Trust Management : Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, New Brunswick, Canada - Sandro Etalle

Trust Management

Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, New Brunswick, Canada

By: Sandro Etalle (Editor), Stephen Marsh (Editor)

Paperback | 19 November 2010

At a Glance

Paperback


$225.12

Aims to ship in 7 to 10 business days

Private Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust.- Trust Transfer in Distributed Systems.- Trust without Truth.- Mining and Detecting Connection-Chains in Network Traffic.- A Privacy-Aware Service Discovery Middleware for Pervasive Environments.- Analysis of the implicit trust within the OLSR protocol.- Validating a Trust-based Access Control System.- Negotiation for Authorisation in Virtual Organisations.- A Geo Time Authentication System.- Content Trust Model for Detecting Web Spam.- Applied Computational Trust in Utilities Management: a Case Study on The Town Council of Cava de' Tirreni.- A trust protocol for community collaboration.- Towards an Understanding of Security, Privacy and Safety in Maritime Self-Reporting Systems.- Dismantling the Twelve Privacy Purposes.- A Framework for Privacy-Preserving E-learning.- Exploiting Trust and Suspicion for Real-time Attack Recognition in Recommender Applications.- Self-Selection Bias in Reputation Systems.- Resisting Sybils in Peer-to-peer Markets.- A Trust Model for an Open, Decentralized Reputation System.- Control Flow Based Pointcuts for Security Hardening Concerns.- Design of Trusted Systems with Reusable Collaboration Models.- MUQAMI: A Locally Distributed Key Management Scheme for Clustered Sensor Networks.- Trust based Approach for Improving Data Reliability in Industrial Sensor Networks.- The AI Hardness of CAPTCHAs does not imply Robust Network Security.- Resilia: a Safe and Secure Distributed Backup System for Small and Medium Enterprises.- Integrity in Open Collaborative Authoring Systems.- Service-Oriented Approach to Visualize IT Security Performance Metrics.- From Early Requirements Analysis towards Secure Workflows.- Monitors for Usage Control.- Design of Trusted Systems with Reusable Collaboration Models.

Other Editions and Formats

Hardcover

Published: 8th August 2007

More in Data Encryption

Cybercrime : An Encyclopedia of Digital Crime - Nancy E. Marion

RRP $59.99

$49.25

18%
OFF
Cyber Crime Investigator's Field Guide - Bruce Middleton
Trust, Security and Privacy for Big Data - Mamoun Alazab
5G Cyber Risks and Mitigation - Sabhyata Soni
Blockchain : Blueprint for a New Economy - Melanie Swan

RRP $66.50

$32.75

51%
OFF
Cyber Wars : Hacks that Shocked the Business World - Charles Arthur
Network Security Assessment : Know Your Network : 3rd Edition - Chris Mcnab