Description |
1 online resource (xiv, 280 pages) |
Series |
IFIP advances in information and communication technology, 1868-4238 ; 374 |
|
IFIP advances in information and communication technology ; 374.
|
Contents |
Co-evolving Trust Mechanisms for Catering User Behavior / Tanja Ažderska -- Perturbation Based Privacy Preserving Slope One Predictors for Collaborative Filtering / Anirban Basu, Jaideep Vaidya and Hiroaki Kikuchi -- Robustness of Trust Models and Combinations for Handling Unfair Ratings / Lizi Zhang, Siwei Jiang, Jie Zhang and Wee Keong Ng -- A Provenance-Based Trust Model for Delay Tolerant Networks / Jin-Hee Cho, MoonJeong Chang, Ing-Ray Chen and Ananthram Swami -- Trust Transitivity and Conditional Belief Reasoning / Audun Jøsang, Tanja Ažderska and Stephen Marsh -- Incorporating Honeypot for Intrusion Detection in Cloud Infrastructure / Bhavesh Borisaniya, Avi Patel, Dhiren R. Patel and Hiren Patel -- Trust Model for Optimized Cloud Services / P.S. Pawar, M. Rajarajan, S. Krishnan Nair and A. Zisman -- Post-Session Authentication / Naveed Ahmed and Christian Damsgaard Jensen |
|
An Efficient Approach for Privacy Preserving Distributed K-Means Clustering Based on Shamir's Secret Sharing Scheme / Sankita Patel, Sweta Garasia and Devesh Jinwala -- From Subjective Reputation to Verifiable Experiences -- Augmenting Peer-Control Mechanisms for Open Service Ecosystems / Sini Ruohomaa, Puneet Kaur and Lea Kutvonen -- Integrating Indicators of Trustworthiness into Reputation-Based Trust Models / Insurance, Certification, and Coalitions / Sascha Hauke, Florian Volk, Sheikh Mahbub Habib and Max Mühlhäuser -- Finding Trusted Publish/Subscribe Trees / Stephen Naicken, Ian Wakeman and Dan Chalmers -- Rendering unto Cæsar the Things That Are Cæsar's: Complex Trust Models and Human Understanding / Stephen Marsh, Anirban Basu and Natasha Dwyer -- Trust Management Framework for Attenuation of Application Layer DDoS Attack in Cloud Computing / Dipen Contractor and Dhiren R. Patel -- An Incentive Mechanism to Promote Honesty in E-marketplaces with Limited Inventory / Yuan Liu, Jie Zhang and Qin Li |
|
How Events Affect Trust: A Baseline Information Processing Model with Three Extensions / D. Harrison McKnight, Peng Liu and Brian T. Pentland -- Improvements over Extended LMAP+: RFID Authentication Protocol / Jitendra B. Gurubani, Harsh Thakkar and Dhiren R. Patel -- Automated Evaluation of Annotators for Museum Collections Using Subjective Logic / Davide Ceolin, Archana Nottamkandath and Wan Fokkink -- A New Data Integrity Checking Protocol with Public Verifiability in Cloud Storage / Mihir R. Gohel and Bhavesh N. Gohil -- Document and Author Promotion Strategies in the Secure Wiki Model / Kasper Lindberg and Christian Damsgaard Jensen -- Robustness of Trust and Reputation Systems: Does It Matter? / Audun Jøsang -- transCryptFS: A Trusted and Secure File System / Rajat Moona -- Operational Challenges in Deploying Trust Management Systems -- A Practical Perspective / Sundeep Oberoi -- A Perspective on the Evolution of the International Trust Management Research Community in the Last Decade / Theo Dimitrakos |
Summary |
This book constitutes the refereed proceedings of the 6th IFIP WG 11.11 International Conference, IFIPTM 2012, held in Surat, India, in May 2012. The 12 revised full papers presented together with 8 short papers and the abstracts of 4 keynote talks were carefully reviewed and selected from 51 submissions. Building on the traditions inherited from the iTrust and previous IFIPTM conferences, IFIPTM 2012 is a multi-disciplinary conference focusing on areas such as: trust models, social, economic and behavioural aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems, and identity management |
Analysis |
Computer science |
|
Computer Communication Networks |
|
Data encryption (Computer science) |
|
Information Systems |
|
Management of Computing and Information Systems |
|
Computers and Society |
|
Information Systems Applications (incl. Internet) |
|
User Interfaces and Human Computer Interaction |
Bibliography |
Includes bibliographical references and author index |
Notes |
English |
In |
Springer eBooks |
Subject |
Computer security -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Electronic Data Processing
|
|
data processing.
|
|
computer science.
|
|
Informatique.
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Dimitrakos, Theo.
|
ISBN |
9783642298523 |
|
3642298524 |
|
3642298516 |
|
9783642298516 |
|