000 04435nam a22005295i 4500
001 vtls000559840
003 RU-ToGU
005 20210922090152.0
007 cr nn 008mamaa
008 170212s2015 gw | s |||| 0|eng d
020 _a9783319184913
_9978-3-319-18491-3
024 7 _a10.1007/978-3-319-18491-3
_2doi
035 _ato000559840
040 _aSpringer
_cSpringer
_dRU-ToGU
050 4 _aQA76.9.C66
072 7 _aUBJ
_2bicssc
072 7 _aCOM079000
_2bisacsh
082 0 4 _a004
_223
245 1 0 _aTrust Management IX
_helectronic resource
_b9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings /
_cedited by Christian Damsgaard Jensen, Stephen Marsh, Theo Dimitrakos, Yuko Murayama.
260 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2015.
300 _aXII, 277 p. 53 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aIFIP Advances in Information and Communication Technology,
_x1868-4238 ;
_v454
505 0 _aReputation - from Social Perception to Internet Security -- Mathematical Modelling of Trust Issues in Federated Identity Management -- Simple and Practical Integrity Models for Binaries and Files -- Enabling NAME-Based Security and Trust -- Trust Driven Strategies for Privacy by Design -- Lightweight Practical Private One-Way Anonymous Messaging -- Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings -- Obscuring Provenance Confidential Information via Graph Transformation -- Social Network Culture Needs the Lens of Critical Trust Research -- Predicting Quality of Crowd sourced Annotations Using Graph Kernels -- An Architecture for Trustworthy Open Data Services -- 1,2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space -- Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation -- The Detail of Trusted Messages: Retweets in a Context of Health and Fitness -- Reusable Defense Components for Online Reputation Systems -- Continuous Context-Aware Device Comfort Evaluation Method -- Special Session: Toward Trusted Cloud Ecosystems -- Foreword: Towards Trusted Cloud Ecosystems -- A Cloud Orchestrator for Deploying Public Services on the Cloud – The Case of STRATEGIC Project -- Integrating Security Services in Cloud Service Stores -- Building an Eco-System of Trusted Services via User Control and Transparency on Personal Data -- Security-as-a-Service in Multi-cloud and Federated Cloud Environments -- The Role of SLAs in Building a Trusted Cloud for Europe.
520 _aThis book constitutes the refereed proceedings of the 9th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2015, held in Hamburg, Germany, in May 2015. The 10 revised full papers and 5 short papers presented were carefully reviewed and selected from 28 submissions. In addition, the book contains one invited paper and 5 papers from a special session on trusted cloud ecosystems. The papers cover a wide range of topics including trust and reputation and models thereof, the relationship between trust and security, socio-technical aspects of trust, reputation and privacy, trust in the cloud and behavioural models of trust.
650 0 _aComputer Science.
_9155490
650 0 _aComputer security.
_9348012
650 0 _acomputers.
_9460101
650 0 _aComputers and civilization.
_9460797
650 1 4 _aComputer Science.
_9155490
650 2 4 _aComputers and Society.
_9303251
650 2 4 _aSystems and Data Security.
_9303939
650 2 4 _aInformation Systems and Communication Service.
_9304271
700 1 _aDamsgaard Jensen, Christian.
_eeditor.
_9467222
700 1 _aMarsh, Stephen.
_eeditor.
_9310310
700 1 _aDimitrakos, Theo.
_eeditor.
_9308341
700 1 _aMurayama, Yuko.
_eeditor.
_9326772
710 2 _aSpringerLink (Online service)
_9143950
773 0 _tSpringer eBooks
830 0 _aIFIP Advances in Information and Communication Technology,
_9414751
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-18491-3
912 _aZDB-2-SCS
999 _c415013