:
Sandro Etalle, Stephen Marsh
:
Trust Management Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, New Brunswick, Canada
:
Springer-Verlag
:
9780387736556
:
1
:
CHF 121.50
:
:
424
:
DRM
:
PC/MAC/eReader/Tablet
:
PDF
This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Moncton, New Brunswick, Canada from July 29 to August 2, 2007. The annual iTrust international conference looks at trust from multidisciplinary perspectives: economic, legal, psychology, philosophy, sociology as well as information technology. The annual PST conference has quickly established itself as a leader in multidisciplinary research on a wide range of topics related to Privacy, Security and Trust, looked at from research and practice, through academe, business, and government. The two conferences have come together this year to take a more thorough look at all elements of trust management. The highlights of IFIPTM 2007 included invited talks by industrial and academic experts including Larry Korba from NRC-IIT, Brian O'Higgins of 3rd Brigade, Jim Robbins from EWA, Jonathan Cave from RAND, Roger London, and Bruce Cowper from Microsoft Canada.
Preface 6 Organization 8 Table of Contents 10 Private Distributed Scalar Product Protocol With Application To Privacy- Preserving Computation of Trust 13 Trust Transfer in Distributed Systems 29 Trust without Truth 42 Mining and Detecting Connection- Chains in Network Traffic 57 A Privacy- Aware Service Discovery Middleware for Pervasive Environments 68 Analysis of the implicit trust within the OLSR protocol 84 Validating a Trust-based Access Control System 100 Negotiation for Authorisation in Virtual Organisations 116 A Geo Time Authentication System 132 Content Trust Model for Detecting Web Spam 148 Applied Computational Trust in Utilities Management: a Case Study on The Town Council of Cava de' Tirreni. 162 A trust protocol for community collaboration 178 Towards an Understanding of Security, Privacy and Safety in Maritime Self- Reporting Systems 194 Dismantling the Twelve Privacy Purposes 216 A Framework for Privacy-Preserving E-learning 232 Exploiting Trust and Suspicion for Real- time Attack Recognition in Recommender Applications 248 Self- Selection Bias in Reputation Systems 264 Resisting Sybils in Peer- to- peer Markets 278 A Trust Model for an Open, Decentralized Reputation System 294 Control Flow Based Pointcuts for Security Hardening Concerns 310 Design of Trusted Systems with Reusable Collaboration Models 326 MUQAMI: A Locally Distributed Key Management Scheme for Clustered Sensor Networks 342 Trust based Approach for Improving Data Reliability in Industrial Sensor Networks 358 The AI Hardness of CAPTCHAs does not imply Robust Network Security 375 Resilia: a Safe and Secure Distributed Backup System for Small and Medium Enterprises 391 Integrity in Open Collaborative Authoring Systems 407 Service- Oriented Approach to Visualize IT Security Performance Metrics 411 From Early Requirements Analysis towards Secure Workflows 415 Monitors for Usage Control 419 Author Index 423