Cargando…

Trust Management Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, New Brunswick, Canada /

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Etalle, Sandro (Editor ), Marsh, Stephen (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer US : Imprint: Springer, 2007.
Edición:1st ed. 2007.
Colección:IFIP Advances in Information and Communication Technology, 238
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Private Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust
  • Trust Transfer in Distributed Systems
  • Trust without Truth
  • Mining and Detecting Connection-Chains in Network Traffic
  • A Privacy-Aware Service Discovery Middleware for Pervasive Environments
  • Analysis of the implicit trust within the OLSR protocol
  • Validating a Trust-based Access Control System
  • Negotiation for Authorisation in Virtual Organisations
  • A Geo Time Authentication System
  • Content Trust Model for Detecting Web Spam
  • Applied Computational Trust in Utilities Management: a Case Study on The Town Council of Cava de' Tirreni
  • A trust protocol for community collaboration
  • Towards an Understanding of Security, Privacy and Safety in Maritime Self-Reporting Systems
  • Dismantling the Twelve Privacy Purposes
  • A Framework for Privacy-Preserving E-learning
  • Exploiting Trust and Suspicion for Real-time Attack Recognition in Recommender Applications
  • Self-Selection Bias in Reputation Systems
  • Resisting Sybils in Peer-to-peer Markets
  • A Trust Model for an Open, Decentralized Reputation System
  • Control Flow Based Pointcuts for Security Hardening Concerns
  • Design of Trusted Systems with Reusable Collaboration Models
  • MUQAMI: A Locally Distributed Key Management Scheme for Clustered Sensor Networks
  • Trust based Approach for Improving Data Reliability in Industrial Sensor Networks
  • The AI Hardness of CAPTCHAs does not imply Robust Network Security
  • Resilia: a Safe and Secure Distributed Backup System for Small and Medium Enterprises
  • Integrity in Open Collaborative Authoring Systems
  • Service-Oriented Approach to Visualize IT Security Performance Metrics
  • From Early Requirements Analysis towards Secure Workflows
  • Monitors for Usage Control
  • Design of Trusted Systems with Reusable Collaboration Models.