Trust Management II: Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway

Portada
Yücel Karabulut, John C. Mitchell, Peter Herrmann, Christian Damsgaard Jensen
Springer Science & Business Media, 2008 M06 6 - 372 páginas
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re levant problems from both research and practice in the areas of academia, busi ness, and government. IFIPTM 2008 is an open IFIP conference, which only accepts contributed pa pers, so all papers in these proceedings have passed strict peer review. The pro gram of the conference features both theoretical research papers and reports of real world case studies. IFIPTM 2008 received 62 submissions. The program commit tee selected 22 papers for presentation and inclusion in the proceedings. In addi tion, the program and the proceedings include 3 demo descriptions. The highlights of IFIPTM 2008 include invited talks and tutorials by industri al and academic experts in the fields of trust management, privacy and security, including Jon Bing and Michael Steiner.
 

Comentarios de la gente - Escribir un comentario

No encontramos ningún comentario en los lugares habituales.

Contenido

Trust Management in P2P Systems Using Standard TuLiP
1
A Trust Evaluation Method Based on Logic and Probability Theory
17
A UMLbased Method for the Development of Policies to Support Trust Management
33
Analyzing the Robustness of CertainTrust
51
An Intensional Functional Model of Trust
68
A Translation Mechanism for Recommendations
87
Modeling Trust for Recommender Systems using Similarity Metrics
103
TrustBased Collaborative Filtering
119
Protecting Location Privacy through Semanticsaware Obfuscation Techniques
231
Towards Collaborative DataPrivacy Protection
247
Automatic verification of privacy properties in the applied pi calculus
263
Place and Time Authentication of Cultural Assets
279
A Lightweight Binary Authentication System for Windows
295
Towards StandardsCompliant Trust Negotiation for Web Services
311
Assigning Responsibility for Failed Obligations
327
Role and RelationshipBased Identity Management for Private yet Accountable ELearning
343

Social Filtering for Robust Recommendations
135
Continuous Ratings in Discrete Bayesian Reputation Systems
151
A Robust and KnotAware TrustBased Reputation Model
167
A Case Study in Modelling Trust in Applications
183
Cooperation in Growing Communities
198
A Model for Reasoning About the Privacy Impact of Composite Service Execution in Pervasive Computing
215
Using Rummble as a Personalised Travel Guide
359
An Inline Monitoring System for NET Mobile Devices
363
STORE Stochastic Reputation Service for Virtual Organisations
367
Author Index
371
Derechos de autor

Otras ediciones - Ver todas

Términos y frases comunes

Información bibliográfica