Description |
1 online resource (x, 229 pages) : illustrations |
Series |
IFIP advances in information and communication technology, 1868-4238 ; 505 |
|
IFIP advances in information and communication technology ; 505. 1868-4238
|
Contents |
Intro -- Preface -- Organization -- Contents -- Information Sharing and Personal Data -- Partial Commitment -- "Try Before You Buy" and "Buyer's Remorse" for Personal Data in Big Data & Machine Learning -- Abstract -- 1 Introduction -- 1.1 Background -- 1.2 Challenges -- 2 Partial Commitment as a Concept: The MAYBE Button -- 2.1 Data Subjects' Perspective -- 2.2 Service Providers' Perspective -- 3 Research Opportunities -- 4 Conclusion -- References -- VIGraph -- A Framework for Verifiable Information -- 1 Introduction -- 2 VIGraph: Signed Hash Tree with Optional Dependency Overlay |
|
2.1 Levels and Dependencies -- 2.2 Storage of the VIGraph -- 2.3 Data Operations on the VIGraph -- 2.4 Data Verification -- 3 Discussion and the State-of-the-art -- 4 Conclusion and Future Work -- References -- A Flexible Privacy-Preserving Framework for Singular Value Decomposition Under Internet of Things Environment -- 1 Introduction -- 2 Preliminaries -- 2.1 Paillier Cryptosystem -- 2.2 Singular Value Decomposition -- 3 System Model, Security Requirements and Design Goals -- 3.1 System Model -- 3.2 Security Requirements -- 3.3 Design Goals -- 4 The Proposed Framework |
|
4.1 System Initialization -- 4.2 Data Collection -- 4.3 Data Randomization -- 4.4 Pre-computation -- 4.5 Eigenvalue Decomposition -- 5 Security Analysis -- 5.1 Privacy Leakage Under Normal Operations -- 5.2 Potential Attacks -- 6 Performance Evaluation -- 6.1 Capacity -- 6.2 Efficiency -- 7 Applications -- 7.1 Localized Recommendation System -- 8 Related Works -- 9 Conclusions -- References -- Novel Sources of Trust and Trust Information -- The Game of Trust: Using Behavioral Experiment as a Tool to Assess and Collect Trust-Related Data -- 1 Introduction -- 2 The Game of Trust: Initial Concept |
|
2.1 Game Dynamics -- 2.2 Trust Assessment -- 3 Future Work: Digital Game -- References -- Social Network Analysis for Trust Prediction -- 1 Introduction -- 2 Related Work -- 3 Approach -- 3.1 User Features -- 3.2 Trust Measures -- 3.3 Reasoning Algorithms -- 4 Evaluation -- 4.1 Dataset Description -- 4.2 Network Centrality Features -- 4.3 Trust in the Platform -- 4.4 Trust in Other Users -- 5 Discussion -- References -- Investigating Security Capabilities in Service Level Agreements as Trust-Enhancing Instruments -- 1 Introduction -- 2 Research Methodology -- 2.1 Research Participants |
|
2.2 Data Collection: A Three-Round Delphi Study -- 2.3 Data Analysis: Grounded Theory Analysis -- 3 Results and Analysis -- 3.1 Perceived Threats -- 3.2 Government-Specific Security Requirements -- 3.3 Provider-Specific Security Capabilities -- 4 Discussion -- 4.1 Implications -- 4.2 Limitations -- 4.3 Reflection with Related Work -- 5 Conclusion -- References -- Applications of Trust -- Managing Software Uninstall with Negative Trust -- 1 Introduction -- 2 Related Work -- 3 (un)SecureND -- 3.1 Repositories, Packages and Dependencies -- 3.2 Rules for Package Execution -- 3.3 Access Rules |
Summary |
This book constitutes the refereed proceedings of the 11th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2017, held in Gothenburg, Sweden, in June 2017. The 8 revised full papers and 6 short papers presented were carefully reviewed and selected from 29 submissions. The papers are organized in the following topical sections: information sharing and personal data; novel sources of trust and trust information; applications of trust; trust metrics; and reputation systems. Also included is the 2017 William Winsborough commemorative address and three short IFIPTM 2017 graduate symposium presentations |
Notes |
International conference proceedings |
|
Includes author index |
|
Online resource; title from PDF title page (SpringerLink, viewed June 9, 2017) |
Subject |
Computer security -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Computer security.
|
|
Information retrieval.
|
|
Business applications.
|
|
Software Engineering.
|
|
Ethical & social aspects of IT.
|
|
Computers -- Security -- General.
|
|
Computers -- System Administration -- Storage & Retrieval.
|
|
Computers -- Electronic Commerce.
|
|
Computers -- Software Development & Engineering -- General.
|
|
Computers -- Social Aspects -- General.
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Steghöfer, Jan-Philipp, editor
|
|
Esfandiari, Babak, editor
|
ISBN |
9783319591711 |
|
3319591711 |