Tag #trust
229 papers:
- DiGRA-2019-Fleet #bound
- Boundaries, Trust and Reputation in Virtual and Illicit Markets (RF).
- KDD-2019-ZouZCW0 #optimisation #policy
- Separated Trust Regions Policy Optimization Method (LZ, ZZ, YC, XW, WZ0), pp. 1471–1479.
- ICML-2018-DunnerLGBHJ #algorithm #distributed #higher-order
- A Distributed Second-Order Algorithm You Can Trust (CD, AL, MG, AB, TH, MJ), pp. 1357–1365.
- MSR-2017-ZolfaghariniaAG #empirical
- Do not trust build results at face value: an empirical study of 30 million CPAN builds (MZ, BA, YGG), pp. 312–322.
- ICML-2017-HonerNBMG #detection #robust
- Minimizing Trust Leaks for Robust Sybil Detection (JH, SN, AB0, KRM, NG), pp. 1520–1528.
- CASE-2017-WuXS #network #protocol
- Trust-based protocol for securing routing in opportunistic networks (XW, JX, JS), pp. 434–439.
- CHI-PLAY-2016-DeppingMJBT #game studies #social
- Trust Me: Social Games are Better than Social Icebreakers at Building Trust (AED, RLM, CJ, JTB, SCT), pp. 116–129.
- CIKM-2016-JangFKKH #information management #named #performance
- PIN-TRUST: Fast Trust Propagation Exploiting Positive, Implicit, and Negative Information (MHJ, CF, SWK, UK, JH), pp. 629–638.
- KDD-2016-Ribeiro0G #classification #predict #quote #why
- “Why Should I Trust You?”: Explaining the Predictions of Any Classifier (MTR, SS0, CG), pp. 1135–1144.
- CASE-2016-RahmanWWMPR #assembly #collaboration #flexibility
- Trust-based compliant robot-human handovers of payloads in collaborative assembly in flexible manufacturing (SMMR, YW, IDW, LM, RP, SR), pp. 355–360.
- VLDB-2015-DongGMDHLSZ #knowledge-based #web
- Knowledge-Based Trust: Estimating the Trustworthiness of Web Sources (XLD, EG, KM, VD, WH, CL, SS, WZ), pp. 938–949.
- FDG-2015-JohanssonVK #game studies #multi #online
- I am being watched by the Tribunal: Trust and control in Multiplayer Online Battle Arena games (MJ, HV, YK).
- CHI-2015-HardingKDR #human-computer
- HCI, Civic Engagement & Trust (MH, BK, ND, MR), pp. 2833–2842.
- CSCW-2015-KnowlesRHDBHWW #modelling
- Models and Patterns of Trust (BK, MR, MH, ND, LB, JH, JW, DW), pp. 328–338.
- HCI-DE-2015-SalanitriHBLSW #usability
- Relationship Between Trust and Usability in Virtual Environments: An Ongoing Study (DS, CH, SB, GL, SS, BW), pp. 49–59.
- HCI-IT-2015-KhataeiA #persuasion
- Trust-Based Individualization for Persuasive Presentation Builder (AK, AA), pp. 418–428.
- ICML-2015-SchulmanLAJM #optimisation #policy
- Trust Region Policy Optimization (JS, SL, PA, MIJ, PM), pp. 1889–1897.
- KDD-2015-Dhar #question
- Should You Trust Your Money to a Robot? (VD), p. 1625.
- RecSys-2015-ForsatiBMER #algorithm #named #performance #recommendation
- PushTrust: An Efficient Recommendation Algorithm by Leveraging Trust and Distrust Relations (RF, IB, FM, AHE, HR), pp. 51–58.
- ECOOP-2015-VekrisCJ #type system #verification
- Trust, but Verify: Two-Phase Typing for Dynamic Languages (PV, BC, RJ), pp. 52–75.
- ICSE-v2-2015-EtienneMAD #modelling #performance #predict #process #proving
- Improving Predictability, Efficiency and Trust of Model-Based Proof Activity (JFÉ, MM, FA, VD), pp. 139–148.
- SAC-2015-GkorouPE #distributed #network
- Trust-based collection of information in distributed reputation networks (DG, JAP, DHJE), pp. 2312–2319.
- SAC-2015-SharmaMDH
- Bi-directional trust index computation in resource marketplace (AS, TM, PD, VGH), pp. 2305–2311.
- CGO-2015-RohouSS #branch #performance #predict
- Branch prediction and the performance of interpreters: don’t trust folklore (ER, BNS, AS), pp. 103–114.
- DAC-2015-BrasserMSWK #named
- TyTAN: tiny trust anchor for tiny devices (FFB, BEM, ARS, CW, PK), p. 6.
- QoSA-2014-Meyer #question #verification
- Trust or verify? (BM), pp. 1–2.
- HT-2014-TangHL #social #social media
- Is distrust the negation of trust?: the value of distrust in social media (JT, XH, HL), pp. 148–157.
