Trust Management IV 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010. Proceedings /

This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided a truly global platform for the reporting of research, development, policy, and practice in the interde...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Nishigaki, Masakatsu (Επιμελητής έκδοσης), Jøsang, Audun (Επιμελητής έκδοσης), Murayama, Yuko (Επιμελητής έκδοσης), Marsh, Stephen (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Σειρά:IFIP Advances in Information and Communication Technology, 321
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 05328nam a22005775i 4500
001 978-3-642-13446-3
003 DE-He213
005 20151204185147.0
007 cr nn 008mamaa
008 100609s2010 gw | s |||| 0|eng d
020 |a 9783642134463  |9 978-3-642-13446-3 
024 7 |a 10.1007/978-3-642-13446-3  |2 doi 
040 |d GrThAP 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
245 1 0 |a Trust Management IV  |h [electronic resource] :  |b 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010. Proceedings /  |c edited by Masakatsu Nishigaki, Audun Jøsang, Yuko Murayama, Stephen Marsh. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg,  |c 2010. 
300 |a XII, 276 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a IFIP Advances in Information and Communication Technology,  |x 1868-4238 ;  |v 321 
505 0 |a Privacy and Trust -- Schemes for Privately Computing Trust and Reputation -- Self-service Privacy: User-Centric Privacy for Network-Centric Identity -- Naïve Security in a Wi-Fi World -- Security Through Trust -- Securing Class Initialization -- xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement -- Metric Strand Spaces for Locale Authentication Protocols -- Visitor Access Control Scheme Utilizing Social Relationship in the Real World -- Trust Models and Management -- Impact of Trust Management and Information Sharing to Adversarial Cost in Ranking Systems -- Shinren: Non-monotonic Trust Management for Distributed Systems -- Modeling and Analysis of Trust Management Protocols: Altruism versus Selfishness in MANETs -- Trust Models -- Trustworthiness in Networks: A Simulation Approach for Approximating Local Trust and Distrust Values -- Design of Graded Trusts by Using Dynamic Path Validation -- Implementation and Performance Analysis of the Role-Based Trust Management System, RT C -- A Formal Notion of Trust – Enabling Reasoning about Security Properties -- Experimental and Experiential Trust -- Leveraging a Social Network of Trust for Promoting Honesty in E-Marketplaces -- Does Trust Matter for User Preferences? A Study on Epinions Ratings -- Bringing the Virtual to the Farmers’ Market: Designing for Trust in Pervasive Computing Systems -- Incorporating Interdependency of Trust Values in Existing Trust Models for Trust Dynamics. 
520 |a This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided a truly global platform for the reporting of research, development, policy, and practice in the interdependent arrears of privacy, se- rity, and trust. Building on the traditions inherited from the highly succe- ful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, the IFIPTM 2008 conference in Trondheim, Norway, and the IFIPTM 2009 conference at Purdue University in Indiana, USA, IFIPTM 2010 focused on trust, privacy and security from multidisciplinary persp- tives. The conference is an arena for discussion on relevant problems from both research and practice in the areas of academia, business, and government. IFIPTM 2010 was an open IFIP conference. The program of the conference featured both theoretical research papers and reports of real-world case studies. IFIPTM 2010 received 61 submissions from 25 di?erent countries: Japan (10), UK (6), USA (6), Canada (5), Germany (5), China (3), Denmark (2), India (2), Italy (2), Luxembourg (2), The Netherlands (2), Switzerland (2), Taiwan (2), Austria, Estonia, Finland, France, Ireland, Israel, Korea,Malaysia, Norway, Singapore, Spain, Turkey. The Program Committee selected 18 full papers for presentation and inclusion in the proceedings. In addition, the program and the proceedings include two invited papers by academic experts in the ?elds of trust management, privacy and security, namely, Toshio Yamagishi and Pamela Briggs. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computers and civilization. 
650 0 |a Management information systems. 
650 0 |a Computer engineering. 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Data Encryption. 
650 2 4 |a Computer Engineering. 
650 2 4 |a Management of Computing and Information Systems. 
650 2 4 |a Computers and Society. 
650 2 4 |a Information Systems Applications (incl. Internet). 
700 1 |a Nishigaki, Masakatsu.  |e editor. 
700 1 |a Jøsang, Audun.  |e editor. 
700 1 |a Murayama, Yuko.  |e editor. 
700 1 |a Marsh, Stephen.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642134456 
830 0 |a IFIP Advances in Information and Communication Technology,  |x 1868-4238 ;  |v 321 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-13446-3  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)