-
2
-
-
84899405466
-
-
Retrieved March 25, 2006, from
-
ART Testbed. (2006). Retrieved March 25, 2006, from http://www.lips.utexas.edu/art-testbed.
-
(2006)
ART Testbed
-
-
-
3
-
-
84899172119
-
Trusty interaction in visual environments
-
Florence, Italy
-
Bottoni, P., Costabile, M. F., Levialdi, S., Matera, M., & Mussio, P. (2000). Trusty interaction in visual environments. In Proceedings of the 6th ERCIM Workshop USER INTERFACES FOR ALL (UI4ALL), Florence, Italy (pp. 263-277).
-
(2000)
Proceedings of the 6th ERCIM Workshop USER INTERFACES FOR ALL (UI4ALL)
, pp. 263-277
-
-
Bottoni, P.1
Costabile, M.F.2
Levialdi, S.3
Matera, M.4
Mussio, P.5
-
4
-
-
35048852060
-
Using risk analysis to assess user trust
-
LNCS 2995, Oxford, UK: Springer
-
Braendeland, G., & Stolen, K. (2004). Using risk analysis to assess user trust. In Proceedings of the Second International iTrust Conference (LNCS 2995, pp. 146-160). Oxford, UK: Springer.
-
(2004)
Proceedings of the Second International ITrust Conference
, pp. 146-160
-
-
Braendeland, G.1
Stolen, K.2
-
5
-
-
84899255039
-
-
Retrieved March 25, 2006, from
-
eBay. (2006). Retrieved March 25, 2006, from http://www.ebay.com
-
(2006)
EBay
-
-
-
6
-
-
84899291427
-
-
March 27-29, Retrieved March 25, 2006, from
-
Fourteenth International Workshop on Security Protocols. (2006, March 27-29). Retrieved March 25, 2006, from http://homepages.feis.herts.ac.uk/~strrjh/SP2006
-
(2006)
Fourteenth International Workshop On Security Protocols
-
-
-
7
-
-
35048841167
-
Requirements engineering meets trust management
-
LNCS 2995, Oxford, UK: Springer
-
Giorgini, P., Massaci, F., Mylopoulos, J., & Zannone, N. (2004). Requirements engineering meets trust management. In Proceedings of the Second International iTrust Conference (LNCS 2995, pp. 176-190). Oxford, UK: Springer.
-
(2004)
Proceedings of the Second International ITrust Conference
, pp. 176-190
-
-
Giorgini, P.1
Massaci, F.2
Mylopoulos, J.3
Zannone, N.4
-
8
-
-
24944578244
-
Modelling social and individual trust in requirements engineering methodologies
-
LNCS 3477, Paris, France: Springer
-
Giorgini, P., Massaci, F., Mylopoulos, J., & Zannone, N. (2005). Modelling social and individual trust in requirements engineering methodologies. In Proceedings of the Third International iTrust Conference (LNCS 3477, pp. 161-176). Paris, France: Springer.
-
(2005)
Proceedings of the Third International ITrust Conference
, pp. 161-176
-
-
Giorgini, P.1
Massaci, F.2
Mylopoulos, J.3
Zannone, N.4
-
9
-
-
0009481412
-
A survey of trust in Internet applications
-
Grandison, T., & Sloman, M. (2000). A survey of trust in Internet applications. IEEE Communications Surveys and Tutorials, 3(4), 2-16.
-
(2000)
IEEE Communications Surveys and Tutorials
, vol.3
, Issue.4
, pp. 2-16
-
-
Grandison, T.1
Sloman, M.2
-
10
-
-
35048890565
-
Managing Internet-mediated community trust relations
-
LNCS 2995, Oxford, UK: Springer
-
Grimsley, M., Meehan, A., & Tan, A. (2004). Managing Internet-mediated community trust relations. In Proceedings of the Second International iTrust Conference (LNCS 2995, pp. 277-290). Oxford, UK: Springer.
-
(2004)
Proceedings of the Second International ITrust Conference
, pp. 277-290
-
-
Grimsley, M.1
Meehan, A.2
Tan, A.3
-
11
-
-
35048837543
-
Picking battles: The impact of trust assumptions on the elaboration of security requirements
-
LNCS 2995, Oxford, UK: Springer
-
Haley, C., Laney, R., Moffett, J., & Nuseibeh, B. (2004). Picking battles: The impact of trust assumptions on the elaboration of security requirements. In Proceedings of the Second International iTrust Conference (LNCS 2995, pp. 347-354). Oxford, UK: Springer.
-
(2004)
Proceedings of the Second International ITrust Conference
, pp. 347-354
-
-
Haley, C.1
Laney, R.2
Moffett, J.3
Nuseibeh, B.4
-
12
-
-
0041893447
-
Building agent-based intelligent workspaces
-
Las Vegas, NV: CSREA Press
-
Hanssens, N., Kulkarni, A., Tuchinda, R., & Horton, T. (2002). Building agent-based intelligent workspaces. In Proceedings of the International Conference on Internet Computing, IC'2002 (Vol. 3, pp. 675-681). Las Vegas, NV: CSREA Press.
-
(2002)
Proceedings of the International Conference On Internet Computing, IC'2002
, vol.3
, pp. 675-681
-
-
Hanssens, N.1
Kulkarni, A.2
Tuchinda, R.3
Horton, T.4
-
13
-
-
84952936148
-
Pervasive computing-what is it good for?
-
Seattle, WA
-
Huandg, C., Ling, B. C., & Ponnekanti, S. (1999). Pervasive computing-what is it good for? In Proceedings of the ACM International Workshop on Data Engineering for Wireless and Mobile Access, Seattle, WA (pp. 84-91).
-
(1999)
Proceedings of the ACM International Workshop On Data Engineering For Wireless and Mobile Access
, pp. 84-91
-
-
Huandg, C.1
Ling, B.C.2
Ponnekanti, S.3
-
14
-
-
35048846054
-
Trust development and management in virtual communities
-
LNCS 2995, Oxford, UK: Springer
-
Ishaya, T., & Mundy, D. (2004). Trust development and management in virtual communities. In Proceedings of the Second International iTrust Conference (LNCS 2995, pp. 266-276). Oxford, UK: Springer.
-
(2004)
Proceedings of the Second International ITrust Conference
, pp. 266-276
-
-
Ishaya, T.1
Mundy, D.2
-
15
-
-
84898513692
-
TRUST-EC: Requirements for trust and confidence in commerce: Report of the workshop held in Luxembourg
-
April 8-9
-
Jones, S., & Morris, P. (1999, April 8-9). TRUST-EC: Requirements for trust and confidence in commerce: Report of the workshop held in Luxembourg. European Communities EUR Report, 2.
-
(1999)
European Communities EUR Report, 2
-
-
Jones, S.1
Morris, P.2
-
16
-
-
26944452917
-
A survey of trust and reputation systems for online service provision
-
Jøsang, A., Ismail, R., & Boyd, C. (2005). A survey of trust and reputation systems for online service provision. Decision Support Systems, (to appear).
-
(2005)
Decision Support Systems, (to Appear)
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
17
-
-
0141862713
-
-
(Tech. Rep. No. 96-04, MISRC Working Paper Series): University of Minnesota, Management Information Systems Research Center
-
McKnight, D. H., & Chervany, N. L. (1996). The meanings of trust. (Tech. Rep. No. 96-04, MISRC Working Paper Series): University of Minnesota, Management Information Systems Research Center.
-
(1996)
The Meanings of Trust
-
-
McKnight, D.H.1
Chervany, N.L.2
-
19
-
-
84899294843
-
-
Retrieved March 25, 2006, from
-
Slashdot. (2006). Retrieved March 25, 2006, from http://slashdot.org.
-
(2006)
Slashdot
-
-
-
20
-
-
19944433808
-
The pudding of trust
-
Staab, S., Bhargava, B., Lilien, L., Rosenthal, A., Winslett, M., & Sloman, M. (2004). The pudding of trust. IEEE Intelligent Systems Journal, 19(5), 74-88.
-
(2004)
IEEE Intelligent Systems Journal
, vol.19
, Issue.5
, pp. 74-88
-
-
Staab, S.1
Bhargava, B.2
Lilien, L.3
Rosenthal, A.4
Winslett, M.5
Sloman, M.6
-
22
-
-
7044233034
-
Securing agent-based e-banking services
-
LNAI 2631, Springer
-
Tan, J., Titkov, L., & Poslad, S. (2002). Securing agent-based e-banking services. In Trust, Reputation, and Security: Theories and Practice (AAMAS 2002 International Workshop) (LNAI 2631, pp. 148-162): Springer.
-
(2002)
Trust, Reputation, and Security: Theories and Practice (AAMAS 2002 International Workshop)
, pp. 148-162
-
-
Tan, J.1
Titkov, L.2
Poslad, S.3
-
23
-
-
30844435365
-
A trust matrix model for electronic commerce
-
LNCS 2692, Crete, Greece: Springer
-
Tan, Y. H. (2003). A trust matrix model for electronic commerce. In Proceedings of the First International iTrust Conference (LNCS 2692, pp. 33-45). Crete, Greece: Springer.
-
(2003)
Proceedings of the First International ITrust Conference
, pp. 33-45
-
-
Tan, Y.H.1
-
24
-
-
24944528448
-
The CORAS tool for security risk analysis
-
LNCS 3477, Paris: Springer
-
Vraalsen, F., Braber, F., Lund, M., & Stolen, K. (2005). The CORAS tool for security risk analysis. In Proceedings of the Third International iTrust Conference (LNCS 3477, pp. 402-405). Paris: Springer.
-
(2005)
Proceedings of the Third International ITrust Conference
, pp. 402-405
-
-
Vraalsen, F.1
Braber, F.2
Lund, M.3
Stolen, K.4
-
25
-
-
24944554414
-
Specifying legal risk scenarios using the CORAS threat modelling language
-
LNCS 3477, Paris: Springer
-
Vraalsen, F., Lund, M., Mahler, T., Parent, X., & Stolen, K. (2005). Specifying legal risk scenarios using the CORAS threat modelling language. In Proceedings of the Third International iTrust Conference (LNCS 3477, pp. 45-60). Paris: Springer.
-
(2005)
Proceedings of the Third International ITrust Conference
, pp. 45-60
-
-
Vraalsen, F.1
Lund, M.2
Mahler, T.3
Parent, X.4
Stolen, K.5
-
26
-
-
35248870761
-
Methodology to bridge different domains of trust in mobile communications
-
LNCS 2692, Crete, Greece: Springer
-
Yan, Z., & Cofta, P. (2003). Methodology to bridge different domains of trust in mobile communications. In Proceedings of the First International iTrust Conference (LNCS 2692, pp. 211-224). Crete, Greece: Springer.
-
(2003)
Proceedings of the First International ITrust Conference
, pp. 211-224
-
-
Yan, Z.1
Cofta, P.2
-
27
-
-
7044239079
-
Designing for privacy in a multi-agent world
-
LNAI 2631, Springer
-
Yu, E., & Cysneiros, L. (2002). Designing for privacy in a multi-agent world. In Trust, Reputation, and Security: Theories and Practice (AAMAS 2002 International Workshop) (LNAI 2631, pp. 209-223). Springer.
-
(2002)
Trust, Reputation, and Security: Theories and Practice (AAMAS 2002 International Workshop)
, pp. 209-223
-
-
Yu, E.1
Cysneiros, L.2
-
28
-
-
84942921136
-
Using the i* strategic actors framework
-
LNAI 2246, Springer
-
Yu, E., & Liu, L. (2001). Using the i* strategic actors framework. In Trust in Cyber-Societies, Integrating the Human and Artificial Perspectives (LNAI 2246, pp. 175-194): Springer.
-
(2001)
Trust In Cyber-Societies, Integrating the Human and Artificial Perspectives
, pp. 175-194
-
-
Yu, E.1
Liu, L.2
|