top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Foundations of Security Analysis and Design VIII [[electronic resource] ] : FOSAD 2014/2015/2016 Tutorial Lectures / / edited by Alessandro Aldini, Javier Lopez, Fabio Martinelli
Foundations of Security Analysis and Design VIII [[electronic resource] ] : FOSAD 2014/2015/2016 Tutorial Lectures / / edited by Alessandro Aldini, Javier Lopez, Fabio Martinelli
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (VII, 163 p. 36 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Application software
Computers and civilization
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Computers and Society
ISBN 3-319-43005-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Efficient Zero-Knowledge Proof Systems -- JavaScript Sandboxing: Isolating and Restricting Client-Side JavaScript -- From Zoos to Safaris — From Closed-World Enforcement to Open-World Assessment of Privacy -- Distributed Authorization in Vanadium.
Record Nr. UNINA-9910483942003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT Systems Security and Privacy Protection [[electronic resource] ] : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings / / edited by Sabrina De Capitani di Vimercati, Fabio Martinelli
ICT Systems Security and Privacy Protection [[electronic resource] ] : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings / / edited by Sabrina De Capitani di Vimercati, Fabio Martinelli
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVI, 586 p. 159 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer security
Data encryption (Computer science)
Application software
Computers and civilization
Computers
Law and legislation
Systems and Data Security
Cryptology
Information Systems Applications (incl. Internet)
Computers and Society
Legal Aspects of Computing
Computer Applications
ISBN 3-319-58469-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910254814303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings / / edited by Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna
Information Security [[electronic resource] ] : 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings / / edited by Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIV, 508 p.)
Disciplina 005.822gerDNB
Collana Security and Cryptology
Soggetto topico Computer science—Mathematics
Computer programming
Cryptography
Data encryption (Computer science)
Data protection
Algorithms
Mathematics of Computing
Programming Techniques
Cryptology
Data and Information Security
Mathematical Applications in Computer Science
ISBN 3-642-04474-3
Classificazione DAT 050f
DAT 460f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analysis Techniques -- A New Approach to ? 2 Cryptanalysis of Block Ciphers -- Analysis and Optimization of Cryptographically Generated Addresses -- Security Analysis of the PACE Key-Agreement Protocol -- Towards Security Notions for White-Box Cryptography -- A Calculus to Detect Guessing Attacks -- Hash Functions -- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n -- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL -- On Free-Start Collisions and Collisions for TIB3 -- Database Security and Biometrics -- Detection of Database Intrusion Using a Two-Stage Fuzzy System -- Combining Consistency and Confidentiality Requirements in First-Order Databases -- Cancelable Iris Biometrics Using Block Re-mapping and Image Warping -- Iris Recognition in Nonideal Situations -- Algebraic Attacks and Proxy Re-Encryption -- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security -- Practical Algebraic Attacks on the Hitag2 Stream Cipher -- A New Construction of Boolean Functions with Maximum Algebraic Immunity -- Distributed System Security -- A2M: Access-Assured Mobile Desktop Computing -- Automated Spyware Collection and Analysis -- Towards Unifying Vulnerability Information for Attack Graph Construction -- Traitor Tracing without A Priori Bound on the Coalition Size -- SISR – A New Model for Epidemic Spreading of Electronic Threats -- Identity Management and Authentication -- An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement -- Robust Authentication Using Physically Unclonable Functions -- Risks of the CardSpace Protocol -- Applied Cryptography -- Fair E-Cash: Be Compact, Spend Faster -- On the Security of Identity Based Ring Signcryption Schemes -- A Storage Efficient Redactable Signature in the Standard Model -- Generic Construction of Stateful Identity Based Encryption -- Access Control -- Privacy-Aware Attribute-Based Encryption with User Accountability -- Hardware-Assisted Application-Level Access Control -- Towards Trustworthy Delegation in Role-Based Access Control Model -- Secure Interoperation in Multidomain Environments Employing UCON Policies -- Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control -- MAC and Nonces -- Nonce Generators and the Nonce Reset Problem -- MAC Precomputation with Applications to Secure Memory -- HMAC without the “Second” Key -- P2P and Web Services -- Adding Trust to P2P Distribution of Paid Content -- Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale -- F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services.
Record Nr. UNISA-996465314903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings / / edited by Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna
Information Security [[electronic resource] ] : 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings / / edited by Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIV, 508 p.)
