000 | 03849nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-3-662-43813-8 | ||
003 | DE-He213 | ||
005 | 20200421112549.0 | ||
007 | cr nn 008mamaa | ||
008 | 140623s2014 gw | s |||| 0|eng d | ||
020 |
_a9783662438138 _9978-3-662-43813-8 |
||
024 | 7 |
_a10.1007/978-3-662-43813-8 _2doi |
|
050 | 4 | _aQA76.9.C66 | |
072 | 7 |
_aUBJ _2bicssc |
|
072 | 7 |
_aCOM079000 _2bisacsh |
|
082 | 0 | 4 |
_a004 _223 |
245 | 1 | 0 |
_aTrust Management VIII _h[electronic resource] : _b8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014. Proceedings / _cedited by Jianying Zhou, Nurit Gal-Oz, Jie Zhang, Ehud Gudes. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2014. |
|
300 |
_aXII, 245 p. 65 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aIFIP Advances in Information and Communication Technology, _x1868-4238 ; _v430 |
|
505 | 0 | _aThe Importance of Trust in Computer Security -- Trust MUSE: A Model-Driven Approach for Trust Management -- Reusability for Trust and Reputation Systems -- On Robustness of Trust Systems -- Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks -- Exploiting Trust and Distrust Information to Combat Sybil Attack in Online Social Networks -- Anomaly Detection for Mobile Device Comfort -- Improving the Exchange of Lessons Learned in Security Incident Reports: Case Studies in the Privacy of Electronic Patient Records -- A Privacy Risk Model for Trajectory Data -- Providing Trustworthy Advice Online: An Exploratory Study on the Potential of Discursive Psychology in Trust Research -- Extending Trust Management with Cooperation Incentives: Achieving Collaborative Wi-Fi Sharing Using Trust Transfer to Stimulate Cooperative Behaviours -- A Calculus for Trust and Reputation Systems -- Knots Maintenance for Optimal Management of Trust Relations -- On the Tradeoff among Trust, Privacy, and Cost in Incentive-Based Networks -- Reputation-Based Cooperation in the Clouds -- Introducing Patient and Dentist Profiling and Crowdsourcing to Improve Trust in Dental Care Recommendation Systems -- Abstract Accountability Language -- Trust Assessment Using Cloud Broker. | |
520 | _aThis book constitutes the refereed proceedings of the 8th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2014, held in Singapore, in July 2014. The 12 revised full papers and 5 short papers presented were carefully reviewed and selected from 36 submissions. In addition, the book contains one invited paper. The papers cover a wide range of topics focusing on the following main areas: trust and reputation models; privacy issues and social and behavioral models of trust; the relationship between trust and security; trust under attacks and trust in the cloud environment. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aComputers. | |
650 | 0 | _aComputers and civilization. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aInformation Systems and Communication Service. |
700 | 1 |
_aZhou, Jianying. _eeditor. |
|
700 | 1 |
_aGal-Oz, Nurit. _eeditor. |
|
700 | 1 |
_aZhang, Jie. _eeditor. |
|
700 | 1 |
_aGudes, Ehud. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783662438121 |
830 | 0 |
_aIFIP Advances in Information and Communication Technology, _x1868-4238 ; _v430 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-662-43813-8 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c58756 _d58756 |