Trust Management III

Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009. Proceedings

Editors:

ISBN: 978-3-642-02055-1 (Print) 978-3-642-02056-8 (Online)
Download Book (17,456 KB) As a courtesy to our readers the eBook is provided DRM-free. However, please note that Springer uses effective methods and state-of-the art technology to detect, stop, and prosecute illegal sharing to safeguard our authors’ interests.

Table of contents (23 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Social Aspects and Usability

    1. Book Chapter

      Pages 1-14

      Spiral of Hatred: Social Effects in Buyer-Seller Cross-Comments Left on Internet Auctions

    2. Book Chapter

      Pages 15-29

      Graphical Passwords as Browser Extension: Implementation and Usability Study

  3. Trust Reasoning and Processing

    1. Book Chapter

      Pages 30-46

      Trust-Enhanced Recommender Systems for Efficient On-Line Collaboration

    2. Book Chapter

      Pages 47-64

      Towards Understanding the Requirements and Limitations of Reputation-Based Systems

    3. Book Chapter

      Pages 65-80

      Elimination of Subjectivity from Trust Recommendation

  4. Data Security

    1. Book Chapter

      Pages 81-98

      Security in Wiki-Style Authoring Systems

    2. Book Chapter

      Pages 99-116

      On Usage Control in Data Grids

    3. Book Chapter

      Pages 117-132

      Detection and Prevention of Insider Threats in Database Driven Web Services

  5. Enhancements to Subjective Logic

    1. Book Chapter

      Pages 133-148

      Inferring Trust Based on Similarity with TILLIT

    2. Book Chapter

      Pages 149-163

      Analogical Trust Reasoning

  6. Information Sharing

    1. Book Chapter

      Pages 164-175

      TIUPAM: A Framework for Trustworthiness-Centric Information Sharing

    2. Book Chapter

      Pages 176-195

      TrustBuilder2: A Reconfigurable Framework for Trust Negotiation

    3. Book Chapter

      Pages 196-214

      A Relational Wrapper for RDF Reification

  7. Risk Assessment

    1. Book Chapter

      Pages 215-233

      Employing Key Indicators to Provide a Dynamic Risk Picture with a Notion of Confidence

    2. Book Chapter

      Pages 234-251

      A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy

  8. Simulation of Trust and Reputation Systems

    1. Book Chapter

      Pages 252-266

      An Experimental Testbed for Evaluation of Trust and Reputation Systems

    2. Book Chapter

      Pages 267-282

      Evaluating the STORE Reputation System in Multi-Agent Simulations

    3. Book Chapter

      Pages 283-297

      Comparison of the Beta and the Hidden Markov Models of Trust in Dynamic Environments

  9. Demonstration Abstracts

    1. Book Chapter

      Pages 298-301

      WRS: The Wikipedia Recommender System

    2. Book Chapter

      Pages 302-305

      Distributed Systems Security Governance, a SOA Based Approach

previous Page of 2