Trust Management Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30– August 2, 2007, New Brunswick, Canada /

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Etalle, Sandro (Επιμελητής έκδοσης), Marsh, Stephen (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Boston, MA : Springer US, 2007.
Σειρά:IFIP International Federation for Information Processing, 238
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Private Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust
  • Trust Transfer in Distributed Systems
  • Trust without Truth
  • Mining and Detecting Connection-Chains in Network Traffic
  • A Privacy-Aware Service Discovery Middleware for Pervasive Environments
  • Analysis of the implicit trust within the OLSR protocol
  • Validating a Trust-based Access Control System
  • Negotiation for Authorisation in Virtual Organisations
  • A Geo Time Authentication System
  • Content Trust Model for Detecting Web Spam
  • Applied Computational Trust in Utilities Management: a Case Study on The Town Council of Cava de’ Tirreni
  • A trust protocol for community collaboration
  • Towards an Understanding of Security, Privacy and Safety in Maritime Self-Reporting Systems
  • Dismantling the Twelve Privacy Purposes
  • A Framework for Privacy-Preserving E-learning
  • Exploiting Trust and Suspicion for Real-time Attack Recognition in Recommender Applications
  • Self-Selection Bias in Reputation Systems
  • Resisting Sybils in Peer-to-peer Markets
  • A Trust Model for an Open, Decentralized Reputation System
  • Control Flow Based Pointcuts for Security Hardening Concerns
  • Design of Trusted Systems with Reusable Collaboration Models
  • MUQAMI: A Locally Distributed Key Management Scheme for Clustered Sensor Networks
  • Trust based Approach for Improving Data Reliability in Industrial Sensor Networks
  • The AI Hardness of CAPTCHAs does not imply Robust Network Security
  • Resilia: a Safe and Secure Distributed Backup System for Small and Medium Enterprises
  • Integrity in Open Collaborative Authoring Systems
  • Service-Oriented Approach to Visualize IT Security Performance Metrics
  • From Early Requirements Analysis towards Secure Workflows
  • Monitors for Usage Control
  • Design of Trusted Systems with Reusable Collaboration Models.