|
|
|
|
LEADER |
04674nam a22004575i 4500 |
001 |
978-0-387-73655-6 |
003 |
DE-He213 |
005 |
20151126141033.0 |
007 |
cr nn 008mamaa |
008 |
100301s2007 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387736556
|9 978-0-387-73655-6
|
024 |
7 |
|
|a 10.1007/978-0-387-73655-6
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Trust Management
|h [electronic resource] :
|b Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30– August 2, 2007, New Brunswick, Canada /
|c edited by Sandro Etalle, Stephen Marsh.
|
264 |
|
1 |
|a Boston, MA :
|b Springer US,
|c 2007.
|
300 |
|
|
|a XII, 416 p. 108 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a IFIP International Federation for Information Processing,
|x 1571-5736 ;
|v 238
|
505 |
0 |
|
|a Private Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust -- Trust Transfer in Distributed Systems -- Trust without Truth -- Mining and Detecting Connection-Chains in Network Traffic -- A Privacy-Aware Service Discovery Middleware for Pervasive Environments -- Analysis of the implicit trust within the OLSR protocol -- Validating a Trust-based Access Control System -- Negotiation for Authorisation in Virtual Organisations -- A Geo Time Authentication System -- Content Trust Model for Detecting Web Spam -- Applied Computational Trust in Utilities Management: a Case Study on The Town Council of Cava de’ Tirreni -- A trust protocol for community collaboration -- Towards an Understanding of Security, Privacy and Safety in Maritime Self-Reporting Systems -- Dismantling the Twelve Privacy Purposes -- A Framework for Privacy-Preserving E-learning -- Exploiting Trust and Suspicion for Real-time Attack Recognition in Recommender Applications -- Self-Selection Bias in Reputation Systems -- Resisting Sybils in Peer-to-peer Markets -- A Trust Model for an Open, Decentralized Reputation System -- Control Flow Based Pointcuts for Security Hardening Concerns -- Design of Trusted Systems with Reusable Collaboration Models -- MUQAMI: A Locally Distributed Key Management Scheme for Clustered Sensor Networks -- Trust based Approach for Improving Data Reliability in Industrial Sensor Networks -- The AI Hardness of CAPTCHAs does not imply Robust Network Security -- Resilia: a Safe and Secure Distributed Backup System for Small and Medium Enterprises -- Integrity in Open Collaborative Authoring Systems -- Service-Oriented Approach to Visualize IT Security Performance Metrics -- From Early Requirements Analysis towards Secure Workflows -- Monitors for Usage Control -- Design of Trusted Systems with Reusable Collaboration Models.
|
520 |
|
|
|a International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com. For more information about IFIP, please visit www.ifip.org.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
700 |
1 |
|
|a Etalle, Sandro.
|e editor.
|
700 |
1 |
|
|a Marsh, Stephen.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387736549
|
830 |
|
0 |
|a IFIP International Federation for Information Processing,
|x 1571-5736 ;
|v 238
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-0-387-73655-6
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|