Home

Conference Organization

Important Dates
Call for Papers
Call for Demonstrations
Paper submissions
Accepted papers

Program 
Tutorials 
Panel

Registration

Conference venue
Local Information

Previous iTrust Events






Program

PDF Version

16th May

09:00 – 10:30 Tutorial

Mogens Nielsen. Formal Models of Trust

10:30 – 11:00 Coffee Break

11:00 – 12:30 Tutorial

Mogens Nielsen. Formal Models of Trust

14:00 – 14 - 18: EU projects SESSION:

Presentations of the following projects:

·TrustCom (Theo Dimitrakos,Jakka Saimamesh, Lutz Schulbert)
·SecurIST (Jimmy McGibney)
·Positif (Aldo Basile)
·GeoPKDD (Fosca Giannotti)
·SENSORIA (Stefania Gnesi)
·ReSIST (Luca Simoncini)
·ARTIST2 (Sandro Etalle)
·S3MS (Fabio Massacci)
·...
Session open to all iTrust attendees
17th May

09:00 – 10:00 KeyNote speaker

Cristiano Castelfranchi. Why we Need a Non-reductionist Approach to Trust

10:00 – 10:30 Coffee Break

10:30 – 12:30  SESSION: Trust evaluation

Siv Hilde Houmb, Indrakshi Ray and Indrajit Ray. Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation

Tomas Klos and Han La Poutré. A Versatile Approach to Combining Trust Values for Making Binary Decisions

Xiaoqing Zheng, Zhaohui Wu and Huajun Chen. A Scalable Probabilistic Approach to Trust Evaluation

Siani Pearson. Towards Automated Evaluation of Trust Constraints

12:30 – 14:00 Lunch Break

14:00 – 15:30 SESSION: Networks and trust I

Christian D. Jensen and Paul O Connell. Trust-Based Route Selection in Dynamic Source Routing

Jacek Jonczy and Rolf Haenni. Implementing Credential Networks

Siani Pearson and Marco Casassa Mont. Provision of Trusted Identity Management using Trust Credentials

15:30 – 16:00 Coffee Break

16:00 – 18:00 SESSION: Models I

Cristiano Castelfranchi, Rino Falcone and Francesca Marzo. Being Trusted in a Social Network: Trust as Relational Capital

Dag Elgesem. Normative structures in trust management

Audun Josang, Stephen Marsh and Simon Pope. Exploring Different Types of Trust Propagation

Asimina Vasalou, Jeremy Pitt and Guillaume Piolle. From theory to practice: offering forgiveness as a way to repair online conflicts in CMC

18th May

09:00 – 10:30 SESSION: Networks and trust II

Daniele Quercia, Licia Capra and Stephen Hailes. Towards anonymous trusted interactions

Mehran Ahsant, Mike Surridge, Thomas Leonard, Ananth Krishna and Olle Mulmo. Dynamic Trust Federation in Grids

Christoph Sorge and Martina Zitterbart. A Reputation-Based System for Confidentiality Modeling in Peer-To-Peer Networks

10:30 – 11:00 Coffee Break

11:00 – 12:30 SESSION: Trust and interaction

Colin English and Sotirios Terzis. Gathering Experience in Trust-based Interactions

Noria Foukia, Li Zhou and Clifford Neuman. Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail

Kouki Yonezawa. A Novel Protocol for Communicating Reputation in P2P Networks

12:30 – 14:00 Lunch Break

14:00 – 15:30 Panel: On the Facets of Trust

Cristiano Castelfranchi, Andrew J I Jones, Christos Nikolaou, Shari Lawrence Pfleeger, Giovanni Sartor, William H. Winsborough (Moderator)

15:30 – 16:00 Coffee Break

16:00 – 18:00 SESSION: Models & Privacy

Vidyaraman Sankaranarayanan and Shambhu Upadhyaya. A Trust Assignment Model based on Alternate Actions Payoff

Karl Quinn, Dave Lewis, Declan O Sullivan and Vincent Wade. The Design, Generation, and Utilisation of a Semantically Rich Personalised Model of Trust.

Giovanni Sartor. Privacy, Reputation, and Trust: Some Implications for Data Protection

Adam J. Lee and Marianne Winslett. Virtual Fingerprinting as a Foundation for Reputation in Open Systems

20:00 Social dinner

19th May

09:00 – 10:30 SESSION: Trust frameworks

Suroop Mohan Chandran, Korporn Panyim and James B. D. Joshi. A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments

Daniele Quercia, Stephen Hailes and Licia Capra. B-trust: Bayesian Trust Framework for Pervasive Computing

Jennifer Golbeck. Generating Predictive Movie Recommendations using Trust in Social Networks

10:30 – 11:00 Coffee Break

11:00 – 12:30 SESSION: Reputation systems

Evangelos Kotsovinos, Petros Zerfos, Nischal Piratla, Niall Cameron and Sachin Agarwal. Jiminy: A scalable incentive-based architecture for improving rating quality

Florian Kerschbaum, Jochen Haller, Yuecel Karabulut and Philip Robinson. PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation

Jonathan Traupman and Robert Wilensky. Robust Reputations for Peer-to-peer Marketplaces

12:30 – 14:00 Lunch Break

14:00 – 15:30 DEMO Session

Evangelos Kotsovinos, Petros Zerfos, Nischal Piratla, and Niall Cameron
Jiminy: A scalable incentive-based architecture for improving rating quality

Laurent Gomez and Ulrich Jansen
Trust Establishment in Emergency Case

Jacek Jonczy
Evaluating Trust and Authenticity with Caution

Philipp Obreiter and Birgitta K─onig-Ries
The Interactive Cooperation Tournament. How to Identify Opportunities for Selfish Behavior of Computational Entities1

Karen K. Fullam, Tomas Klos, Guillaume Muller, Jordi Sabater-Mir, K. Suzanne Barber, and Laurent Vercouter
The Agent Reputation and Trust (ART) Testbed

Adam J. Lee, Marianne Winslett, Jim Basney, and Von Welch
Traust: A Trust Negotiation Based Authorization Service

Judith E. Y. Rosseb°, Scott Cadzow, and Paul Sijben
eTVRA, a threat, vulnerability and risk assessment tool for eEurope

15:30 – 16:00 Coffee Break

16:00 – 17:30 SESSION: Trust modelling

Peter Herrmann. Temporal Logic-Based Specification and Verification of Trust Models

Gert Jan Hofstede, Catholijn M. Jonker, Sebastiaan Meijer and Tim Verwaart. Modelling Trade and Trust across Cultures

Wolter Pieters. Acceptance of voting technology: between confidence and trust

17:30 – 17:35 Closing speech

Last modified: Thu May 04  by Alessandro Falleni