: Sandro Etalle, Stephen Marsh
: Trust Management Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, New Brunswick, Canada
: Springer-Verlag
: 9780387736556
: 1
: CHF 121.50
:
: Informatik
: English
: 424
: DRM
: PC/MAC/eReader/Tablet
: PDF
This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Moncton, New Brunswick, Canada from July 29 to August 2, 2007. The annual iTrust international conference looks at trust from multidisciplinary perspectives: economic, legal, psychology, philosophy, sociology as well as information technology. The annual PST conference has quickly established itself as a leader in multidisciplinary research on a wide range of topics related to Privacy, Security and Trust, looked at from research and practice, through academe, business, and government. The two conferences have come together this year to take a more thorough look at all elements of trust management. The highlights of IFIPTM 2007 included invited talks by industrial and academic experts including Larry Korba from NRC-IIT, Brian O'Higgins of 3rd Brigade, Jim Robbins from EWA, Jonathan Cave from RAND, Roger London, and Bruce Cowper from Microsoft Canada.
Preface6
Organization8
Table of Contents10
Private Distributed Scalar Product Protocol With Application To Privacy- Preserving Computation of Trust13
Trust Transfer in Distributed Systems29
Trust without Truth42
Mining and Detecting Connection- Chains in Network Traffic57
A Privacy- Aware Service Discovery Middleware for Pervasive Environments68
Analysis of the implicit trust within the OLSR protocol84
Validating a Trust-based Access Control System100
Negotiation for Authorisation in Virtual Organisations116
A Geo Time Authentication System132
Content Trust Model for Detecting Web Spam148
Applied Computational Trust in Utilities Management: a Case Study on The Town Council of Cava de' Tirreni.162
A trust protocol for community collaboration178
Towards an Understanding of Security, Privacy and Safety in Maritime Self- Reporting Systems194
Dismantling the Twelve Privacy Purposes216
A Framework for Privacy-Preserving E-learning232
Exploiting Trust and Suspicion for Real- time Attack Recognition in Recommender Applications248
Self- Selection Bias in Reputation Systems264
Resisting Sybils in Peer- to- peer Markets278
A Trust Model for an Open, Decentralized Reputation System294
Control Flow Based Pointcuts for Security Hardening Concerns310
Design of Trusted Systems with Reusable Collaboration Models326
MUQAMI: A Locally Distributed Key Management Scheme for Clustered Sensor Networks342
Trust based Approach for Improving Data Reliability in Industrial Sensor Networks358
The AI Hardness of CAPTCHAs does not imply Robust Network Security375
Resilia: a Safe and Secure Distributed Backup System for Small and Medium Enterprises391
Integrity in Open Collaborative Authoring Systems407
Service- Oriented Approach to Visualize IT Security Performance Metrics411
From Early Requirements Analysis towards Secure Workflows 415
Monitors for Usage Control419
Author Index423