LEADER 01045nam a22002771i 4500 001 991003159639707536 005 20040621104004.0 008 040624s1993 it a||||||||||||||||eng 035 $ab13032756-39ule_inst 035 $aARCHE-099043$9ExL 040 $aDip.to Beni Culturali$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a709.4563 100 1 $aBruno, Vincent J.$0170844 245 10$aCosa IV :$bthe houses /$cby Vincent J. Bruno and Russell T. Scott 260 $aRome :$bAmerican academy in Rome,$c1993 300 $aXXII, 211 p. :$bill. ;$c30 cm 440 0$aMemoirs of the American academy in Rome ;$v38 650 4$aScavi archeologici$xCosa 651 4$aRoma$xArcheologia 700 1 $aScott, Russell T. 907 $a.b13032756$b02-04-14$c12-07-04 912 $a991003159639707536 945 $aLE001 AR IX 64/38$g1$i2001000129713$lle001$nC. 1$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i1364919x$z12-07-04 996 $aCosa IV$9287962 997 $aUNISALENTO 998 $ale001$b12-07-04$cm$da $e-$feng$git $h0$i1 LEADER 06654nam 22007815 450 001 9910483188203321 005 20251226195554.0 010 $a9783540320401 024 7 $a10.1007/b136639 035 $a(CKB)1000000000213004 035 $a(SSID)ssj0000320510 035 $a(PQKBManifestationID)11215103 035 $a(PQKBTitleCode)TC0000320510 035 $a(PQKBWorkID)10249282 035 $a(PQKB)11015799 035 $a(DE-He213)978-3-540-32040-1 035 $a(MiAaPQ)EBC3067621 035 $a(PPN)123094763 035 $a(EXLCZ)991000000000213004 100 $a20100713d2005 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTrust Management $eThird International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings /$fedited by Peter Herrmann, Valerie Issarny, Simon Shiu 205 $a1st ed. 2005. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2005. 215 $a1 online resource (XII, 428 p.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v3477 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-32040-7 311 08$a3-540-26042-0 320 $aIncludes bibliographical references and index. 327 $aThird International Conference on Trust Management -- Foraging for Trust: Exploring Rationality and the Stag Hunt Game -- Trust, Untrust, Distrust and Mistrust ? An Exploration of the Dark(er) Side -- Security and Trust in the Italian Legal Digital Signature Framework -- Specifying Legal Risk Scenarios Using the CORAS Threat Modelling Language -- On Deciding to Trust -- Trust Management Survey -- Can We Manage Trust? -- Operational Models for Reputation Servers -- A Representation Model of Trust Relationships with Delegation Extensions -- Affect and Trust -- Reinventing Forgiveness: A Formal Investigation of Moral Facilitation -- Modeling Social and Individual Trust in Requirements Engineering Methodologies -- Towards a Generic Trust Model ? Comparison of Various Trust Update Algorithms -- A Probabilistic Trust Model for Handling Inaccurate Reputation Sources -- Trust as a Key to Improving Recommendation Systems -- Alleviating the Sparsity Problem of Collaborative Filtering Using Trust Inferences -- Experience-Based Trust: Enabling Effective Resource Selection in a Grid Environment -- Interactive Credential Negotiation for Stateful Business Processes -- An Evidence Based Architecture for Efficient, Attack-Resistant Computational Trust Dissemination in Peer-to-Peer Networks -- Towards an Evaluation Methodology for Computational Trust Systems -- Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy -- Trust Transfer: Encouraging Self-recommendations Without Sybil Attack -- Privacy-Preserving Search and Updates for Outsourced Tree-Structured Data on Untrusted Servers -- Persistent and Dynamic Trust: Analysis and the Related Impact of Trusted Platforms -- Risk Models for Trust-Based Access Control(TBAC) -- Combining Trust and Risk to Reduce the Cost ofAttacks -- IWTrust: Improving User Trust in Answers from the Web -- Trust Record: High-Level Assurance and Compliance -- Implementation of the SECURE Trust Engine -- The CORAS Tool for Security Risk Analysis -- Towards a Grid Platform Enabling Dynamic Virtual Organisations for Business Applications -- Multimedia Copyright Protection Platform Demonstrator -- ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements -- The VoteSecureTM Secure Internet Voting System. 330 $aThis volume constitutes the proceedings of the 3rd International Conference on Trust Management, held in Paris, France, during 23?26 May 2005. The conf- ence follows successful International Conferences in Crete in 2003 and Oxford in 2004. All conferences were organized by iTrust, which is a working group funded as a thematic network by the Future and Emerging Technologies (FET) unit of the Information Society Technologies (IST) program of the European Union. The purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of trust as a means of increasing security, building con?dence and facilitating collaboration in dynamic open s- tems. The notion of trust has been studied independently by di?erent academic disciplines, which has helped us to identify and understand di?erent aspects of trust. Theaimofthisconferencewastoprovideacommonforum,bringingtogether researchers from di?erent academic branches, such as the technology-oriented disciplines, law, social sciences and philosophy, in order to develop a deeper and more fundamental understanding of the issues and challenges in the area of trust management in dynamic open systems. The response to this conference was excellent; from the 71 papers submitted to the conference, we selected 21 full papers and 4 short papers for presentation. The program also included two keynote addresses, given by Steve Marsh from National Research Centre Canada, Institute for Information Technology, and Steve Kimbrough from the University of Pennsylvania; an industrial panel; 7 technology demonstrations; and a full day of tutorials. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v3477 606 $aApplication software 606 $aInformation storage and retrieval systems 606 $aComputer networks 606 $aComputers and civilization 606 $aElectronic data processing$xManagement 606 $aComputer and Information Systems Applications 606 $aInformation Storage and Retrieval 606 $aComputer Communication Networks 606 $aComputers and Society 606 $aIT Operations 615 0$aApplication software. 615 0$aInformation storage and retrieval systems. 615 0$aComputer networks. 615 0$aComputers and civilization. 615 0$aElectronic data processing$xManagement. 615 14$aComputer and Information Systems Applications. 615 24$aInformation Storage and Retrieval. 615 24$aComputer Communication Networks. 615 24$aComputers and Society. 615 24$aIT Operations. 676 $a004 701 $aHerrmann$b Peter$0152949 701 $aIssarny$b Vale?rie$01752858 701 $aShiu$b Simon$01752859 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483188203321 996 $aTrust management$94188347 997 $aUNINA