Disciplina 005.822gerDNB
Collana Security and Cryptology
Soggetto topico Computer science—Mathematics
Computer programming
Cryptography
Data encryption (Computer science)
Data protection
Algorithms
Mathematics of Computing
Programming Techniques
Cryptology
Data and Information Security
Mathematical Applications in Computer Science
ISBN 3-642-04474-3
Classificazione DAT 050f
DAT 460f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analysis Techniques -- A New Approach to ? 2 Cryptanalysis of Block Ciphers -- Analysis and Optimization of Cryptographically Generated Addresses -- Security Analysis of the PACE Key-Agreement Protocol -- Towards Security Notions for White-Box Cryptography -- A Calculus to Detect Guessing Attacks -- Hash Functions -- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n -- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL -- On Free-Start Collisions and Collisions for TIB3 -- Database Security and Biometrics -- Detection of Database Intrusion Using a Two-Stage Fuzzy System -- Combining Consistency and Confidentiality Requirements in First-Order Databases -- Cancelable Iris Biometrics Using Block Re-mapping and Image Warping -- Iris Recognition in Nonideal Situations -- Algebraic Attacks and Proxy Re-Encryption -- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security -- Practical Algebraic Attacks on the Hitag2 Stream Cipher -- A New Construction of Boolean Functions with Maximum Algebraic Immunity -- Distributed System Security -- A2M: Access-Assured Mobile Desktop Computing -- Automated Spyware Collection and Analysis -- Towards Unifying Vulnerability Information for Attack Graph Construction -- Traitor Tracing without A Priori Bound on the Coalition Size -- SISR – A New Model for Epidemic Spreading of Electronic Threats -- Identity Management and Authentication -- An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement -- Robust Authentication Using Physically Unclonable Functions -- Risks of the CardSpace Protocol -- Applied Cryptography -- Fair E-Cash: Be Compact, Spend Faster -- On the Security of Identity Based Ring Signcryption Schemes -- A Storage Efficient Redactable Signature in the Standard Model -- Generic Construction of Stateful Identity Based Encryption -- Access Control -- Privacy-Aware Attribute-Based Encryption with User Accountability -- Hardware-Assisted Application-Level Access Control -- Towards Trustworthy Delegation in Role-Based Access Control Model -- Secure Interoperation in Multidomain Environments Employing UCON Policies -- Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control -- MAC and Nonces -- Nonce Generators and the Nonce Reset Problem -- MAC Precomputation with Applications to Secure Memory -- HMAC without the “Second” Key -- P2P and Web Services -- Adding Trust to P2P Distribution of Paid Content -- Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale -- F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services.
Record Nr. UNINA-9910484216603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Methods of Contemporary Mathematical Statistical Physics [[electronic resource] /] / by Marek Biskup, Anton Bovier, Frank den Hollander, Dima Ioffe, Fabio Martinelli, Karel Netocný, Christina Toninelli ; edited by Roman Kotecký
Methods of Contemporary Mathematical Statistical Physics [[electronic resource] /] / by Marek Biskup, Anton Bovier, Frank den Hollander, Dima Ioffe, Fabio Martinelli, Karel Netocný, Christina Toninelli ; edited by Roman Kotecký
Autore Biskup Marek
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 350 p. 17 illus.)
Disciplina 530.15
Collana Lecture Notes in Mathematics
Soggetto topico Probabilities
Mathematical physics
Mechanics
Mechanics, Applied
Statistics 
Probability Theory and Stochastic Processes
Theoretical, Mathematical and Computational Physics
Solid Mechanics
Statistics for Engineering, Physics, Computer Science, Chemistry and Earth Sciences
ISBN 1-280-38429-8
9786613562210
3-540-92796-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Reflection Positivity and Phase Transitions in Lattice Spin Models -- Stochastic Geometry of Classical and Quantum Ising Models -- Localization Transition in Disordered Pinning Models -- Metastability -- Three Lectures on Metastability Under Stochastic Dynamics -- A Selection of Nonequilibrium Issues -- Facilitated Spin Models: Recent and New Results.
Record Nr. UNISA-996466477303316
Biskup Marek  
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Methods of Contemporary Mathematical Statistical Physics [[electronic resource] /] / by Marek Biskup, Anton Bovier, Frank den Hollander, Dima Ioffe, Fabio Martinelli, Karel Netocný, Christina Toninelli ; edited by Roman Kotecký
Methods of Contemporary Mathematical Statistical Physics [[electronic resource] /] / by Marek Biskup, Anton Bovier, Frank den Hollander, Dima Ioffe, Fabio Martinelli, Karel Netocný, Christina Toninelli ; edited by Roman Kotecký
Autore Biskup Marek
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 350 p. 17 illus.)
Disciplina 530.15
Collana Lecture Notes in Mathematics
Soggetto topico Probabilities
Mathematical physics
Mechanics
Mechanics, Applied
Statistics 
Probability Theory and Stochastic Processes
Theoretical, Mathematical and Computational Physics
Solid Mechanics
Statistics for Engineering, Physics, Computer Science, Chemistry and Earth Sciences
ISBN 1-280-38429-8
9786613562210
3-540-92796-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Reflection Positivity and Phase Transitions in Lattice Spin Models -- Stochastic Geometry of Classical and Quantum Ising Models -- Localization Transition in Disordered Pinning Models -- Metastability -- Three Lectures on Metastability Under Stochastic Dynamics -- A Selection of Nonequilibrium Issues -- Facilitated Spin Models: Recent and New Results.
