Trust Management II Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway /

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Karabulut, Yücel (Επιμελητής έκδοσης), Mitchell, John (Επιμελητής έκδοσης), Herrmann, Peter (Επιμελητής έκδοσης), Jensen, Christian Damsgaard (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Boston, MA : Springer US : Imprint: Springer, 2008.
Σειρά:IFIP – The International Federation for Information Processing, 263
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Full Papers
  • Trust Management in P2P Systems Using Standard TuLiP
  • A Trust Evaluation Method Based on Logic and Probability Theory
  • A UML-based Method for the Development of Policies to Support Trust Management
  • Analyzing the Robustness of CertainTrust
  • An Intensional Functional Model of Trust
  • A Translation Mechanism for Recommendations
  • Modeling Trust for Recommender Systems using Similarity Metrics
  • Trust-Based Collaborative Filtering
  • SOFIA: Social Filtering for Robust Recommendations
  • Continuous Ratings in Discrete Bayesian Reputation Systems
  • A Robust and Knot-Aware Trust-Based Reputation Model
  • The North Laine Shopping Guide: A Case Study in Modelling Trust in Applications
  • Cooperation in Growing Communities
  • A Model for Reasoning About the Privacy Impact of Composite Service Execution in Pervasive Computing
  • Protecting Location Privacy through Semantics-aware Obfuscation Techniques
  • Privacy2.0: Towards Collaborative Data-Privacy Protection
  • Automatic Verification of Privacy Properties in the Applied pi Calculus
  • Place and Time Authentication of Cultural Assets
  • A Lightweight Binary Authentication System for Windows
  • Towards Standards-Compliant Trust Negotiation for Web Services
  • Assigning Responsibility for Failed Obligations
  • Role- and Relationship-Based Identity Management for Private yet Accountable E-Learning
  • Demonstration Overviews
  • Using Rummble as a Personalised Travel Guide
  • An Inline Monitoring System for .NET Mobile Devices
  • STORE Stochastic Reputation Service for Virtual Organisations.