top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Trust Management XI : 11th IFIP WG 11.11 International Conference, IFIPTM 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedings / / edited by Jan-Philipp Steghöfer, Babak Esfandiari
Trust Management XI : 11th IFIP WG 11.11 International Conference, IFIPTM 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedings / / edited by Jan-Philipp Steghöfer, Babak Esfandiari
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (X, 229 p. 32 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computers and civilization
Data protection
Information storage and retrieval
E-commerce
Software engineering
Computer security
Computers and Society
Security
Information Storage and Retrieval
e-Commerce/e-business
Software Engineering
Systems and Data Security
ISBN 3-319-59171-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Information Sharing and Personal Data -- Partial Commitment - "Try Before You Buy" and "Buyer's Remorse" for Personal Data in Big Data & Machine Learning -- Abstract -- 1 Introduction -- 1.1 Background -- 1.2 Challenges -- 2 Partial Commitment as a Concept: The MAYBE Button -- 2.1 Data Subjects' Perspective -- 2.2 Service Providers' Perspective -- 3 Research Opportunities -- 4 Conclusion -- References -- VIGraph -- A Framework for Verifiable Information -- 1 Introduction -- 2 VIGraph: Signed Hash Tree with Optional Dependency Overlay -- 2.1 Levels and Dependencies -- 2.2 Storage of the VIGraph -- 2.3 Data Operations on the VIGraph -- 2.4 Data Verification -- 3 Discussion and the State-of-the-art -- 4 Conclusion and Future Work -- References -- A Flexible Privacy-Preserving Framework for Singular Value Decomposition Under Internet of Things Environment -- 1 Introduction -- 2 Preliminaries -- 2.1 Paillier Cryptosystem -- 2.2 Singular Value Decomposition -- 3 System Model, Security Requirements and Design Goals -- 3.1 System Model -- 3.2 Security Requirements -- 3.3 Design Goals -- 4 The Proposed Framework -- 4.1 System Initialization -- 4.2 Data Collection -- 4.3 Data Randomization -- 4.4 Pre-computation -- 4.5 Eigenvalue Decomposition -- 5 Security Analysis -- 5.1 Privacy Leakage Under Normal Operations -- 5.2 Potential Attacks -- 6 Performance Evaluation -- 6.1 Capacity -- 6.2 Efficiency -- 7 Applications -- 7.1 Localized Recommendation System -- 8 Related Works -- 9 Conclusions -- References -- Novel Sources of Trust and Trust Information -- The Game of Trust: Using Behavioral Experiment as a Tool to Assess and Collect Trust-Related Data -- 1 Introduction -- 2 The Game of Trust: Initial Concept -- 2.1 Game Dynamics -- 2.2 Trust Assessment -- 3 Future Work: Digital Game -- References.
Social Network Analysis for Trust Prediction -- 1 Introduction -- 2 Related Work -- 3 Approach -- 3.1 User Features -- 3.2 Trust Measures -- 3.3 Reasoning Algorithms -- 4 Evaluation -- 4.1 Dataset Description -- 4.2 Network Centrality Features -- 4.3 Trust in the Platform -- 4.4 Trust in Other Users -- 5 Discussion -- References -- Investigating Security Capabilities in Service Level Agreements as Trust-Enhancing Instruments -- 1 Introduction -- 2 Research Methodology -- 2.1 Research Participants -- 2.2 Data Collection: A Three-Round Delphi Study -- 2.3 Data Analysis: Grounded Theory Analysis -- 3 Results and Analysis -- 3.1 Perceived Threats -- 3.2 Government-Specific Security Requirements -- 3.3 Provider-Specific Security Capabilities -- 4 Discussion -- 4.1 Implications -- 4.2 Limitations -- 4.3 Reflection with Related Work -- 5 Conclusion -- References -- Applications of Trust -- Managing Software Uninstall with Negative Trust -- 1 Introduction -- 2 Related Work -- 3 (un)SecureND -- 3.1 Repositories, Packages and Dependencies -- 3.2 Rules for Package Execution -- 3.3 Access Rules -- 3.4 Structural Rules -- 4 The Distrusted Uninstall Problem -- 5 The Mistrusted Uninstall Problem -- 6 An Example -- 7 Conclusions -- References -- Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions -- 1 Introduction -- 2 Requirements -- 3 CIDS Trust Management -- 3.1 Dirichlet-Based Trust Management -- 3.2 Trust Diversity -- 3.3 A Trust-Aware P2P-Based CIDS -- 3.4 A Reputation-Based Bootstrapping Mechanism for CIDSs -- 4 Discussion -- 4.1 Comparison -- 4.2 Challenges and Steps Ahead -- 5 Conclusion -- References -- Self-trust, Self-efficacy and Digital Learning -- Abstract -- 1 Introduction -- 2 Background Research -- 3 Methodology -- 4 Analysis -- 5 Conclusion -- References -- Trust Metrics.
