Cargando…

Trust Management II Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway /

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Karabulut, Yücel (Editor ), Mitchell, John C. (Editor ), Herrmann, Peter (Editor ), Damsgaard Jensen, Christian (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer US : Imprint: Springer, 2008.
Edición:1st ed. 2008.
Colección:IFIP Advances in Information and Communication Technology, 263
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Full Papers
  • Trust Management in P2P Systems Using Standard TuLiP
  • A Trust Evaluation Method Based on Logic and Probability Theory
  • A UML-based Method for the Development of Policies to Support Trust Management
  • Analyzing the Robustness of CertainTrust
  • An Intensional Functional Model of Trust
  • A Translation Mechanism for Recommendations
  • Modeling Trust for Recommender Systems using Similarity Metrics
  • Trust-Based Collaborative Filtering
  • SOFIA: Social Filtering for Robust Recommendations
  • Continuous Ratings in Discrete Bayesian Reputation Systems
  • A Robust and Knot-Aware Trust-Based Reputation Model
  • The North Laine Shopping Guide: A Case Study in Modelling Trust in Applications
  • Cooperation in Growing Communities
  • A Model for Reasoning About the Privacy Impact of Composite Service Execution in Pervasive Computing
  • Protecting Location Privacy through Semantics-aware Obfuscation Techniques
  • Privacy2.0: Towards Collaborative Data-Privacy Protection
  • Automatic Verification of Privacy Properties in the Applied pi Calculus
  • Place and Time Authentication of Cultural Assets
  • A Lightweight Binary Authentication System for Windows
  • Towards Standards-Compliant Trust Negotiation for Web Services
  • Assigning Responsibility for Failed Obligations
  • Role- and Relationship-Based Identity Management for Private yet Accountable E-Learning
  • Demonstration Overviews
  • Using Rummble as a Personalised Travel Guide
  • An Inline Monitoring System for .NET Mobile Devices
  • STORE Stochastic Reputation Service for Virtual Organisations.