| Invited Short Papers | |
| A Distributed Collaborative Filtering Recommendation Model for P2P Networks | p. 1 |
| Access Control for Cooperation Systems Based on Group Situation | p. 11 |
| Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites | p. 24 |
| CalSWIM: A Wiki-Based Data Sharing Platform | p. 34 |
| Examining a Bayesian Approach to Personalizing Context Awareness in Ubiquitous Computing Environments | p. 44 |
| Invited Pull Papers | |
| Smart Homes for All: Collaborating Services in a for-AU Architecture for Domotics | p. 56 |
| Archer: A Community Distributed Computing Infrastructure for Computer Architecture Research and Education | p. 70 |
| Collaborative Search and User Privacy: How Can They Be Reconciled | p. 85 |
| Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering | p. 100 |
| Incentive and Trust Issues in Assured Information Sharing | p. 113 |
| Combining Social Networks and Semantic Web Technologies for Personalizing Web Access | p. 126 |
| Evaluating Security Policies in Pervasive Mobile Environments Using Context Information | p. 145 |
| Towards Continuous Workflow Enactment Systems | p. 162 |
| The RiverFish Approach to Business Process Modeling: Linking Business Steps to Control-Flow Patterns | p. 179 |
| A Federated Digital Identity Management Approach for Business processes | p. 194 |
| SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments | p. 207 |
| Collaborative Attack vs. Collaborative Defense (Extended Abstract) | p. 217 |
| Learning Models of the Negotiation Partner in Spatio-temporal Collaboration | p. 229 |
| Full Papers | |
| Protecting Sensitive Information in Directory Services Using Virtual Directories | p. 244 |
| TeleEye: An Awareness Widget for Providing the Focus of Attention in Collaborative Editing Systems | p. 258 |
| Informa: An Extensible Framework for Group Response Systems | p. 271 |
| Secure and Conditional Resource Coordination for Successful Collaborations | p. 287 |
| RiBAC: Role Interaction Based Access Control Model for Community Computing | p. 304 |
| A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments | p. 322 |
| Access Control Model for Sharing Composite Electronic Health Records | p. 340 |
| Employing Sink Mobility to Extend the Lifetime of Wireless Sensor Networks | p. 355 |
| Avoiding Greediness in Cooperative Peer-to-Peer Networks | p. 370 |
| The Data Interoperability Problem as an Exemplary Case Study in the Development of Software Collaboration Environments | p. 379 |
| Towards a Framework for Evolvable Network Design | p. 390 |
| A Comprehensive Comparison of Trust Management Systems for Federation | p. 402 |
| A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme | p. 416 |
| A UniBed Theory of Trust and Collaboration | p. 425 |
| Enabling Interoperable and Selective Data Sharing among Social Networking Sites | p. 439 |
| Evaluating the Trustworthiness of Contributors in a Collaborative Environment | p. 451 |
| Supporting Agile Development of Authorization Rules for SME Applications | p. 461 |
| The Application of Human and Social Behavioral-Inspired Security Models for Self-aware Collaborative Cognitive Radio Networks | p. 472 |
| GroupBanter: Supporting Serendipitous Group Conversations with IM | p. 485 |
| The Effect of Personality on Collaborative Task Performance and Interaction | p. 499 |
| Replication in Overlay Networks: A Multi-objective Optimization Approach | p. 512 |
| An Undo Framework for P2P Collaborative Editing | p. 529 |
| A Contract Language for Service-Oriented Dynamic Collaborations | p. 545 |
| Monitoring Contract Enforcement within Virtual Organizations | p. 563 |
| Using Epidemic Hoarding to Minimize Load Delays in P2P Distributed Virtual Environments | p. 578 |
| A Battery-Aware Algorithm for Supporting Collaborative Applications | p. 594 |
| Collaborative Graphic Rendering for Improving Visual Experience | p. 609 |
| Analytics and Management of Collaborative Intranets | p. 623 |
| Mashup Model and Verification Using Mashup Processing Network | p. 632 |
| Automatic Categorization of Tags in Collaborative Environments | p. 649 |
| A New Method for Creating Efficient Security Policies in Virtual Private Network | p. 663 |
| Data Quality and Failures Characterization of Sensing Data in Environmental Applications | p. 679 |
| Security through Collaboration in MANETs | p. 696 |
| A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks | p. 715 |
| Location-Based Mapping Services to Support Collaboration in Spatially Distributed Workgroups | p. 732 |
| Serial vs. Concurrent Scheduling of Transmission and Processing Tasks in Collaborative Systems | p. 746 |
| Ontology Support for Managing Top-Down Changes in Composite Services | p. 760 |
| Trusted Translation Services | p. 778 |
| Enabling Meetings for "Anywhere and Anytime" | p. 792 |
| Collaboratively Sharing Scientific Data | p. 805 |
| IT Incident Management as a Collaborative Process: A Visualization Tool Inspired to Social Networks | p. 824 |
| Author Index | p. 831 |
| Table of Contents provided by Ingram. All Rights Reserved. |