- CHI-2014-GarbettCEGO #interface #people
- Finding “real people”: trust and diversity in the interface between professional and citizen journalists (ATG, RC, PE, MG, PO), pp. 3015–3024.
- CHI-2014-PanSS #interactive
- Comparing flat and spherical displays in a trust scenario in avatar-mediated interaction (YP, WS, AS), pp. 1397–1406.
- HCI-AS-2014-NiedoberHMKSCJL #automation #case study
- Influence of Cultural, Organizational and Automation Factors on Human-Automation Trust: A Case Study of Auto-GCAS Engineers and Developmental History (DJN, NTH, GM, KK, MS, AC, WJ, JBL), pp. 473–484.
- HCI-AS-2014-TsengT #complexity #correlation #design #online #visual notation
- The Correlation between Visual Complexity and User Trust in On-line Shopping: Implications for Design (KTT, YCT), pp. 90–99.
- LCT-NLE-2014-SousaLD #human-computer #towards
- A Model for Human-Computer Trust — Contributions Towards Leveraging User Engagement (SCS, DRL, PD), pp. 128–137.
- LCT-TRE-2014-BaldiniKLT #network #social
- European Citizens and Their Trust in Social Networks (GB, IK, JL, MT), pp. 363–374.
- SCSM-2014-LeonardoFGPSSUWC #identification #social #social media
- Identifying Locations of Social Significance: Aggregating Social Media Content to Create a New Trust Model for Exploring Crowd Sourced Data and Information (ADL, SF, AG, FP, WS, TS, AU, DW, JBC), pp. 170–177.
- CAiSE-2014-MoyanoBG
- Trust-Aware Decision-Making Methodology for Cloud Sourcing (FM, KB, MCFG), pp. 136–149.
- ICEIS-v2-2014-CalefatoLN #social #social media
- Investigating the Effect of Social Media on Trust Building in Customer-supplier Relationships (FC, FL, NN), pp. 635–642.
- CIKM-2014-MaLG #collaboration #community #recommendation
- Improving Recommendation Accuracy by Combining Trust Communities and Collaborative Filtering (XM, HL, ZG), pp. 1951–1954.
- RecSys-2014-FazeliLBDS #matrix #social
- Implicit vs. explicit trust in social matrix factorization (SF, BL, AB, HD, PBS), pp. 317–320.
- RecSys-2014-HarmanOAG #recommendation
- Dynamics of human trust in recommender systems (JLH, JO, TFA, CG), pp. 305–308.
- SIGIR-2014-YaoHHZ #modelling #recommendation
- Modeling dual role preferences for trust-aware recommendation (WY, JH, GH, YZ), pp. 975–978.
- SAC-2014-GuoZTBY #empirical #recommendation
- From ratings to trust: an empirical study of implicit trust in recommender systems (GG, JZ, DT, AB, NYS), pp. 248–253.
- DATE-2014-Jin #evaluation #proving #security #tool support
- EDA tools trust evaluation through security property proofs (YJ), pp. 1–4.
- DATE-2014-JinS #evaluation #realtime
- Real-time trust evaluation in integrated circuits (YJ, DS), pp. 1–6.
- TACAS-2014-HuthK #automation #named #reasoning
- PEALT: An Automated Reasoning Tool for Numerical Aggregation of Trust Evidence (MH, JHPK), pp. 109–123.
- CHI-2013-RaeTM #case study #communication #experience
- In-body experiences: embodiment, control, and trust in robot-mediated communication (IR, LT, BM), pp. 1921–1930.
- CSCW-2013-Al-AniBWTKMRP #developer #distributed #process
- Globally distributed system developers: their trust expectations and processes (BAA, MJB, YW, ET, BK, SM, DFR, RP), pp. 563–574.
- CSCW-2013-RollandL #collaboration #reliability #research #reuse
- Beyond trust and reliability: reusing data in collaborative cancer epidemiology research (BR, CPL), pp. 435–444.
- CSCW-2013-WangM #online #social #social media
- Trust in online news: comparing social media and official media use by chinese citizens (YW, GM), pp. 599–610.
- DUXU-NTE-2013-JaimesMR #tool support
- Increasing Trust in Personal Informatics Tools (LGJ, TM, AR), pp. 520–529.
- HCI-UC-2013-BeldadS #experience #ll #online
- It Was Nice with the Brick So Now I’ll Click: The Effects of Offline and Online Experience, Perceived Benefits, and Trust on Dutch Consumers’ Online Repeat Purchase Intention (AB, MS), pp. 371–380.
- HCI-UC-2013-HayashiKO #empirical #network #social
- An Empirical Investigation of Similarity-Driven Trust Dynamics in a Social Network (YH, VVK, HO), pp. 20–28.
- HCI-UC-2013-HeupelBK #privacy
- Trust and Privacy in the di.me Userware (MH, MB, DK), pp. 39–48.
- HCI-UC-2013-NothdurftHM #human-computer
- The Impact of Explanation Dialogues on Human-Computer Trust (FN, TH, WM), pp. 59–67.
- HIMI-HSM-2013-HighamVMSB #automation
- Training Air Traffic Controller Trust in Automation within a NextGen Environment (TMH, KPLV, JM, TZS, VB), pp. 76–84.
- EDOC-2013-GallegeGHR #contract #monitoring #using
- Trustworthy Service Selection Using Long-Term Monitoring of Trust Contracts (LSG, DG, JHH, RRR), pp. 195–200.
- RecSys-2013-Guo #recommendation #similarity
- Integrating trust and similarity to ameliorate the data sparsity and cold start for recommender systems (GG), pp. 451–454.
- SEKE-2013-WangWTZ #evaluation #named #network #recommendation
- STERS: A System for Service Trustworthiness Evaluation and Recommendation based on the Trust Network (YW, JW, YT, JZ), pp. 322–325.
- SAC-2013-AhmedE #network
- Discovering influential nodes from trust network (SA, CIE), pp. 121–128.
- SAC-2013-ChoCC #ad hoc #mobile #network
- Composite trust-based public key management in mobile ad hoc networks (JHC, KSC, IRC), pp. 1949–1956.
- SAC-2013-HabibVM #framework
- A framework for evaluating trust of service providers in cloud marketplaces (SMH, VV, MM), pp. 1963–1965.
- DAC-2013-ZhangYWSX #hardware #named #verification
- VeriTrust: verification for hardware trust (JZ, FY, LW, ZS, QX), p. 8.
- HT-2012-ShenSNT #network #online #social
- Maximizing circle of trust in online social networks (YS, YSS, DTN, MTT), pp. 155–164.
- CHI-2012-ChuangRMH #analysis #design #modelling #visualisation
- Interpretation and trust: designing model-driven visualizations for text analysis (JC, DR, CDM, JH), pp. 443–452.
- CHI-2012-FisherPDs #dataset #incremental #performance #scalability #visualisation
- Trust me, I’m partially right: incremental visualization lets analysts explore large datasets faster (DF, IOP, SMD, MMCS), pp. 1673–1682.
- CSCW-2012-VinesDBLMO
- The joy of cheques: trust, paper and eighty somethings (JV, PD, MB, SL, AM, PO), pp. 147–156.
- CIKM-2012-DuttingHW #recommendation
- Maximizing revenue from strategic recommendations under decaying trust (PD, MH, IW), pp. 2283–2286.
- CIKM-2012-HuangNHT #network #predict #social
- Trust prediction via aggregating heterogeneous social networks (JH, FN, HH, YCT), pp. 1774–1778.
- KDD-2012-TangLGS #comprehension #evolution #named #online
- eTrust: understanding trust evolution in an online world (JT, HG, HL, ADS), pp. 253–261.
- KMIS-2012-Kutay #information management #online
- Trust Online for Information Sharing (CK), pp. 216–222.
- SEKE-2012-HumayunG #empirical #using
- An Empirical Study on Improving Trust among GSD Teams Using KMR (MH, GC), pp. 131–134.
- SIGIR-2012-Khatiban #mining #using
- Building reputation and trust using federated search and opinion mining (SK), p. 994.
- SAC-2012-NoorianFM
- Preference-oriented QoS-based service discovery with dynamic trust and reputation management (ZN, MF, SM), pp. 2014–2021.
- SAC-2012-YaichBJP #adaptation #community
- An adaptive and Socially-Compliant Trust Management System for virtual communities (RY, OB, PJ, GP), pp. 2022–2028.
- SAC-2012-ZhangI #protocol #web #web service #xml
- An XML-based protocol for improving trust negotiation between Web Services (YZ, TI), pp. 1947–1954.
- DATE-2012-JinMM #encryption #evaluation
- Post-deployment trust evaluation in wireless cryptographic ICs (YJ, DM, YM), pp. 965–970.
- TACAS-2012-ArmandoAABCCCCCCEFMMOPPRRDTV #architecture #automation #framework #platform #security #validation
- The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures (AA, WA, TA, MB, AC, AC, RC, YC, LC, JC, GE, SF, MM, SM, DvO, GP, SEP, MR, MR, MTD, MT, LV), pp. 267–282.
- SIGITE-2011-LevySB #privacy
- A trust-aware tag-based privacy control for eHealth 2.0 (KL, BS, YB), pp. 251–256.
- ICPC-2011-Ali #analysis #automation #named #retrieval
- Trustrace: Improving Automated Trace Retrieval through Resource Trust Analysis (NA), pp. 230–233.
- ICPC-2011-AliGA #requirements #traceability
- Trust-Based Requirements Traceability (NA, YGG, GA), pp. 111–120.
- MSR-2011-SinhaMS #developer #open source
- Entering the circle of trust: developer initiation as committers in open-source projects (VSS, SM, SS), pp. 133–142.
