Description |
1 online resource (xi, 334 pages) |
Series |
IFIP advances in information and communication technology ; 358 |
|
IFIP advances in information and communication technology ; 358.
|
Contents |
Intro -- Title -- Preface -- Organization -- Table of Contents -- Extended Abstracts for Keynote Speakers -- From Access Control to Trust Management, and Back -- A Petition -- Services and Mechanisms -- Access Control -- Trust Management -- Trust and Authorisation -- Weighing Evidence -- Reputation as an Attack Vector -- Occam's Razor -- The Petition -- References -- Familiarity Breeds Con-victims: Why We Need More Effective Trust Signaling -- Introduction -- The Importance of Trust Signaling -- References -- The Evolution of Trust -- Introduction -- References -- Trust and Social Intelligence |
|
Full Papers -- Detecting and Reacting to Changes in Reputation Flows -- Introduction -- Background -- Reputation-Based Trust Management in Pilarcos -- Related Work on Changes and Uncertainty in Reputation Flows -- Tracking Changes with Reputation Epochs -- Detecting Changes in Service Performance -- Comparison of Epoch Detection Policies -- Conclusion -- References -- Validation and Verification of Agent Models for Trust: Independent Compared to Relative Trust -- Introduction -- Agent Models for Trust -- Independent Trust Model -- Relative Trust Model -- Method -- Participants -- Task |
|
Data Collection -- Parameter Adaptation -- Validation -- Verification -- Results -- Validation Results -- Verification Results -- Discussion and Conclusions -- References -- Composing Trust Models towards Interoperable Trust Management -- Introduction -- Trust Model Definition -- Trust Relations -- Trust Assessment -- Trust Meta-model -- Trust Meta-model Formalization -- Example -- Composing Trust Models -- Role Mapping -- Relation Mediation -- Operation Mediation -- Conclusion -- References -- Identifying Knots of Trust in Virtual Communities -- Introduction -- Related Work |
|
Applying Clustering for Identifying Knots -- Correlation Clustering -- Clustering Criteria -- Different Weight Functions -- The Knot Clustering Algorithm -- Clustering Evaluation -- Evaluation Results -- Conclusions and Future Work -- References -- Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information -- Introduction -- Related Work -- Motivation -- Clustering Algorithms -- Experimental Setting -- Test Schemes -- Dataset -- Evaluation Metrics -- Test Results -- Concluding Remarks -- References -- From Reputation Models and Systems to Reputation Ontologies |
|
Introduction -- Reputation Models, Frameworks, and Systems -- Why Ontologies -- Ontology Standards -- Ontology Requirements -- A Literature of Defining Reputation Concepts -- Existing Approaches to Reputation Ontologies -- For Multi Agents Systems -- For Web Services -- For e-Markets and Service-oriented Architecture -- Generic Reputation Ontology -- Discussion -- Conclusion and Future Wrok -- References -- Enhancing Data Privacy in the Cloud -- Introduction -- Related Work -- Definition -- Problem Description -- Basic Scheme Definition -- Blind Extraction Definition |
Summary |
This book constitutes the refereed proceedings of the 5th IFIP WG 11.11 International Conference, IFIPTM 2011, held in Copenhagen, Denmark, in June/July 2011. The 14 revised full papers and 8 short papers presented together with the abstracts of 4 keynote talks were carefully reviewed and selected from 42 submissions. The papers feature both theoretical research and real-world case studies from academia, business and government focusing on areas such as: trust models, social and behavioral aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems, and identity management |
Analysis |
informatiesystemen |
|
information systems |
|
computers |
|
samenleving |
|
society |
|
internet |
|
computerwetenschappen |
|
computer sciences |
|
computernetwerken |
|
computer networks |
|
gegevensbeheer |
|
data management |
|
man-machine interaction |
|
gebruikersinterfaces |
|
user interfaces |
|
Information and Communication Technology (General) |
|
Informatie- en communicatietechnologie (algemeen) |
Bibliography |
Includes bibliographical references and author index |
Notes |
English |
|
Print version record |
In |
Springer eBooks |
Subject |
Computer security -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Informatique.
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Wakeman, Ian.
|
ISBN |
9783642222009 |
|
3642222005 |
|
9783642221996 |
|
3642221998 |
|