines and application areas. A problem in this context is that the computation engines applied by most reputation systems available are design...

    Authors: Johannes Sänger, Christian Richthammer and Günther Pernul

    Citation: Journal of Trust Management 2015 2:5

    Published on:

  8. Content type: Research

    The increasing use of Electronic Health Records has been mirrored by a similar rise in the number of security incidents where confidential information has inadvertently been disclosed to third parties. These p...

    Authors: Ying He, Chris Johnson and Yu Lu

    Citation: Journal of Trust Management 2015 2:4

    Published on:

  9. Content type: Research

    In an online marketplace, buyers rely heavily on reviews posted by previous buyers (referred to as advisors). The advisor’s credibility determines the persuasiveness of reviews. Much work has addressed the eva...

    Authors: Kewen Wu, Zeinab Noorian, Julita Vassileva and Ifeoma Adaji

    Citation: Journal of Trust Management 2015 2:2

    Published on:

  10. Content type: Research

    Identity management is a rather general concept that covers technologies, policies and procedures for recognising and authenticating entities in ICT environments. Current identity management solutions often ha...

    Authors: Audun Jøsang, Christophe Rosenberger, Laurent Miralabé, Henning Klevjer, Kent A Varmedal, Jérôme Daveau, Knut Eilif Husa and Petter Taugbøl

    Citation: Journal of Trust Management 2015 2:1

    Published on:

  11. Content type: Research

    In this work we present a thorough quantitative analysis of information consumption patterns of qualitatively different information on Facebook. Pages are categorized, according to their topics and the communi...

    Authors: Alessandro Bessi, Antonio Scala, Luca Rossi, Qian Zhang and Walter Quattrociocchi

    Citation: Journal of Trust Management 2014 1:12

    Published on:

  12. Content type: Research

    In this paper, we offer an algorithm for intelligent decision making about travel path planning in mobile vehicular ad-hoc networks (VANETs), for scenarios where agents representing vehicles exchange reports a...

    Authors: Robin Cohen, Jie Zhang, John Finnson, Thomas Tran and Umar F Minhas

    Citation: Journal of Trust Management 2014 1:2

    Published on:

  13. Content type: Research

    Public displays may adapt intelligently to the social context, tailoring information on the screen, for example, to the profiles of spectators, their gender or based on their mutual proximity. However, such ad...

    Authors: Michael Wißner, Stephan Hammer, Ekatarina Kurdyukova and Elisabeth André

    Citation: Journal of Trust Management 2014 1:6

    Published on:

  14. Content type: Research

    Information is the currency of the digital age – it is constantly communicated, exchanged and bartered, most commonly to support human understanding and decision-making. While the Internet and Web 2.0 have bee...

    Authors: Jason RC Nurse, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese and Koen Lamberts

    Citation: Journal of Trust Management 2014 1:5

    Published on:

  15. Content type: Research

    Crowdsourcing provides a valuable means for accomplishing large amounts of work which may require a high level of expertise. We present an algorithm for computing the trustworthiness of user-contributed tags o...

    Authors: Davide Ceolin, Archana Nottamkandath and Wan Fokkink

    Citation: Journal of Trust Management 2014 1:3

    Published on:

  16. Content type: Research

    A Sybil attack consists of an adversary assuming multiple identities to defeat the trust of an existing reputation system. When Sybil attacks are launched in vehicular networks, the mobility of vehicles increa...

    Authors: Muhammad Al-Mutaz, Levi Malott and Sriram Chellappan

    Citation: Journal of Trust Management 2014 1:4

    Published on: