Listing 1 - 3 of 3 |
Sort by
|
Choose an application
"Journal of Trust Management encompasses all aspects of computational trust and trust management seen from technical, social, psychological, legal, economical and cultural perspectives."
Computer systems --- Computer security --- Trust --- Systèmes informatiques --- Sécurité informatique --- Confiance --- Reliability --- Periodicals --- Periodicals. --- Fiabilité --- Périodiques --- Computer security. --- Trust. --- Reliability. --- Trust (Psychology) --- Computer privacy --- Computer system security --- Computers --- Electronic digital computers --- Security of computer systems --- ADP systems (Computer systems) --- Computing systems --- Security measures --- Systems, Computer --- Computer Science --- Systems and Data Security --- Software Engineering/Programming and Operating Systems --- Coding and Information Theory --- Data Structures; Cryptology and Information Theory --- Attitude (Psychology) --- Emotions --- Data protection --- Security systems --- Hacking --- Electronic systems --- Cyberinfrastructure --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection
Choose an application
This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, IFIPTM 2009, held in West Lafayette, IN, USA, in June 2009. The 17 revised full papers presented together with one invited paper and 5 demo descriptions were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on social aspects and usability, trust reasoning and processing, data security, enhancements to subjective logic, information sharing, risk assessment, and simulation of trust and reputation systems.
Computer systems -- Reliability -- Congresses. --- Trust -- Management -- Congresses. --- Computer systems --- Trust --- Computers --- Computer security --- Electronic commerce --- Computer Science --- Engineering & Applied Sciences --- Reliability --- Access control --- Security measures --- Management --- Trust (Psychology) --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer science. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Coding theory. --- Application software. --- E-commerce. --- Computer Science. --- Computer Applications. --- Coding and Information Theory. --- Data Encryption. --- Systems and Data Security. --- Data Structures, Cryptology and Information Theory. --- e-Commerce/e-business. --- Commerce --- Information superhighway --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Attitude (Psychology) --- Emotions --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Information theory. --- Communication theory --- Communication --- Cybernetics
Choose an application
This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided a truly global platform for the reporting of research, development, policy, and practice in the interdependent arrears of privacy, se- rity, and trust. Building on the traditions inherited from the highly succe- ful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, the IFIPTM 2008 conference in Trondheim, Norway, and the IFIPTM 2009 conference at Purdue University in Indiana, USA, IFIPTM 2010 focused on trust, privacy and security from multidisciplinary persp- tives. The conference is an arena for discussion on relevant problems from both research and practice in the areas of academia, business, and government. IFIPTM 2010 was an open IFIP conference. The program of the conference featured both theoretical research papers and reports of real-world case studies. IFIPTM 2010 received 61 submissions from 25 di?erent countries: Japan (10), UK (6), USA (6), Canada (5), Germany (5), China (3), Denmark (2), India (2), Italy (2), Luxembourg (2), The Netherlands (2), Switzerland (2), Taiwan (2), Austria, Estonia, Finland, France, Ireland, Israel, Korea,Malaysia, Norway, Singapore, Spain, Turkey. The Program Committee selected 18 full papers for presentation and inclusion in the proceedings. In addition, the program and the proceedings include two invited papers by academic experts in the ?elds of trust management, privacy and security, namely, Toshio Yamagishi and Pamela Briggs.
Electrical & Computer Engineering --- Law - U.S. --- Engineering & Applied Sciences --- Law, Politics & Government --- Public Finance Laws - U.S. --- Telecommunications --- Information Technology --- Computer Science (Hardware & Networks) --- Estates (Law) --- Trusts and trustees --- Boards of trustees --- Fiduciaries --- Trust funds --- Trustees --- Limitations (Law) --- Law and legislation --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer engineering. --- Computer Science. --- Computer Communication Networks. --- Data Encryption. --- Computer Engineering. --- Management of Computing and Information Systems. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Contracts --- Equity --- Estate planning --- Executors and administrators --- Fiducia --- Inheritance and succession --- Powers (Law) --- Structured settlements --- Trust companies --- Uses (Law) --- Probate law and practice --- Real property --- Information Systems. --- Cryptology. --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Civilization and computers --- Civilization --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Design and construction --- Distributed processing --- Computer networks. --- Cryptography. --- Computer Engineering and Networks. --- IT Operations. --- Computer and Information Systems Applications. --- Management. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Listing 1 - 3 of 3 |
Sort by
|