Narrow your search
Listing 1 - 3 of 3
Sort by

Periodical
Journal of trust management
Author:
ISSN: 2196064X Year: 2014


Book
Trust management III : third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009 : proceedings
Authors: --- ---
ISBN: 3642020550 3642020569 Year: 2009 Publisher: Germany : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, IFIPTM 2009, held in West Lafayette, IN, USA, in June 2009. The 17 revised full papers presented together with one invited paper and 5 demo descriptions were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on social aspects and usability, trust reasoning and processing, data security, enhancements to subjective logic, information sharing, risk assessment, and simulation of trust and reputation systems.

Keywords

Computer systems -- Reliability -- Congresses. --- Trust -- Management -- Congresses. --- Computer systems --- Trust --- Computers --- Computer security --- Electronic commerce --- Computer Science --- Engineering & Applied Sciences --- Reliability --- Access control --- Security measures --- Management --- Trust (Psychology) --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer science. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Coding theory. --- Application software. --- E-commerce. --- Computer Science. --- Computer Applications. --- Coding and Information Theory. --- Data Encryption. --- Systems and Data Security. --- Data Structures, Cryptology and Information Theory. --- e-Commerce/e-business. --- Commerce --- Information superhighway --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Attitude (Psychology) --- Emotions --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Information theory. --- Communication theory --- Communication --- Cybernetics


Book
Trust management IV : 4th IFIP WG 11.11 international conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010. proceedings
Authors: --- --- ---
ISBN: 3642134459 9786613564832 1280386916 3642134467 Year: 2010 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided a truly global platform for the reporting of research, development, policy, and practice in the interdependent arrears of privacy, se- rity, and trust. Building on the traditions inherited from the highly succe- ful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, the IFIPTM 2008 conference in Trondheim, Norway, and the IFIPTM 2009 conference at Purdue University in Indiana, USA, IFIPTM 2010 focused on trust, privacy and security from multidisciplinary persp- tives. The conference is an arena for discussion on relevant problems from both research and practice in the areas of academia, business, and government. IFIPTM 2010 was an open IFIP conference. The program of the conference featured both theoretical research papers and reports of real-world case studies. IFIPTM 2010 received 61 submissions from 25 di?erent countries: Japan (10), UK (6), USA (6), Canada (5), Germany (5), China (3), Denmark (2), India (2), Italy (2), Luxembourg (2), The Netherlands (2), Switzerland (2), Taiwan (2), Austria, Estonia, Finland, France, Ireland, Israel, Korea,Malaysia, Norway, Singapore, Spain, Turkey. The Program Committee selected 18 full papers for presentation and inclusion in the proceedings. In addition, the program and the proceedings include two invited papers by academic experts in the ?elds of trust management, privacy and security, namely, Toshio Yamagishi and Pamela Briggs.

Keywords

Electrical & Computer Engineering --- Law - U.S. --- Engineering & Applied Sciences --- Law, Politics & Government --- Public Finance Laws - U.S. --- Telecommunications --- Information Technology --- Computer Science (Hardware & Networks) --- Estates (Law) --- Trusts and trustees --- Boards of trustees --- Fiduciaries --- Trust funds --- Trustees --- Limitations (Law) --- Law and legislation --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer engineering. --- Computer Science. --- Computer Communication Networks. --- Data Encryption. --- Computer Engineering. --- Management of Computing and Information Systems. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Contracts --- Equity --- Estate planning --- Executors and administrators --- Fiducia --- Inheritance and succession --- Powers (Law) --- Structured settlements --- Trust companies --- Uses (Law) --- Probate law and practice --- Real property --- Information Systems. --- Cryptology. --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Civilization and computers --- Civilization --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Design and construction --- Distributed processing --- Computer networks. --- Cryptography. --- Computer Engineering and Networks. --- IT Operations. --- Computer and Information Systems Applications. --- Management. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)

Listing 1 - 3 of 3
Sort by