LEADER 05137nam 22006855 450 001 9910437960303321 005 20200706201803.0 010 $a3-642-38323-8 024 7 $a10.1007/978-3-642-38323-6 035 $a(CKB)3280000000007745 035 $a(DE-He213)978-3-642-38323-6 035 $a(SSID)ssj0000897440 035 $a(PQKBManifestationID)11500231 035 $a(PQKBTitleCode)TC0000897440 035 $a(PQKBWorkID)10902316 035 $a(PQKB)10148538 035 $a(MiAaPQ)EBC3091908 035 $a(PPN)170492028 035 $a(EXLCZ)993280000000007745 100 $a20130530d2013 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTrust Management VII$b[electronic resource] $e7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013, Proceedings /$fedited by Carmen Fernandez-Gago, Fabio Martinelli, Siani Pearson, Isaac Agudo 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XII, 289 p. 49 illus.) 225 1 $aIFIP Advances in Information and Communication Technology,$x1868-4238 ;$v401 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-38322-X 327 $aSymbolic Privacy Analysis through Linkability and Detectability -- Middleware-Based Security and Privacy for In-car Integration of Third-Party Applications -- Towards Automated Trust Establishment in Federated Identity Management -- On Beta Models with Trust Chains -- Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review -- Understanding Trust within Online Discussion Boards: Trust Formation in the Absence of Reputation Systems -- In Cloud We Trust: Risk-Assessment-as-a-Service -- An Empirical Test of How Events Turn the Cognitive Gears of Trust -- Reflections on Measuring the Trust Empowerment Potential of a Digital Environment -- Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity -- Securing Identity Assignment Using Implicit Certificates in P2P Overlays -- Impact of Dataset Representation on Smartphone Malware Detection Performance -- Sensor Enhanced Access Control: Extending Traditional Access Control Models with Context-Awareness -- Noninterference Analysis of Delegation Subterfuge in Distributed Authorization Systems -- An Automatic Trust Calculation Based on the Improved Kalman Filter Detection Algorithm -- The Method of Trust and Reputation Systems Based on Link Prediction and Network-Aware Evaluation Environment for Reputation Systems -- Trust Model for Cloud Based on Cloud -- Modeling Reactive Trust Acquisition Using State Transition Systems -- Towards Trust-Aware and Self-adaptive Systems -- An Attack-Resistant Hybrid Data-Privatization Method with Low Information Loss -- PERSONA - A Personalized Data Protection Framework -- A Socio-technical Understanding of TLS Certificate Validation. 330 $aThis book constitutes the refereed proceedings of the 7th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2013, held in Malaga, Spain, in June 2013. The 14 revised full papers and 9 short papers presented were carefully reviewed and selected from 62 submissions. The papers cover a wide range of topics focusing on multi-disciplinary areas such as: trust models, social foundations of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems, and identity management. 410 0$aIFIP Advances in Information and Communication Technology,$x1868-4238 ;$v401 606 $aComputer security 606 $aComputers and civilization 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 615 0$aComputer security. 615 0$aComputers and civilization. 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 14$aSystems and Data Security. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aCryptology. 676 $a005.8 702 $aFernandez-Gago$b Carmen$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMartinelli$b Fabio$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPearson$b Siani$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAgudo$b Isaac$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910437960303321 996 $aTrust Management VII$92500293 997 $aUNINA