Limit search to available items
Book Cover
E-book
Author IFIPTM (Conference) (8th : 2014 : Singapore)

Title Trust Management VIII : 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014. Proceedings / Jianying Zhou, Nurit Gal-Oz, Jie Zhang, Ehud Gudes (eds.)
Published Heidelberg : Springer, 2014

Copies

Description 1 online resource (xii, 247 pages) : illustrations
Series IFIP Advances in Information and Communication Technology, 1868-4238 ; 430
IFIP advances in information and communication technology ; 430. 1868-4238
Contents The Importance of Trust in Computer Security -- Trust MUSE: A Model-Driven Approach for Trust Management -- Reusability for Trust and Reputation Systems -- On Robustness of Trust Systems -- Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks -- Exploiting Trust and Distrust Information to Combat Sybil Attack in Online Social Networks -- Anomaly Detection for Mobile Device Comfort -- Improving the Exchange of Lessons Learned in Security Incident Reports: Case Studies in the Privacy of Electronic Patient Records -- A Privacy Risk Model for Trajectory Data -- Providing Trustworthy Advice Online: An Exploratory Study on the Potential of Discursive Psychology in Trust Research -- Extending Trust Management with Cooperation Incentives: Achieving Collaborative Wi-Fi Sharing Using Trust Transfer to Stimulate Cooperative Behaviours -- A Calculus for Trust and Reputation Systems -- Knots Maintenance for Optimal Management of Trust Relations -- On the Tradeoff among Trust, Privacy, and Cost in Incentive-Based Networks -- Reputation-Based Cooperation in the Clouds -- Introducing Patient and Dentist Profiling and Crowdsourcing to Improve Trust in Dental Care Recommendation Systems -- Abstract Accountability Language -- Trust Assessment Using Cloud Broker
Summary This book constitutes the refereed proceedings of the 8th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2014, held in Singapore, in July 2014. The 12 revised full papers and 5 short papers presented were carefully reviewed and selected from 36 submissions. In addition, the book contains one invited paper. The papers cover a wide range of topics focusing on the following main areas: trust and reputation models; privacy issues and social and behavioral models of trust; the relationship between trust and security; trust under attacks and trust in the cloud environment
Notes International conference proceedings
Includes author index
Online resource; title from PDF title page (SpringerLink, viewed July 8, 2014)
Subject Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Computer networks -- Security measures -- Congresses
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Zhou, Jianying, editor.
Gal-Oz, Nurit, editor
Zhang, Jie, editor
Gudes, Ehud, editor
ISBN 9783662438138
3662438135
3662438127
9783662438121
Other Titles IFIPTM 2014