Buch, Englisch, Band 3986, 476 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1520 g
4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings
Buch, Englisch, Band 3986, 476 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1520 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-34295-3
Verlag: Springer Berlin Heidelberg
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Software Engineering
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Datenkompression, Dokumentaustauschformate
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
Weitere Infos & Material
Invited Talks.- Why We Need a Non-reductionist Approach to Trust.- Full Papers.- Dynamic Trust Federation in Grids.- Being Trusted in a Social Network: Trust as Relational Capital.- A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments.- Normative Structures in Trust Management.- Gathering Experience in Trust-Based Interactions.- Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail.- Generating Predictive Movie Recommendations from Trust in Social Networks.- Temporal Logic-Based Specification and Verification of Trust Models.- Modelling Trade and Trust Across Cultures.- Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation.- Trust-Based Route Selection in Dynamic Source Routing.- Implementing Credential Networks.- Exploring Different Types of Trust Propagation.- PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation.- A Versatile Approach to Combining Trust Values for Making Binary Decisions.- Jiminy: A Scalable Incentive-Based Architecture for Improving Rating Quality.- Virtual Fingerprinting as a Foundation for Reputation in Open Systems.- Towards Automated Evaluation of Trust Constraints.- Provision of Trusted Identity Management Using Trust Credentials.- Acceptance of Voting Technology: Between Confidence and Trust.- B-Trust: Bayesian Trust Framework for Pervasive Computing.- TATA: Towards Anonymous Trusted Authentication.- The Design, Generation, and Utilisation of a Semantically Rich Personalised Model of Trust.- A Trust Assignment Model Based on Alternate Actions Payoff.- Privacy, Reputation, and Trust: Some Implications for Data Protection.- A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks.- Robust Reputationsfor Peer-to-Peer Marketplaces.- From Theory to Practice: Forgiveness as a Mechanism to Repair Conflicts in CMC.- A Novel Protocol for Communicating Reputation in P2P Networks.- A Scalable Probabilistic Approach to Trust Evaluation.- Demonstration Overviews.- The Agent Reputation and Trust (ART) Testbed.- Trust Establishment in Emergency Case.- Evaluating Trust and Authenticity with Caution.- Using Jiminy for Run-Time User Classification Based on Rating Behaviour.- Traust: A Trust Negotiation Based Authorization Service.- The Interactive Cooperation Tournament.- eTVRA, a Threat, Vulnerability and Risk Assessment Tool for eEurope.