Buch, Englisch, Band 263, 372 Seiten, Previously published in hardcover, Format (B × H): 156 mm x 234 mm, Gewicht: 540 g
Reihe: IFIP Advances in Information and Communication Technology
Proceedings of Ifiptm 2008: Joint Itrust and Pst Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway
Buch, Englisch, Band 263, 372 Seiten, Previously published in hardcover, Format (B × H): 156 mm x 234 mm, Gewicht: 540 g
Reihe: IFIP Advances in Information and Communication Technology
ISBN: 978-1-4419-3477-2
Verlag: Springer Us
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Informatik
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Rechtliche Aspekte der EDV
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Rechtswissenschaften Wirtschaftsrecht Medienrecht Telekommunikationsrecht, IT-Recht, Internetrecht
Weitere Infos & Material
Full Papers.- Trust Management in P2P Systems Using Standard TuLiP.- A Trust Evaluation Method Based on Logic and Probability Theory.- A UML-based Method for the Development of Policies to Support Trust Management.- Analyzing the Robustness of CertainTrust.- An Intensional Functional Model of Trust.- A Translation Mechanism for Recommendations.- Modeling Trust for Recommender Systems using Similarity Metrics.- Trust-Based Collaborative Filtering.- SOFIA: Social Filtering for Robust Recommendations.- Continuous Ratings in Discrete Bayesian Reputation Systems.- A Robust and Knot-Aware Trust-Based Reputation Model.- The North Laine Shopping Guide: A Case Study in Modelling Trust in Applications.- Cooperation in Growing Communities.- A Model for Reasoning About the Privacy Impact of Composite Service Execution in Pervasive Computing.- Protecting Location Privacy through Semantics-aware Obfuscation Techniques.- Privacy2.0: Towards Collaborative Data-Privacy Protection.- Automatic Verification of Privacy Properties in the Applied pi Calculus.- Place and Time Authentication of Cultural Assets.- A Lightweight Binary Authentication System for Windows.- Towards Standards-Compliant Trust Negotiation for Web Services.- Assigning Responsibility for Failed Obligations.- Role- and Relationship-Based Identity Management for Private yet Accountable E-Learning.- Demonstration Overviews.- Using Rummble as a Personalised Travel Guide.- An Inline Monitoring System for.NET Mobile Devices.- STORE Stochastic Reputation Service for Virtual Organisations.