- SFM-2011-CostaIMMS #security
- Security and Trust (GC, VI, FM, IM, RS), pp. 393–416.
- CSCW-2011-SemaanM
- Creating a context of trust with ICTs: restoring a sense of normalcy in the environment (BS, GM), pp. 255–264.
- IDGD-2011-ZhangM
- Once Broken, Never Fixed? The Impact of Culture and Medium on Repairing Trust in CMC (QZ, NM), pp. 341–350.
- EDOC-2011-FatemiSW
- Trust and Business Webs (HF, MvS, RW), pp. 119–128.
- ICEIS-J-2011-Shen #comparison #comprehension #social
- Understanding User’s Acceptance of Social Shopping Websites: Effects of Social Comparison and Trust (JS), pp. 365–373.
- ICEIS-v3-2011-ViriyasitavatM #formal method #requirements #specification #workflow
- Formalizing Trust Requirements and Specification in Service Workflow Environments (WV, AM), pp. 196–206.
- ICEIS-v4-2011-HuGK #evaluation #modelling #network
- Supply Chain Trust Evaluation Model based on Bayesian Network (XH, FG, YK), pp. 712–715.
- ICEIS-v4-2011-ShenE #comparison #social
- User Acceptance of Social Shopping Sites — Social Comparison and Trust (JS, LBE), pp. 219–224.
- CIKM-2011-Fernandez-LuqueKM #named #retrieval
- HealthTrust: trust-based retrieval of you tube’s diabetes channels (LFL, RK, GBM), pp. 1917–1920.
- CIKM-2011-LoSZL #community #mining #network
- Mining direct antagonistic communities in explicit trust networks (DL, DS, KZ, EPL), pp. 1013–1018.
- ECIR-2011-ShiLH11a #how #question #recommendation
- How Far Are We in Trust-Aware Recommendation? (YS, ML, AH), pp. 704–707.
- KDD-2011-VydiswaranZR #framework
- Content-driven trust propagation framework (VGVV, CZ, DR), pp. 974–982.
- RecSys-2011-GorgoglionePT #behaviour #recommendation
- The effect of context-aware recommendations on customer purchasing behavior and trust (MG, UP, AT), pp. 85–92.
- ICSE-2011-MeneelyW #developer #metric #network #question
- Socio-technical developer networks: should we trust our measurements? (AM, LW), pp. 281–290.
- SAC-2011-BaoCCC #network
- Hierarchical trust management for wireless sensor networks and its application to trust-based routing (FB, IRC, MC, JHC), pp. 1732–1738.
- SAC-2011-SchryenVRH #approach #distributed #formal method #towards
- A formal approach towards measuring trust in distributed systems (GS, MV, SR, SMH), pp. 1739–1745.
- SIGMOD-2010-GatterbauerS #using
- Data conflict resolution using trust mappings (WG, DS), pp. 219–230.
- CHI-2010-CramerESGW #mobile #social
- Trying too hard: effects of mobile agents’ (Inappropriate) social expressiveness on trust, affect and compliance (HSMC, VE, TvS, MG, BJW), pp. 1471–1474.
- KDD-2010-ChuaL #generative #modelling #network #online #rating #using
- Trust network inference for online rating data using generative models (FCTC, EPL), pp. 889–898.
- KMIS-2010-FaedAW
- The Impact of Trust and Interactivity on Intensifying Customer Loyalty for CRM (AF, AA, CW), pp. 113–120.
- RecSys-2010-JamaliE #matrix #network #recommendation #social
- A matrix factorization technique with trust propagation for recommendation in social networks (MJ, ME), pp. 135–142.
- SAC-2010-DolevGK #multi #scalability
- Computing multi-party trust privately: in O(n) time units sending one (possibly large) message at a time (SD, NG, MK), pp. 1460–1465.
- SAC-2010-OCallaghanDC #grid
- Evaluating trust in grid certificates (DO, LD, BAC), pp. 1449–1450.
- SAC-2010-SaadiPB #2d #named
- T2D: a peer to peer trust management system based on disposition to trust (RS, JMP, LB), pp. 1472–1478.
- SAC-2010-YadavS #framework #named #network
- iTrust: an integrated trust framework for wireless sensor networks (KY, AS), pp. 1466–1471.
- HPDC-2010-GehaniK #multi #named #verification
- Mendel: efficiently verifying the lineage of data modified in multiple trust domains (AG, MK), pp. 227–239.
- OSDI-2010-MahajanSLCADW #named
- Depot: Cloud Storage with Minimal Trust (PM, STVS, SL, AC, LA, MD, MW), pp. 307–322.
- OSDI-2010-TangMK #operating system
- Trust and Protection in the Illinois Browser Operating System (ST, HM, STK), pp. 17–32.
- CHI-2009-CramerESW #adaptation #interactive
- Awareness, training and trust in interaction with adaptive spam filters (HSMC, VE, MvS, BJW), pp. 909–912.
- CHI-2009-KostakosO #assessment #design
- Designing trustworthy situated services: an implicit and explicit assessment of locative images-effect on trust (VK, IO), pp. 329–332.
- CHI-2009-ScissorsGGG #similarity
- In CMC we trust: the role of similarity (LES, AJG, KG, DG), pp. 527–536.
- HCI-AUII-2009-DetweilerB #guidelines #online #towards
- Trust in Online Technology: Towards Practical Guidelines Based on Experimentally Verified Theory (CD, JB), pp. 605–614.
- OCSC-2009-Jameson #community #distributed #online
- Distributed Leadership, Trust and Online Communities (JJ), pp. 226–235.
- ICEIS-DISI-2009-CastilloCGPPV #network #quality
- Establishing Trust Networks based on Data Quality Criteria for Selecting Data Suppliers (RPC, IC, IGRdG, MP, MP, EV), pp. 37–42.
- ICEIS-SAIC-2009-PetersA #analysis #on the #platform
- On the Helpfulness of Product Reviews — An Analysis of Customer-to-Customer Trust on eShop-Platforms (GP, VA), pp. 41–46.
- CIKM-2009-LiuDRL #named #personalisation
- StereoTrust: a group based personalized trust model (XL, AD, KR, EPL), pp. 7–16.
- CIKM-2009-SunWL #injection
- Injecting purpose and trust into data anonymisation (XS, HW, JL), pp. 1541–1544.
- ICML-2009-RaykarYZJFVBM #learning #multi
- Supervised learning from multiple experts: whom to trust when everyone lies a bit (VCR, SY, LHZ, AKJ, CF, GHV, LB, LM), pp. 889–896.
- KDD-2009-JamaliE #named #random #recommendation
- TrustWalker: a random walk model for combining trust-based and item-based recommendation (MJ, ME), pp. 397–406.
- KMIS-2009-SadaranganiA
- The Role of Trust in Impact of Leadership on Knowledge Sharing (PS, AA), pp. 266–270.
- RecSys-2009-Golbeck #recommendation #social #tutorial #using
- Tutorial on using social trust for recommender systems (JG), pp. 425–426.
- RecSys-2009-JamaliE #network #recommendation #using
- Using a trust network to improve top-N recommendation (MJ, ME), pp. 181–188.
- RecSys-2009-MaLK #learning #recommendation
- Learning to recommend with trust and distrust relationships (HM, MRL, IK), pp. 189–196.
- RecSys-2009-MoghaddamJEH #feedback #named #recommendation #using
- FeedbackTrust: using feedback effects in trust-based recommendation systems (SM, MJ, ME, JH), pp. 269–272.
- RecSys-2009-Tavakolifard
- Situation-aware trust management (MT), pp. 413–416.
- RecSys-2009-WalterBS #network #personalisation #social
- Personalised and dynamic trust in social networks (FEW, SB, FS), pp. 197–204.
- SIGIR-2009-MaKL #learning #recommendation #social
- Learning to recommend with social trust ensemble (HM, IK, MRL), pp. 203–210.
- RE-2009-ElahiY #analysis #requirements #security #trade-off
- Trust Trade-off Analysis for Security Requirements Engineering (GE, ESKY), pp. 243–248.
- SAC-2009-AhamedKHZ #security #towards
- Towards developing a trust-based security solution (SIA, DK, CSH, MZ), pp. 2204–2205.
- SAC-2009-Huynh #assessment #framework #personalisation
- A personalized framework for trust assessment (TDH), pp. 1302–1307.
- SAC-2009-PengC #collaboration #multi #named #recommendation
- iTrustU: a blog recommender system based on multi-faceted trust and collaborative filtering (TCP, ScTC), pp. 1278–1285.
- SAC-2009-Ries #modelling #representation
- Extending Bayesian trust models regarding context-dependence and user friendly representation (SR), pp. 1294–1301.
- SAC-2009-UddinZ #algorithm #automation #monitoring #named
- ATM: an automatic trust monitoring algorithm for service software (MGU, MZ), pp. 1040–1044.
- SAC-2009-YangSKY #collaboration #modelling #online
- Defending online reputation systems against collaborative unfair raters through signal modeling and trust (YY, YLS, SK, QY), pp. 1308–1315.
- JCDL-2008-CaverleeLW #community #named #online
- Socialtrust: tamper-resilient trust establishment in online communities (JC, LL, SW), pp. 104–114.
- CHI-2008-Kindberg
- Measuring trust in wi-fi hotspots (TK), pp. 173–182.
- CSCW-2008-KitturSC #wiki
- Can you ever trust a wiki?: impacting perceived trustworthiness in wikipedia (AK, BS, EHC), pp. 477–480.
- CSCW-2008-ScissorsGG
- Linguistic mimicry and trust in text-based CMC (LES, AJG, DG), pp. 277–280.
- ICEIS-AIDSS-2008-Portillo-RodriguezSVP #community
- A Model to Rate Trust in Communities of Practice (JPR, JPS, AV, MP), pp. 193–198.
- ICEIS-HCI-2008-IbrahimNM #web
- Wisdom on the Web: On Trust, Institution and Symbolisms — A Preliminary Investigation (ENMI, NLMN, SM), pp. 13–20.
- ICEIS-SAIC-2008-BninaCNA #question #what
- What Can Context Do for Trust in Manets? (EBB, OC, CTN, HKBA), pp. 133–141.
- ICEIS-SAIC-2008-PetersDW #e-commerce
- Consumer-to-Consumer Trust in E-Commerce — Are there Rules for Writing Helpful Product Reviews (GP, MD, RW), pp. 61–66.
- CIKM-2008-KazaiM #information retrieval #social
- Trust, authority and popularity in social information retrieval (GK, NMF), pp. 1503–1504.
- RecSys-2008-Lee #named #recommendation
- PITTCULT: trust-based cultural event recommender (DHL), pp. 311–314.
- SEKE-2008-YangE #delivery #multi
- Integrating Trust Management into Usage Control in P2P Multimedia Delivery (LY, RKE), pp. 411–416.
- SAC-2008-AdnaneSBM #behaviour #detection #reasoning
- Autonomic trust reasoning enables misbehavior detection in OLSR (AA, RTdSJ, CB, LM), pp. 2006–2013.
- SAC-2008-AhamedHT #pervasive
- Service sharing with trust in pervasive environment: now it’s time to break the jinx (SIA, MMH, NT), pp. 1622–1628.
- SAC-2008-BistarelliS #multi #network
- Propagating multitrust within trust networks (SB, FS), pp. 1990–1994.
- SAC-2008-Nassiri #3d #e-commerce #using
- Increasing trust through the use of 3d e-commerce environment (NN), pp. 1463–1466.
- SAC-2008-UddinZ #named #towards
- UMLtrust: towards developing trust-aware software (MGU, MZ), pp. 831–836.
- SAC-2008-UddinZA #named
- CAT: a context-aware trust model for open and dynamic systems (MGU, MZ, SIA), pp. 2024–2029.
- SAC-2008-VictorCTC #recommendation
- Whom should I trust?: the impact of key figures on cold start recommendations (PV, CC, AT, MDC), pp. 2014–2018.
- PDP-2008-CeccatoNT #performance #verification
- Distributing Trust Verification to Increase Application Performance (MC, JN, PT), pp. 604–610.
- ESOP-2008-CirilloJPR #distributed #named
- Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects (AC, RJ, CP, JR), pp. 208–223.
- ICLP-2008-BonattiCOS #privacy #security
- Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security (PAB, JLDC, DO, LS), pp. 779–784.
- ECDL-2007-WallisBMPRH #library #quality
- Know Thy Sensor: Trust, Data Quality, and Data Integrity in Scientific Digital Libraries (JCW, CLB, MSM, AP, NR, MHH), pp. 380–391.
- HT-2007-MoganW #case study #information management
- A study into user perceptions of information sharing and trust in virtual teams (SM, WW), pp. 43–44.
- CHI-2007-NguyenC #multi #named #video
- Multiview: improving trust in group video conferencing through spatial faithfulness (DTN, JC), pp. 1465–1474.
- HCI-AS-2007-LowryRH
- First Impressions with Websites: The Effect of the Familiarity and Credibility of Corporate Logos on Perceived Consumer Swift Trust of Websites (PBL, TLR, TH), pp. 77–85.
- HIMI-IIE-2007-IbrahimNM #concept #framework #online #web
- “Seeing Is Not Believing But Interpreting”, Inducing Trust Through Institutional Symbolism: A Conceptual Framework for Online Trust Building in a Web Mediated Information Environment (ENMI, NLMN, SM), pp. 64–73.
- OCSC-2007-XiongYZYL #grid #peer-to-peer
- A Trust-Based Reputation System in Peer-to-Peer Grid (ZX, YY, XZ, DY, LL), pp. 228–235.
- ICEIS-EIS-2007-JoyceW
- Building, and Losing, Consumer Trust in B2C E-Business (PJ, GW), pp. 55–62.
- ICEIS-EIS-2007-SchmidtDSC #ontology
- Trust and Reputation Ontologies for Electronic Business (SS, TSD, RS, EC), pp. 308–315.
- ECIR-2007-BriggsS #social
- Harnessing Trust in Social Search (PB, BS), pp. 525–532.
- ICML-2007-LinWK #scalability
- Trust region Newton methods for large-scale logistic regression (CJL, RCW, SSK), pp. 561–568.
- RecSys-2007-MassaA #recommendation
- Trust-aware recommender systems (PM, PA), pp. 17–24.
- SEKE-2007-PatelXG #online #realtime
- Real-Time Trust Management in Agent Based Online Auction Systems (RP, HX, AG), pp. 244–250.
- SIGIR-2007-NieWD #web
- Winnowing wheat from the chaff: propagating trust to sift spam from the web (LN, BW, BDD), pp. 869–870.
