Trust Management II Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications...

Full description

Bibliographic Details
Other Authors: Karabulut, Yücel (Editor), Mitchell, John C. (Editor), Herrmann, Peter (Editor), Damsgaard Jensen, Christian (Editor)
Format: eBook
Language:English
Published: New York, NY Springer US 2008, 2008
Edition:1st ed. 2008
Series:IFIP Advances in Information and Communication Technology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Full Papers
  • Trust Management in P2P Systems Using Standard TuLiP
  • A Trust Evaluation Method Based on Logic and Probability Theory
  • A UML-based Method for the Development of Policies to Support Trust Management
  • Analyzing the Robustness of CertainTrust
  • An Intensional Functional Model of Trust
  • A Translation Mechanism for Recommendations
  • Modeling Trust for Recommender Systems using Similarity Metrics
  • Trust-Based Collaborative Filtering
  • SOFIA: Social Filtering for Robust Recommendations
  • Continuous Ratings in Discrete Bayesian Reputation Systems
  • A Robust and Knot-Aware Trust-Based Reputation Model
  • The North Laine Shopping Guide: A Case Study in Modelling Trust in Applications
  • Cooperation in Growing Communities
  • A Model for Reasoning About the Privacy Impact of Composite Service Execution in Pervasive Computing
  • Protecting Location Privacy through Semantics-aware Obfuscation Techniques
  • Privacy2.0: Towards Collaborative Data-Privacy Protection
  • Automatic Verification of Privacy Properties in the Applied pi Calculus
  • Place and Time Authentication of Cultural Assets
  • A Lightweight Binary Authentication System for Windows
  • Towards Standards-Compliant Trust Negotiation for Web Services
  • Assigning Responsibility for Failed Obligations
  • Role- and Relationship-Based Identity Management for Private yet Accountable E-Learning
  • Demonstration Overviews
  • Using Rummble as a Personalised Travel Guide
  • An Inline Monitoring System for .NET Mobile Devices
  • STORE Stochastic Reputation Service for Virtual Organisations