000 06440nam a22006135i 4500
001 978-3-540-32040-1
003 DE-He213
005 20240730194925.0
007 cr nn 008mamaa
008 100713s2005 gw | s |||| 0|eng d
020 _a9783540320401
_9978-3-540-32040-1
024 7 _a10.1007/b136639
_2doi
050 4 _aQA76.76.A65
072 7 _aUB
_2bicssc
072 7 _aCOM005000
_2bisacsh
072 7 _aUX
_2thema
082 0 4 _a005.3
_223
245 1 0 _aTrust Management
_h[electronic resource] :
_bThird International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings /
_cedited by Peter Herrmann, Valerie Issarny, Simon Shiu.
250 _a1st ed. 2005.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2005.
300 _aXII, 428 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v3477
505 0 _aThird International Conference on Trust Management -- Foraging for Trust: Exploring Rationality and the Stag Hunt Game -- Trust, Untrust, Distrust and Mistrust - An Exploration of the Dark(er) Side -- Security and Trust in the Italian Legal Digital Signature Framework -- Specifying Legal Risk Scenarios Using the CORAS Threat Modelling Language -- On Deciding to Trust -- Trust Management Survey -- Can We Manage Trust? -- Operational Models for Reputation Servers -- A Representation Model of Trust Relationships with Delegation Extensions -- Affect and Trust -- Reinventing Forgiveness: A Formal Investigation of Moral Facilitation -- Modeling Social and Individual Trust in Requirements Engineering Methodologies -- Towards a Generic Trust Model - Comparison of Various Trust Update Algorithms -- A Probabilistic Trust Model for Handling Inaccurate Reputation Sources -- Trust as a Key to Improving Recommendation Systems -- Alleviating the Sparsity Problem of Collaborative Filtering Using Trust Inferences -- Experience-Based Trust: Enabling Effective Resource Selection in a Grid Environment -- Interactive Credential Negotiation for Stateful Business Processes -- An Evidence Based Architecture for Efficient, Attack-Resistant Computational Trust Dissemination in Peer-to-Peer Networks -- Towards an Evaluation Methodology for Computational Trust Systems -- Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy -- Trust Transfer: Encouraging Self-recommendations Without Sybil Attack -- Privacy-Preserving Search and Updates for Outsourced Tree-Structured Data on Untrusted Servers -- Persistent and Dynamic Trust: Analysis and the Related Impact of Trusted Platforms -- Risk Models for Trust-Based Access Control(TBAC) -- Combining Trust and Risk to Reduce the Cost ofAttacks -- IWTrust: Improving User Trust in Answers from the Web -- Trust Record: High-Level Assurance and Compliance -- Implementation of the SECURE Trust Engine -- The CORAS Tool for Security Risk Analysis -- Towards a Grid Platform Enabling Dynamic Virtual Organisations for Business Applications -- Multimedia Copyright Protection Platform Demonstrator -- ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements -- The VoteSecureTM Secure Internet Voting System.
520 _aThis volume constitutes the proceedings of the 3rd International Conference on Trust Management, held in Paris, France, during 23-26 May 2005. The conf- ence follows successful International Conferences in Crete in 2003 and Oxford in 2004. All conferences were organized by iTrust, which is a working group funded as a thematic network by the Future and Emerging Technologies (FET) unit of the Information Society Technologies (IST) program of the European Union. The purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of trust as a means of increasing security, building con?dence and facilitating collaboration in dynamic open s- tems. The notion of trust has been studied independently by di?erent academic disciplines, which has helped us to identify and understand di?erent aspects of trust. Theaimofthisconferencewastoprovideacommonforum,bringingtogether researchers from di?erent academic branches, such as the technology-oriented disciplines, law, social sciences and philosophy, in order to develop a deeper and more fundamental understanding of the issues and challenges in the area of trust management in dynamic open systems. The response to this conference was excellent; from the 71 papers submitted to the conference, we selected 21 full papers and 4 short papers for presentation. The program also included two keynote addresses, given by Steve Marsh from National Research Centre Canada, Institute for Information Technology, and Steve Kimbrough from the University of Pennsylvania; an industrial panel; 7 technology demonstrations; and a full day of tutorials.
650 0 _aApplication software.
_9158523
650 0 _aInformation storage and retrieval systems.
_922213
650 0 _aComputer networks .
_931572
650 0 _aComputers and civilization.
_921733
650 0 _aElectronic data processing
_xManagement.
_9158524
650 1 4 _aComputer and Information Systems Applications.
_9158525
650 2 4 _aInformation Storage and Retrieval.
_923927
650 2 4 _aComputer Communication Networks.
_9158526
650 2 4 _aComputers and Society.
_931668
650 2 4 _aIT Operations.
_931703
700 1 _aHerrmann, Peter.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9158527
700 1 _aIssarny, Valerie.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9158528
700 1 _aShiu, Simon.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9158529
710 2 _aSpringerLink (Online service)
_9158530
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540260424
776 0 8 _iPrinted edition:
_z9783540811046
830 0 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v3477
_9158531
856 4 0 _uhttps://doi.org/10.1007/b136639
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c95391
_d95391