000 | 05270nam a22005535i 4500 | ||
---|---|---|---|
001 | u374493 | ||
003 | SIRSI | ||
005 | 20160812084237.0 | ||
007 | cr nn 008mamaa | ||
008 | 100609s2010 gw | s |||| 0|eng d | ||
020 |
_a9783642134463 _9978-3-642-13446-3 |
||
040 | _cMX-MeUAM | ||
050 | 4 | _aTK5105.5-5105.9 | |
082 | 0 | 4 |
_a004.6 _223 |
100 | 1 |
_aNishigaki, Masakatsu. _eeditor. |
|
245 | 1 | 0 |
_aTrust Management IV _h[recurso electrónico] : _b4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010. Proceedings / _cedited by Masakatsu Nishigaki, Audun Jøsang, Yuko Murayama, Stephen Marsh. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
300 |
_aXII, 276 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aIFIP Advances in Information and Communication Technology, _x1868-4238 ; _v321 |
|
505 | 0 | _aPrivacy and Trust -- Schemes for Privately Computing Trust and Reputation -- Self-service Privacy: User-Centric Privacy for Network-Centric Identity -- Naïve Security in a Wi-Fi World -- Security Through Trust -- Securing Class Initialization -- xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement -- Metric Strand Spaces for Locale Authentication Protocols -- Visitor Access Control Scheme Utilizing Social Relationship in the Real World -- Trust Models and Management -- Impact of Trust Management and Information Sharing to Adversarial Cost in Ranking Systems -- Shinren: Non-monotonic Trust Management for Distributed Systems -- Modeling and Analysis of Trust Management Protocols: Altruism versus Selfishness in MANETs -- Trust Models -- Trustworthiness in Networks: A Simulation Approach for Approximating Local Trust and Distrust Values -- Design of Graded Trusts by Using Dynamic Path Validation -- Implementation and Performance Analysis of the Role-Based Trust Management System, RT C -- A Formal Notion of Trust – Enabling Reasoning about Security Properties -- Experimental and Experiential Trust -- Leveraging a Social Network of Trust for Promoting Honesty in E-Marketplaces -- Does Trust Matter for User Preferences? A Study on Epinions Ratings -- Bringing the Virtual to the Farmers’ Market: Designing for Trust in Pervasive Computing Systems -- Incorporating Interdependency of Trust Values in Existing Trust Models for Trust Dynamics. | |
520 | _aThis volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided a truly global platform for the reporting of research, development, policy, and practice in the interdependent arrears of privacy, se- rity, and trust. Building on the traditions inherited from the highly succe- ful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, the IFIPTM 2008 conference in Trondheim, Norway, and the IFIPTM 2009 conference at Purdue University in Indiana, USA, IFIPTM 2010 focused on trust, privacy and security from multidisciplinary persp- tives. The conference is an arena for discussion on relevant problems from both research and practice in the areas of academia, business, and government. IFIPTM 2010 was an open IFIP conference. The program of the conference featured both theoretical research papers and reports of real-world case studies. IFIPTM 2010 received 61 submissions from 25 di?erent countries: Japan (10), UK (6), USA (6), Canada (5), Germany (5), China (3), Denmark (2), India (2), Italy (2), Luxembourg (2), The Netherlands (2), Switzerland (2), Taiwan (2), Austria, Estonia, Finland, France, Ireland, Israel, Korea,Malaysia, Norway, Singapore, Spain, Turkey. The Program Committee selected 18 full papers for presentation and inclusion in the proceedings. In addition, the program and the proceedings include two invited papers by academic experts in the ?elds of trust management, privacy and security, namely, Toshio Yamagishi and Pamela Briggs. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aInformation systems. | |
650 | 0 | _aInformation Systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aInformation Systems Applications (incl.Internet). |
650 | 2 | 4 | _aUser Interfaces and Human Computer Interaction. |
700 | 1 |
_aJøsang, Audun. _eeditor. |
|
700 | 1 |
_aMurayama, Yuko. _eeditor. |
|
700 | 1 |
_aMarsh, Stephen. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642134456 |
830 | 0 |
_aIFIP Advances in Information and Communication Technology, _x1868-4238 ; _v321 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-13446-3 |
596 | _a19 | ||
942 | _cLIBRO_ELEC | ||
999 |
_c202373 _d202373 |