Trust Management IX: 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings

Author:   Christian Damsgaard Jensen ,  Stephen Marsh ,  Theo Dimitrakos ,  Yuko Murayama
Publisher:   Springer International Publishing AG
Edition:   2015 ed.
Volume:   454
ISBN:  

9783319184906


Pages:   277
Publication Date:   19 May 2015
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $177.95 Quantity:  
Add to Cart

Share |

Trust Management IX: 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the 9th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2015, held in Hamburg, Germany, in May 2015. The 10 revised full papers and 5 short papers presented were carefully reviewed and selected from 28 submissions. In addition, the book contains one invited paper and 5 papers from a special session on trusted cloud ecosystems. The papers cover a wide range of topics including trust and reputation and models thereof, the relationship between trust and security, socio-technical aspects of trust, reputation and privacy, trust in the cloud and behavioural models of trust.

Full Product Details

Author:   Christian Damsgaard Jensen ,  Stephen Marsh ,  Theo Dimitrakos ,  Yuko Murayama
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   2015 ed.
Volume:   454
Dimensions:   Width: 15.50cm , Height: 1.80cm , Length: 23.50cm
Weight:   0.606kg
ISBN:  

9783319184906


ISBN 10:   3319184903
Pages:   277
Publication Date:   19 May 2015
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Reputation - from Social Perception to Internet Security.- Mathematical Modelling of Trust Issues in Federated Identity Management.- Simple and Practical Integrity Models for Binaries and Files.- Enabling NAME-Based Security and Trust.- Trust Driven Strategies for Privacy by Design.- Lightweight Practical Private One-Way Anonymous Messaging.- Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings.- Obscuring Provenance Confidential Information via Graph Transformation.- Social Network Culture Needs the Lens of Critical Trust Research.- Predicting Quality of Crowd sourced Annotations Using Graph Kernels.- An Architecture for Trustworthy Open Data Services.- 1,2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space.- Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation.- The Detail of Trusted Messages: Retweets in a Context of Health and Fitness.- Reusable Defense Components for Online Reputation Systems.- Continuous Context-Aware Device Comfort Evaluation Method.- Special Session: Toward Trusted Cloud Ecosystems.- Foreword: Towards Trusted Cloud Ecosystems.- A Cloud Orchestrator for Deploying Public Services on the Cloud – The Case of STRATEGIC Project.- Integrating Security Services in Cloud Service Stores.- Building an Eco-System of Trusted Services via User Control and Transparency on Personal Data.- Security-as-a-Service in Multi-cloud and Federated Cloud Environments.- The Role of SLAs in Building a Trusted Cloud for Europe.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List