Skip to main content

Articles

Page 1 of 1

  1. We introduce the notion of digital-arbitration which enables resolving disputes between servers and users with the aid of arbitrators. Arbitrators are semi-trusted entities in the social network that facilitate c...

    Authors: Dan Brownstein, Shlomi Dolev, Niv Gilboa and Ofer Hermoni
    Citation: Journal of Trust Management 2016 3:3
  2. The extent to which an agent trusts another naturally depends on the outcomes of their interactions. Previous computational approaches have treated the outcomes in a domain-specific way. Specifically, these ap...

    Authors: Anup K. Kalia, Zhe Zhang and Munindar P. Singh
    Citation: Journal of Trust Management 2016 3:1
  3. The amount and variety of information currently available online is astounding. Information can be found covering any subject and is accessible from any part of the globe. While this is beneficial for countles...

    Authors: Jason R. C. Nurse, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese and Koen Lamberts
    Citation: Journal of Trust Management 2015 2:10
  4. Time sequence data relating to users, such as medical histories and mobility data, are good candidates for data mining, but often contain highly sensitive information. Different methods in privacy-preserving d...

    Authors: Anirban Basu, Anna Monreale, Roberto Trasarti, Juan C. Corena, Fosca Giannotti, Dino Pedreschi, Shinsaku Kiyomoto, Yutaka Miyake and Tadashi Yanagihara
    Citation: Journal of Trust Management 2015 2:9
  5. While trust management systems can be used in isolation in order to provide robustness to a given architecture, cooperation incentives can be used to complement and collaborate with trust management systems as...

    Authors: Carlos Ballester Lafuente and Jean-Marc Seigneur
    Citation: Journal of Trust Management 2015 2:7
  6. This paper explores whether trust, developed in one context, transfers into another, distinct context and, if so, attempts to quantify the influence this prior trust exerts. Specifically, we investigate the ef...

    Authors: Cody Buntain and Jennifer Golbeck
    Citation: Journal of Trust Management 2015 2:6
  7. Reputation systems have been extensively explored in various disciplines and application areas. A problem in this context is that the computation engines applied by most reputation systems available are design...

    Authors: Johannes Sänger, Christian Richthammer and Günther Pernul
    Citation: Journal of Trust Management 2015 2:5
  8. The increasing use of Electronic Health Records has been mirrored by a similar rise in the number of security incidents where confidential information has inadvertently been disclosed to third parties. These p...

    Authors: Ying He, Chris Johnson and Yu Lu
    Citation: Journal of Trust Management 2015 2:4
  9. In an online marketplace, buyers rely heavily on reviews posted by previous buyers (referred to as advisors). The advisor’s credibility determines the persuasiveness of reviews. Much work has addressed the eva...

    Authors: Kewen Wu, Zeinab Noorian, Julita Vassileva and Ifeoma Adaji
    Citation: Journal of Trust Management 2015 2:2
  10. Identity management is a rather general concept that covers technologies, policies and procedures for recognising and authenticating entities in ICT environments. Current identity management solutions often ha...

    Authors: Audun Jøsang, Christophe Rosenberger, Laurent Miralabé, Henning Klevjer, Kent A Varmedal, Jérôme Daveau, Knut Eilif Husa and Petter Taugbøl
    Citation: Journal of Trust Management 2015 2:1
  11. In this work we present a thorough quantitative analysis of information consumption patterns of qualitatively different information on Facebook. Pages are categorized, according to their topics and the communi...

    Authors: Alessandro Bessi, Antonio Scala, Luca Rossi, Qian Zhang and Walter Quattrociocchi
    Citation: Journal of Trust Management 2014 1:12
  12. In this paper, we offer an algorithm for intelligent decision making about travel path planning in mobile vehicular ad-hoc networks (VANETs), for scenarios where agents representing vehicles exchange reports a...

    Authors: Robin Cohen, Jie Zhang, John Finnson, Thomas Tran and Umar F Minhas
    Citation: Journal of Trust Management 2014 1:2
  13. Public displays may adapt intelligently to the social context, tailoring information on the screen, for example, to the profiles of spectators, their gender or based on their mutual proximity. However, such ad...

    Authors: Michael Wißner, Stephan Hammer, Ekatarina Kurdyukova and Elisabeth André
    Citation: Journal of Trust Management 2014 1:6
  14. Information is the currency of the digital age – it is constantly communicated, exchanged and bartered, most commonly to support human understanding and decision-making. While the Internet and Web 2.0 have bee...

    Authors: Jason RC Nurse, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese and Koen Lamberts
    Citation: Journal of Trust Management 2014 1:5
  15. Crowdsourcing provides a valuable means for accomplishing large amounts of work which may require a high level of expertise. We present an algorithm for computing the trustworthiness of user-contributed tags o...

    Authors: Davide Ceolin, Archana Nottamkandath and Wan Fokkink
    Citation: Journal of Trust Management 2014 1:3
  16. A Sybil attack consists of an adversary assuming multiple identities to defeat the trust of an existing reputation system. When Sybil attacks are launched in vehicular networks, the mobility of vehicles increa...

    Authors: Muhammad Al-Mutaz, Levi Malott and Sriram Chellappan
    Citation: Journal of Trust Management 2014 1:4