Record Nr. UNINA-9910484216103321
Biskup Marek  
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Public Key Infrastructures, Services and Applications [[electronic resource] ] : 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers / / edited by Fabio Martinelli, Bart Preneel
Public Key Infrastructures, Services and Applications [[electronic resource] ] : 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers / / edited by Fabio Martinelli, Bart Preneel
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (X, 303 p. 41 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
User interfaces (Computer systems)
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Computer Communication Networks
User Interfaces and Human Computer Interaction
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Soggetto genere / forma Kongress.
ISBN 1-280-38993-1
9786613567857
3-642-16441-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Certificateless Encryption -- A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures -- Certificates and Revocation -- A Computational Framework for Certificate Policy Operations -- Resource Management with X.509 Inter-domain Authorization Certificates (InterAC) -- Reducing the Cost of Certificate Revocation: A Case Study -- Cryptographic Protocols -- Automatic Generation of Sigma-Protocols -- A Secure and Efficient Authenticated Diffie–Hellman Protocol -- Key Management for Large-Scale Distributed Storage Systems -- PKI in Practice -- Nationwide PKI Testing – Ensuring Interoperability of OCSP Server and Client Implementations Early during Component Tests -- On Device Identity Establishment and Verification -- ABUSE: PKI for Real-World Email Trust -- Encryption and Auctions -- Public-Key Encryption with Registered Keyword Search -- Practicalization of a Range Test and Its Application to E-Auction -- Timed-Ephemerizer: Make Assured Data Appear and Disappear -- Reputation and User Aspects -- Privacy and Liveliness for Reputation Systems -- A Multidimensional Reputation Scheme for Identity Federations -- On the Usability of User Interfaces for Secure Website Authentication in Browsers -- Digital Signatures -- Validity Models of Electronic Signatures and Their Enforcement in Practice -- Biometric Identity Based Signature Revisited -- How to Construct Identity-Based Signatures without the Key Escrow Problem.
Record Nr. UNISA-996465682403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Public Key Infrastructures, Services and Applications [[electronic resource] ] : 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers / / edited by Fabio Martinelli, Bart Preneel
Public Key Infrastructures, Services and Applications [[electronic resource] ] : 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers / / edited by Fabio Martinelli, Bart Preneel
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (X, 303 p. 41 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
User interfaces (Computer systems)
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Computer Communication Networks
User Interfaces and Human Computer Interaction
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Soggetto genere / forma Kongress.
ISBN 1-280-38993-1
9786613567857
3-642-16441-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Certificateless Encryption -- A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures -- Certificates and Revocation -- A Computational Framework for Certificate Policy Operations -- Resource Management with X.509 Inter-domain Authorization Certificates (InterAC) -- Reducing the Cost of Certificate Revocation: A Case Study -- Cryptographic Protocols -- Automatic Generation of Sigma-Protocols -- A Secure and Efficient Authenticated Diffie–Hellman Protocol -- Key Management for Large-Scale Distributed Storage Systems -- PKI in Practice -- Nationwide PKI Testing – Ensuring Interoperability of OCSP Server and Client Implementations Early during Component Tests -- On Device Identity Establishment and Verification -- ABUSE: PKI for Real-World Email Trust -- Encryption and Auctions -- Public-Key Encryption with Registered Keyword Search -- Practicalization of a Range Test and Its Application to E-Auction -- Timed-Ephemerizer: Make Assured Data Appear and Disappear -- Reputation and User Aspects -- Privacy and Liveliness for Reputation Systems -- A Multidimensional Reputation Scheme for Identity Federations -- On the Usability of User Interfaces for Secure Website Authentication in Browsers -- Digital Signatures -- Validity Models of Electronic Signatures and Their Enforcement in Practice -- Biometric Identity Based Signature Revisited -- How to Construct Identity-Based Signatures without the Key Escrow Problem.
Record Nr. UNINA-9910483270403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trust Management [[electronic resource] ] : 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings / / edited by Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio MASSACCI
Trust Management [[electronic resource] ] : 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings / / edited by Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio MASSACCI
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XIV, 476 p.)