- PPDP-2007-HristovaTL #analysis #performance #policy
- Efficient trust management policy analysis from rules (KH, KTT, YAL), pp. 211–220.
- SAC-2007-BillhardtHOC
- Trust-based service provider selection in open environments (HB, RH, SO, RC), pp. 1375–1380.
- SAC-2007-NakamuraM #design #linux
- Designing a trust chain for a thin client on a live Linux cd (MN, SM), pp. 1605–1606.
- SAC-2007-Ries
- Certain trust: a trust model for users and agents (SR), pp. 1599–1604.
- DATE-2007-Casale-RossiSADGMPS #named #product line #question
- DFM/DFY: should you trust the surgeon or the family doctor? (MCR, AJS, RCA, AD, CG, PM, DP, JS), pp. 439–442.
- DATE-2007-VerbauwhedeS #design #security
- Design methods for security and trust (IV, PS), pp. 672–677.
- DATE-2007-WagnerB #semantics
- Engineering trust with semantic guardians (IW, VB), pp. 743–748.
- ICLP-2007-CzenkoE #logic programming
- Core TuLiP Logic Programming for Trust Management (MC, SE), pp. 380–394.
- FLOPS-2006-PimlottK
- Soutei, a Logic-Based Trust-Management System (AP, OK), pp. 130–145.
- CAiSE-2006-Kritis
- Dealing with Trust in eGov Services (VK), pp. 18–19.
- CAiSE-2006-Sutcliffe #concept #design #modelling #named
- Trust: From Cognition to Conceptual Models and Design (AGS), pp. 3–17.
- PPDP-2006-GorlaHS
- Inferring dynamic credentials for rôle-based trust management (DG, MH, VS), pp. 213–224.
- ICSE-2006-NguyenBV #maintenance #outsourcing
- Critical factors in establishing and maintaining trust in software outsourcing relationships (PTN, MAB, JMV), pp. 624–627.
- ICSE-2006-SuryanarayanaDET #architecture #distributed #modelling
- Architectural support for trust models in decentralized applications (GS, MHD, JRE, RNT), pp. 52–61.
- SAC-2006-KotsovinosW #named #scalability
- BambooTrust: practical scalable trust management for global public computing (EK, AW), pp. 1893–1897.
- SAC-2006-QuerciaLHCB #named
- STRUDEL: supporting trust in the dynamic establishment of peering coalitions (DQ, ML, SH, LC, SB), pp. 1870–1874.
- SAC-2006-WengMG #collaboration #metric
- Improving collaborative filtering with trust-based metrics (JW, CM, AG), pp. 1860–1864.
- SAC-2006-ZuoP #evaluation
- Information trustworthiness evaluation based on trust combination (YZ, BP), pp. 1880–1885.
- OSDI-2006-Ta-MinLL #configuration management #interface #operating system
- Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable (RTM, LL, DL), pp. 279–292.
- TACAS-2006-JhaSWR #automaton
- Weighted Pushdown Systems and Trust-Management Systems (SJ, SS, HW, TWR), pp. 1–26.
- SIGMOD-2005-ChaudhuriKR #query #question #sql
- When Can We Trust Progress Estimators for SQL Queries? (SC, RK, RR), pp. 575–586.
- ICEIS-v3-2005-ZhaoVB #collaboration #distributed #interactive
- Type and Scope of Trust Relationships in Collaborative Interactions in Distributed Environments (WZ, VV, GB), pp. 331–336.
- CIKM-2005-WengMGL #collaboration
- Trust-based collaborative filtering (JW, CM, AG, DL), pp. 299–300.
- SAC-2005-BicakciCT #certification #how #metric
- How to incorporate revocation status information into the trust metrics for public-key certification (KB, BC, AST), pp. 1594–1598.
- SAC-2005-WieringaG #coordination #correctness #design #process
- Value-oriented design of service coordination processes: correctness and trust (RW, JG), pp. 1320–1327.
- SAC-2005-ZuoP #component
- Component based trust management in the context of a virtual organization (YZ, BP), pp. 1582–1588.
- PPoPP-2005-YangBHM #correctness #monitoring #source code #verification
- Trust but verify: monitoring remotely executing programs for progress and correctness (SY, ARB, YCH, SPM), pp. 196–205.
- WICSA-2004-SuryanarayanaEHT #architecture #distributed #named
- PACE: An Architectural Style for Trust Management in Decentralized Applications (GS, JRE, SAH, RNT), pp. 221–232.
- VLDB-2004-SkogsrudBCD #lightweight #named
- Trust-Serv: A Lightweight Trust Negotiation Service (HS, BB, FC, MQD), pp. 1329–1332.
- CHI-2004-SillenceBFH #health #online
- Trust and mistrust of online health sites (ES, PB, LF, PRH), pp. 663–670.
