Sort by
Previous Page Page 1 of 2 Next Page
  1. Research

    Digital arbitration for trusted communication

    We introduce the notion of digital-arbitration which enables resolving disputes between servers and users with the aid of arbitrators. Arbitrators are semi-trusted entities in the social network that facilitate c...

    Dan Brownstein, Shlomi Dolev, Niv Gilboa and Ofer Hermoni

    Journal of Trust Management 2016 3:3

    Published on: 8 June 2016

  2. Research

    Güven: estimating trust from communications

    The extent to which an agent trusts another naturally depends on the outcomes of their interactions. Previous computational approaches have treated the outcomes in a domain-specific way. Specifically, these ap...

    Anup K. Kalia, Zhe Zhang and Munindar P. Singh

    Journal of Trust Management 2016 3:1

    Published on: 5 January 2016

  3. Research

    Tag clouds with a twist: using tag clouds coloured by information’s trustworthiness to support situational awareness

    The amount and variety of information currently available online is astounding. Information can be found covering any subject and is accessible from any part of the globe. While this is beneficial for countles...

    Jason R. C. Nurse, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese and Koen Lamberts

    Journal of Trust Management 2015 2:10

    Published on: 17 December 2015

  4. Research

    A risk model for privacy in trajectory data

    Time sequence data relating to users, such as medical histories and mobility data, are good candidates for data mining, but often contain highly sensitive information. Different methods in privacy-preserving d...

    Anirban Basu, Anna Monreale, Roberto Trasarti, Juan C. Corena, Fosca Giannotti, Dino Pedreschi, Shinsaku Kiyomoto, Yutaka Miyake and Tadashi Yanagihara

    Journal of Trust Management 2015 2:9

    Published on: 13 November 2015

  5. Research

    Trust transfer between contexts

    This paper explores whether trust, developed in one context, transfers into another, distinct context and, if so, attempts to quantify the influence this prior trust exerts. Specifically, we investigate the ef...

    Cody Buntain and Jennifer Golbeck

    Journal of Trust Management 2015 2:6

    Published on: 12 June 2015

  6. Research

    Reusable components for online reputation systems

    Reputation systems have been extensively explored in various disciplines and application areas. A problem in this context is that the computation engines applied by most reputation systems available are design...

    Johannes Sänger, Christian Richthammer and Günther Pernul

    Journal of Trust Management 2015 2:5

    Published on: 13 May 2015

  7. Research

    Local user-centric identity management

    Identity management is a rather general concept that covers technologies, policies and procedures for recognising and authenticating entities in ICT environments. Current identity management solutions often ha...

    Audun Jøsang, Christophe Rosenberger, Laurent Miralabé, Henning Klevjer, Kent A Varmedal, Jérôme Daveau, Knut Eilif Husa and Petter Taugbøl

    Journal of Trust Management 2015 2:1

    Published on: 8 January 2015

  8. Research

    The economy of attention in the age of (mis)information

    In this work we present a thorough quantitative analysis of information consumption patterns of qualitatively different information on Facebook. Pages are categorized, according to their topics and the communi...

    Alessandro Bessi, Antonio Scala, Luca Rossi, Qian Zhang and Walter Quattrociocchi

    Journal of Trust Management 2014 1:12

    Published on: 31 December 2014

  9. Research

    Efficient semi-automated assessment of annotations trustworthiness

    Crowdsourcing provides a valuable means for accomplishing large amounts of work which may require a high level of expertise. We present an algorithm for computing the trustworthiness of user-contributed tags o...

    Davide Ceolin, Archana Nottamkandath and Wan Fokkink

    Journal of Trust Management 2014 1:3

    Published on: 20 May 2014

Previous Page Page 1 of 2 Next Page