Limit search to available items
Book Cover
E-book
Author IFIPTM (Conference) (5th : 2011 : Copenhagen, Denmark)

Title Trust management V : 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, Denmark, June 29-July 1, 2011, proceedings / Ian Wakeman [and others] (eds.)
Published Berlin ; New York : Springer, ©2011

Copies

Description 1 online resource (xi, 334 pages)
Series IFIP advances in information and communication technology ; 358
IFIP advances in information and communication technology ; 358.
Contents Intro -- Title -- Preface -- Organization -- Table of Contents -- Extended Abstracts for Keynote Speakers -- From Access Control to Trust Management, and Back -- A Petition -- Services and Mechanisms -- Access Control -- Trust Management -- Trust and Authorisation -- Weighing Evidence -- Reputation as an Attack Vector -- Occam's Razor -- The Petition -- References -- Familiarity Breeds Con-victims: Why We Need More Effective Trust Signaling -- Introduction -- The Importance of Trust Signaling -- References -- The Evolution of Trust -- Introduction -- References -- Trust and Social Intelligence
Full Papers -- Detecting and Reacting to Changes in Reputation Flows -- Introduction -- Background -- Reputation-Based Trust Management in Pilarcos -- Related Work on Changes and Uncertainty in Reputation Flows -- Tracking Changes with Reputation Epochs -- Detecting Changes in Service Performance -- Comparison of Epoch Detection Policies -- Conclusion -- References -- Validation and Verification of Agent Models for Trust: Independent Compared to Relative Trust -- Introduction -- Agent Models for Trust -- Independent Trust Model -- Relative Trust Model -- Method -- Participants -- Task
Data Collection -- Parameter Adaptation -- Validation -- Verification -- Results -- Validation Results -- Verification Results -- Discussion and Conclusions -- References -- Composing Trust Models towards Interoperable Trust Management -- Introduction -- Trust Model Definition -- Trust Relations -- Trust Assessment -- Trust Meta-model -- Trust Meta-model Formalization -- Example -- Composing Trust Models -- Role Mapping -- Relation Mediation -- Operation Mediation -- Conclusion -- References -- Identifying Knots of Trust in Virtual Communities -- Introduction -- Related Work
Applying Clustering for Identifying Knots -- Correlation Clustering -- Clustering Criteria -- Different Weight Functions -- The Knot Clustering Algorithm -- Clustering Evaluation -- Evaluation Results -- Conclusions and Future Work -- References -- Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information -- Introduction -- Related Work -- Motivation -- Clustering Algorithms -- Experimental Setting -- Test Schemes -- Dataset -- Evaluation Metrics -- Test Results -- Concluding Remarks -- References -- From Reputation Models and Systems to Reputation Ontologies
Introduction -- Reputation Models, Frameworks, and Systems -- Why Ontologies -- Ontology Standards -- Ontology Requirements -- A Literature of Defining Reputation Concepts -- Existing Approaches to Reputation Ontologies -- For Multi Agents Systems -- For Web Services -- For e-Markets and Service-oriented Architecture -- Generic Reputation Ontology -- Discussion -- Conclusion and Future Wrok -- References -- Enhancing Data Privacy in the Cloud -- Introduction -- Related Work -- Definition -- Problem Description -- Basic Scheme Definition -- Blind Extraction Definition
Summary This book constitutes the refereed proceedings of the 5th IFIP WG 11.11 International Conference, IFIPTM 2011, held in Copenhagen, Denmark, in June/July 2011. The 14 revised full papers and 8 short papers presented together with the abstracts of 4 keynote talks were carefully reviewed and selected from 42 submissions. The papers feature both theoretical research and real-world case studies from academia, business and government focusing on areas such as: trust models, social and behavioral aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems, and identity management
Analysis informatiesystemen
information systems
computers
samenleving
society
internet
computerwetenschappen
computer sciences
computernetwerken
computer networks
gegevensbeheer
data management
man-machine interaction
gebruikersinterfaces
user interfaces
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Bibliography Includes bibliographical references and author index
Notes English
Print version record
In Springer eBooks
Subject Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Computer networks -- Security measures -- Congresses
Informatique.
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Wakeman, Ian.
ISBN 9783642222009
3642222005
9783642221996
3642221998