Disciplina 005.1
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Software engineering
Application software
Information storage and retrieval
Computer communication systems
Computers and civilization
Management information systems
Computer science
Software Engineering/Programming and Operating Systems
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Computer Communication Networks
Computers and Society
Management of Computing and Information Systems
ISBN 3-540-34297-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Why We Need a Non-reductionist Approach to Trust -- Full Papers -- Dynamic Trust Federation in Grids -- Being Trusted in a Social Network: Trust as Relational Capital -- A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments -- Normative Structures in Trust Management -- Gathering Experience in Trust-Based Interactions -- Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail -- Generating Predictive Movie Recommendations from Trust in Social Networks -- Temporal Logic-Based Specification and Verification of Trust Models -- Modelling Trade and Trust Across Cultures -- Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation -- Trust-Based Route Selection in Dynamic Source Routing -- Implementing Credential Networks -- Exploring Different Types of Trust Propagation -- PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation -- A Versatile Approach to Combining Trust Values for Making Binary Decisions -- Jiminy: A Scalable Incentive-Based Architecture for Improving Rating Quality -- Virtual Fingerprinting as a Foundation for Reputation in Open Systems -- Towards Automated Evaluation of Trust Constraints -- Provision of Trusted Identity Management Using Trust Credentials -- Acceptance of Voting Technology: Between Confidence and Trust -- B-Trust: Bayesian Trust Framework for Pervasive Computing -- TATA: Towards Anonymous Trusted Authentication -- The Design, Generation, and Utilisation of a Semantically Rich Personalised Model of Trust -- A Trust Assignment Model Based on Alternate Actions Payoff -- Privacy, Reputation, and Trust: Some Implications for Data Protection -- A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks -- Robust Reputations for Peer-to-Peer Marketplaces -- From Theory to Practice: Forgiveness as a Mechanism to Repair Conflicts in CMC -- A Novel Protocol for Communicating Reputation in P2P Networks -- A Scalable Probabilistic Approach to Trust Evaluation -- Demonstration Overviews -- The Agent Reputation and Trust (ART) Testbed -- Trust Establishment in Emergency Case -- Evaluating Trust and Authenticity with Caution -- Using Jiminy for Run-Time User Classification Based on Rating Behaviour -- Traust: A Trust Negotiation Based Authorization Service -- The Interactive Cooperation Tournament -- eTVRA, a Threat, Vulnerability and Risk Assessment Tool for eEurope.
Record Nr. UNISA-996466164903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trust Management [[electronic resource] ] : 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings / / edited by Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio MASSACCI
Trust Management [[electronic resource] ] : 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings / / edited by Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio MASSACCI
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XIV, 476 p.)
Disciplina 005.1
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Software engineering
Application software
Information storage and retrieval
Computer communication systems
Computers and civilization
Management information systems
Computer science
Software Engineering/Programming and Operating Systems
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Computer Communication Networks
Computers and Society
Management of Computing and Information Systems
ISBN 3-540-34297-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Why We Need a Non-reductionist Approach to Trust -- Full Papers -- Dynamic Trust Federation in Grids -- Being Trusted in a Social Network: Trust as Relational Capital -- A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments -- Normative Structures in Trust Management -- Gathering Experience in Trust-Based Interactions -- Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail -- Generating Predictive Movie Recommendations from Trust in Social Networks -- Temporal Logic-Based Specification and Verification of Trust Models -- Modelling Trade and Trust Across Cultures -- Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation -- Trust-Based Route Selection in Dynamic Source Routing -- Implementing Credential Networks -- Exploring Different Types of Trust Propagation -- PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation -- A Versatile Approach to Combining Trust Values for Making Binary Decisions -- Jiminy: A Scalable Incentive-Based Architecture for Improving Rating Quality -- Virtual Fingerprinting as a Foundation for Reputation in Open Systems -- Towards Automated Evaluation of Trust Constraints -- Provision of Trusted Identity Management Using Trust Credentials -- Acceptance of Voting Technology: Between Confidence and Trust -- B-Trust: Bayesian Trust Framework for Pervasive Computing -- TATA: Towards Anonymous Trusted Authentication -- The Design, Generation, and Utilisation of a Semantically Rich Personalised Model of Trust -- A Trust Assignment Model Based on Alternate Actions Payoff -- Privacy, Reputation, and Trust: Some Implications for Data Protection -- A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks -- Robust Reputations for Peer-to-Peer Marketplaces -- From Theory to Practice: Forgiveness as a Mechanism to Repair Conflicts in CMC -- A Novel Protocol for Communicating Reputation in P2P Networks -- A Scalable Probabilistic Approach to Trust Evaluation -- Demonstration Overviews -- The Agent Reputation and Trust (ART) Testbed -- Trust Establishment in Emergency Case -- Evaluating Trust and Authenticity with Caution -- Using Jiminy for Run-Time User Classification Based on Rating Behaviour -- Traust: A Trust Negotiation Based Authorization Service -- The Interactive Cooperation Tournament -- eTVRA, a Threat, Vulnerability and Risk Assessment Tool for eEurope.
Record Nr. UNINA-9910483671803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui