ACKNOWLEDGEMENTS
The Chair of Applied Telematics/e-Business is en-
dowed by Deutsche Telekom AG.
REFERENCES
CAcert Inc. (2007). CAcert. http://www.cacert.org/.
Callas, J., Donnerhacke, L., Finney, H., and Thayer, R.
(1998). OpenPGP Message Format. RFC 2440.
Caronni, G. (2000). Walking the web of trust. volume 00,
page 153, Los Alamitos, CA, USA. IEEE Computer
Society.
”Darxus” (2002). GPG/PGP signature path tracing. http:
//www.chaosreigns.com/code/sigtrace/.
Datta, A., Hauswirth, M., and Aberer, K. (2003). Be-
yond ”web of trust”: Enabling p2p e-commerce. Pro-
ceedings of the IEEE International Conference on E-
Commerce, pages 303–313.
Dierks, T. and Rescorla, E., editors (2006). The Transport
Layer Security (TLS) Protocol Version 1.1. RFC 4346.
Eckert, C. (2004). IT-Sicherheit. Oldenbourg Verlag, 3.
edition.
Ferguson, N. and Schneier, B. (2003). Practical Cryptog-
raphy. Wiley.
Golbeck, J., Parsia, B., and Hendler, J. (2003). Cooperative
Information Agents VII, volume 2782 of Lecture Notes
in Computer Science, chapter Trust Networks on the
Semantic Web, pages 238–249. Springer, Berlin, Hei-
delberg.
Guardiola, X., Guimera, R., Arenas, A., Diaz-Guilera, A.,
Streib, D., and Amaral, L. A. N. (2002). Macro- and
micro-structure of trust networks. ArXiv Condensed
Matter e-prints.
Guha, R., Kumar, R., Raghavan, P., and Tomkins, A.
(2004). Propagation of trust and distrust. In WWW
’04: Proceedings of the 13th international conference
on World Wide Web, pages 403–412, New York, NY,
USA. ACM Press.
Housley, R., Polk, W., Ford, W., and Solo, D. (2002). Inter-
net X.509 Public Key Infrastructure - Certificate and
Certificate Revocation List (CRL) Profile. RFC 3280.
ITU-T (2005). Recommendation X.500, ”The Directory:
Overview of Concepts, Models and Service”.
Khan, J. I. and Shaikh, S. (2006). Relationship alge-
bra for computing in social networks and social net-
work based applications. Proceedings of the 2006
IEEE/WIC/ACM International Conference on Web In-
telligence (WI’06).
Kuethe, C. and Laager, R. (2007). OpenPGP public key
server. http://pks.sourceforge.net.
Last.fm Ltd. (2007). Last.fm. http://last.fm.
Marsh, S. P. (1994). Formalising Trust as a Computational
Concept. PhD-Thesis, Department of Computing Sci-
ence and Mathematics. University of Stirling.
Maurer, U. (1996a). Modelling a public-key infrastructure.
In ESORICS’96.
Maurer, U. (1996b). A unified and generalized treatment of
authentication theory. In STACS: Annual Symposium
on Theoretical Aspects of Computer Science, volume
1046 of LNCS, pages 387–398.
McDowell, J. (2005). Experimental PGP key path finder.
http://the.earth.li/
˜
noodles/pathfind.
html.
Milgram, S. (1967). The small world problem. Psychology
Today, 2:60–67.
MySpace.com (2007). Myspace. http://www.myspace.
com.
OPEN Business Club AG (2007). Xing. http://www.
xing.com.
Rescorla, E. (2000). HTTP Over TLS. RFC 2818.
Richardson, M., Agrawal, R., and Domingos, P. (2003). The
SemanticWeb - ISWC 2003, volume 2870 of Lecture
Notes in Computer Science, chapter Trust Manage-
ment for the Semantic Web, pages 351–368. Springer,
Berlin / Heidelberg.
Ries, S., Kangasharju, J., and Mhlhuser, M. (2006). A clas-
sification of trust systems. In Meersman, R., Tari,
Z., Herrero, P., et al., editors, OTM Workshops 2006,
LNCS 4277, pages 894–903. Springer-Verlag Berlin
Heidelberg.
Thawte Inc. (2007). Thawte. http://www.thawte.com/
secure-email/web-of-trust-wot/index.html.
Watts, D. J. (2003). Six degrees: The Science of a Con-
nected Age. Norton.
Yahoo! Inc. (2007). Flickr. http://www.flickr.com.
Zimmermann, P. R. (1995). The Official PGP Users Guide.
MIT Press, Boston, Massachusetts, U.S.A.
Zuckerberg, M. (2007). Facebook. http://www.
facebook.com.
SECRYPT 2007 - International Conference on Security and Cryptography
250