Trust Management
Editat de Peter Herrmann, Valerie Issarny, Simon Shiuen Limba Engleză Paperback – 12 mai 2005
Preț: 328.34 lei
Preț vechi: 410.42 lei
-20% Nou
Puncte Express: 493
Preț estimativ în valută:
58.10€ • 68.13$ • 51.02£
58.10€ • 68.13$ • 51.02£
Carte tipărită la comandă
Livrare economică 05-19 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540260424
ISBN-10: 3540260420
Pagini: 440
Ilustrații: XII, 428 p.
Dimensiuni: 155 x 235 x 24 mm
Greutate: 0.66 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540260420
Pagini: 440
Ilustrații: XII, 428 p.
Dimensiuni: 155 x 235 x 24 mm
Greutate: 0.66 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Third International Conference on Trust Management.- Foraging for Trust: Exploring Rationality and the Stag Hunt Game.- Trust, Untrust, Distrust and Mistrust – An Exploration of the Dark(er) Side.- Security and Trust in the Italian Legal Digital Signature Framework.- Specifying Legal Risk Scenarios Using the CORAS Threat Modelling Language.- On Deciding to Trust.- Trust Management Survey.- Can We Manage Trust?.- Operational Models for Reputation Servers.- A Representation Model of Trust Relationships with Delegation Extensions.- Affect and Trust.- Reinventing Forgiveness: A Formal Investigation of Moral Facilitation.- Modeling Social and Individual Trust in Requirements Engineering Methodologies.- Towards a Generic Trust Model – Comparison of Various Trust Update Algorithms.- A Probabilistic Trust Model for Handling Inaccurate Reputation Sources.- Trust as a Key to Improving Recommendation Systems.- Alleviating the Sparsity Problem of Collaborative Filtering Using Trust Inferences.- Experience-Based Trust: Enabling Effective Resource Selection in a Grid Environment.- Interactive Credential Negotiation for Stateful Business Processes.- An Evidence Based Architecture for Efficient, Attack-Resistant Computational Trust Dissemination in Peer-to-Peer Networks.- Towards an Evaluation Methodology for Computational Trust Systems.- Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy.- Trust Transfer: Encouraging Self-recommendations Without Sybil Attack.- Privacy-Preserving Search and Updates for Outsourced Tree-Structured Data on Untrusted Servers.- Persistent and Dynamic Trust: Analysis and the Related Impact of Trusted Platforms.- Risk Models for Trust-Based Access Control(TBAC).- Combining Trust and Risk to Reduce the Cost ofAttacks.- IWTrust: Improving User Trust in Answers from the Web.- Trust Record: High-Level Assurance and Compliance.- Implementation of the SECURE Trust Engine.- The CORAS Tool for Security Risk Analysis.- Towards a Grid Platform Enabling Dynamic Virtual Organisations for Business Applications.- Multimedia Copyright Protection Platform Demonstrator.- ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements.- The VoteSecureTM Secure Internet Voting System.