Evidence for Monitoring the User and Computing the User’s trust | IEEE Conference Publication | IEEE Xplore