- RE-2004-HaleyLMN #requirements #security
- The Effect of Trust Assumptions on the Elaboration of Security Requirements (CBH, RCL, JDM, BN), pp. 102–111.
- FSE-2004-Capra #mobile
- Engineering human trust in mobile system collaborations (LC), pp. 107–116.
- SAC-2004-SeigneurJ #privacy #ubiquitous
- Trust enhanced ubiquitous payment without too much privacy loss (JMS, CDJ), pp. 1593–1599.
- ESOP-2004-GuttmanTCHRS
- Trust Management in Strand Spaces: A Rely-Guarantee Method (JDG, FJT, JAC, JCH, JDR, BTS), pp. 325–339.
- VMCAI-2004-Guttman #protocol #security
- Security, Protocols, and Trust (JDG), p. 1.
- SEFM-2003-CarboneNS #formal method #network
- A Formal Model for Trust in Dynamic Networks (MC, MN, VS), p. 54–?.
- CHI-2003-RiegelsbergerSM #e-commerce #people
- Shiny happy people building trust?: photos on e-commerce websites and consumer trust (JR, MAS, JDM), pp. 121–128.
- ICEIS-v1-2003-LocMP #approach #component
- Try and Patch: An Approach to Improve the Trust in Software Components (PTXL, PM, GP), pp. 505–508.
- ICEIS-v4-2003-PerkinsJBC #collaboration #information management
- Building Supply Chain Relationships with Knowledge Management: Engineering Trust in Collaborative Systems (JP, AKJ, LB, SC), pp. 63–70.
- ICEIS-v4-2003-Vasiu #security #web #web service
- Security Web Services Based on Trust (LV), pp. 369–376.
- PADL-2003-LiM #constraints #datalog
- DATALOG with Constraints: A Foundation for Trust Management Languages (NL, JCM), pp. 58–73.
- PPDP-2003-NielsenK #towards
- Towards a formal notion of trust (MN, KK), pp. 4–7.
- SAC-2003-CazierSL #privacy
- Addressing E-Business Privacy Concerns: The Roles of Trust and Value Compatibility (JC, BS, RSL), pp. 617–622.
- JCDL-2002-House #community
- Trust and epistemic communities in biodiversity data sharing (NAVH), pp. 231–239.
- CHI-2002-BosOGOW #development
- Effects of four computer-mediated communications channels on trust development (NB, JSO, DG, GMO, ZW), pp. 135–140.
- CHI-2002-ZhengVBOO #process #social
- Trust without touch: jumpstarting long-distance trust with initial social activities (JZ, ESV, NB, JSO, GMO), pp. 141–146.
- CBSE-2001-Voas #certification #component
- Component Trust and Certification (JV), p. 1.
- CSEET-2001-DuleyMV #industrial
- Teamwork and Trust: Universities, industry and the professional software engineer (RD, SPM, DV), pp. 153–161.
- CHI-2001-BickmoreC #implementation #relational
- Relational agents: a model and implementation of building user trust (TWB, JC), pp. 396–403.
- ICEIS-v2-2001-GochenouerT #internet #privacy
- Privacy Audits and Trust: The Internet Dilemma (JEG, MLT), pp. 905–909.
- CIKM-2001-AbererD #information management
- Managing Trust in a Peer-2-Peer Information System (KA, ZD), pp. 310–317.
- PPDP-2001-HepburnW #π-calculus
- Trust in the π-Calculus (MH, DW), pp. 103–114.
- RE-2001-GansJKLEFM #approach #modelling #network #requirements
- Requirements Modeling for Organization Networks: A (Dis-)Trust-Based Approach (GG, MJ, SK, GL, LE, CF, MM), pp. 154–165.
- CSCW-2000-GreenspanGWB #communication
- Interpersonal trust and common ground in electronically mediated communication (SG, DG, DMW, AB), pp. 251–260.
- ICSE-2000-HeinemanCFMSS #component #re-engineering
- Component-based software engineering and the issue of trust (GTH, WTC, JSF, AM, JRS, MS), pp. 661–664.
- TOOLS-USA-1999-CrichtonDW #data access #mobile
- When to Trust Mobile Objects: Access Control in the Jini(tm) Software System (CC, JD, JW), pp. 116–125.
- POPL-1999-RielyH #mobile #type system
- Trust and Partial Typing in Open Systems of Mobile Agents (JR, MH), pp. 93–104.
- CHI-1998-Rocco
- Trust Breaks Down in Electronic Contexts But Can Be Repaired by Some Initial Face-to-Face Contact (ER), pp. 496–502.
- CSCW-1998-HouseBS #information management #set
- Cooperative Knowledge Work and Practices of Trust: Sharing Environmental Planning Data Sets (NAVH, MHB, LRS), pp. 335–343.
- SAS-1995-PalsbergO #λ-calculus
- Trust in the λ-Calculus (JP, PØ), pp. 314–329.
- TAPSOFT-1995-Orbaek #question
- Can you Trust your Data? (PØ), pp. 575–589.