Advanced Flow Models for Computing the Reputation of Internet Domains -- 1 Introduction -- 2 Related Work -- 2.1 Starting Point: A Topology Based Flow Model -- 3 DNS Topology Graph Extension -- 4 Clustering Based Flow Model -- 4.1 Categorical Clustering -- 4.2 Communities of IPs and Domains -- 5 Evaluation -- 5.1 Data Sources -- 5.2 Evaluation Criteria -- 5.3 Experiment Results -- 6 Conclusions and Future Work -- References -- Trust Trust Me (The Additivity) -- 1 Introduction -- 2 Application -- 3 Trust -- 3.1 Quality and Quantity of Trust -- 3.2 Composition Operators of Trust -- 3.3 Problem of Duplicate Counting -- 4 Network of Trust -- 4.1 Soundness and Stability -- 4.2 Computation with Linear Term -- 5 Trust Computation Protocol -- 6 Related Work -- 7 Discussion -- 8 Conclusion -- References -- Towards Statistical Trust Computation for Medical Smartphone Networks Based on Behavioral Profiling -- 1 Introduction -- 2 Related Work -- 3 Our Approach -- 4 Evaluation -- 4.1 Experiment-1 -- 4.2 Experiment-2 -- 5 Conclusion -- References -- Reputation Systems -- Reputation-Enhanced Recommender Systems -- 1 Introduction -- 2 Background -- 2.1 Recommender Systems Principles -- 2.2 Reputation Systems Principles -- 2.3 Relating Reputation Systems to Recommender Systems -- 3 State of the Art -- 3.1 Literature Review Protocol -- 3.2 Taxonomy Development -- 3.3 Overview of Existing Work -- 3.4 Limitations of the Literature Review -- 4 Future Research Directions -- 5 Conclusion -- References -- Self-reported Verifiable Reputation with Rater Privacy -- 1 Introduction -- 2 Related Work -- 3 Model -- 4 Objectives -- 4.1 Efficiency -- 4.2 User Anonymity Preservation -- 4.3 Decentralization -- 4.4 Robustness -- 5 Tokens -- Security Against Sybil Attacks -- 5.1 Certificate-Based Method -- 5.2 Formalization -- 6 Description of the Protocol -- 6.1 Outline -- 6.2 Setup.
6.3 Primitive Operations -- 6.4 Blind Signatures -- 7 Analysis -- 7.1 Efficiency -- 7.2 User Anonymity Preservation -- 7.3 Decentralization -- 7.4 Robustness -- 8 Conclusion -- References -- William Winsborough Commemorative Address and Award 2017 -- Strong Accountability and Its Contribution to Trustworthy Data Handling in the Information Society -- Abstract -- 1 Introduction -- 2 Ethical Issues Arising from Recent Changes in Information Technology -- 3 Ethical Decision Making -- 3.1 Different Approaches to Ethics -- 3.2 Ethical Frameworks -- 3.3 Examples Addressing Technological Change -- 4 How Accountability Can Contribute to These Solutions -- 4.1 The Concept of Accountability -- 4.2 What Organisations Need to Do -- 5 The Relationship Between Accountability and Trust -- 5.1 Ethical Considerations -- 5.2 The Need for Strong Accountability -- 6 Conclusions -- Acknowledgments -- References -- Information Trust -- Abstract -- Introduction -- References -- Privacy and Trust in Cloud-Based Marketplacesfor AI and Data Resources -- Abstract -- A Market Place for Artificial Intelligence and Data -- Trust and Privacy Definitions for Network and Clouds -- Privacy and Trust Requirements for CMPs -- Conclusion -- References -- Psychological Evaluation of Human ChoiceBehavior in Socio-Technical Systems:A Rational Process Model Approach -- References -- Author Index.
Record Nr. UNINA-9910254812003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trustworthy Open Self-Organising Systems / / edited by Wolfgang Reif, Gerrit Anders, Hella Seebach, Jan-Philipp Steghöfer, Elisabeth André, Jörg Hähner, Christian Müller-Schloer, Theo Ungerer
Trustworthy Open Self-Organising Systems / / edited by Wolfgang Reif, Gerrit Anders, Hella Seebach, