|
![]() |
|||
|
||||
OverviewThis book constitutes the refereed proceedings of the Third International Conference on Trust Management, iTrust 2005, held in Paris, France in May 2005.The 21 revised full papers and 4 revised short papers presented together with 2 keynote papers and 7 trust management tool and systems demonstration reports were carefully reviewed and selected from 71 papers submitted. Besides technical issues in distributed computing and open systems, topics from law, social sciences, business, and psychology are addressed in order to develop a deeper and more comprehensive understanding of current aspects and challenges in the area of trust management in dynamic open systems. Full Product DetailsAuthor: Peter Herrmann , Valerie Issarny , Simon ShiuPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2005 ed. Volume: 3477 Dimensions: Width: 15.50cm , Height: 2.20cm , Length: 23.50cm Weight: 1.370kg ISBN: 9783540260424ISBN 10: 3540260420 Pages: 428 Publication Date: 12 May 2005 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsThird International Conference on Trust Management.- Foraging for Trust: Exploring Rationality and the Stag Hunt Game.- Trust, Untrust, Distrust and Mistrust – An Exploration of the Dark(er) Side.- Security and Trust in the Italian Legal Digital Signature Framework.- Specifying Legal Risk Scenarios Using the CORAS Threat Modelling Language.- On Deciding to Trust.- Trust Management Survey.- Can We Manage Trust?.- Operational Models for Reputation Servers.- A Representation Model of Trust Relationships with Delegation Extensions.- Affect and Trust.- Reinventing Forgiveness: A Formal Investigation of Moral Facilitation.- Modeling Social and Individual Trust in Requirements Engineering Methodologies.- Towards a Generic Trust Model – Comparison of Various Trust Update Algorithms.- A Probabilistic Trust Model for Handling Inaccurate Reputation Sources.- Trust as a Key to Improving Recommendation Systems.- Alleviating the Sparsity Problem of Collaborative Filtering Using Trust Inferences.- Experience-Based Trust: Enabling Effective Resource Selection in a Grid Environment.- Interactive Credential Negotiation for Stateful Business Processes.- An Evidence Based Architecture for Efficient, Attack-Resistant Computational Trust Dissemination in Peer-to-Peer Networks.- Towards an Evaluation Methodology for Computational Trust Systems.- Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy.- Trust Transfer: Encouraging Self-recommendations Without Sybil Attack.- Privacy-Preserving Search and Updates for Outsourced Tree-Structured Data on Untrusted Servers.- Persistent and Dynamic Trust: Analysis and the Related Impact of Trusted Platforms.- Risk Models for Trust-Based Access Control(TBAC).- Combining Trust and Risk to Reduce the Cost ofAttacks.- IWTrust: Improving User Trust in Answers from the Web.- Trust Record: High-Level Assurance and Compliance.- Implementation of the SECURE Trust Engine.- The CORAS Tool for Security Risk Analysis.- Towards a Grid Platform Enabling Dynamic Virtual Organisations for Business Applications.- Multimedia Copyright Protection Platform Demonstrator.- ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements.- The VoteSecureTM Secure Internet Voting System.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |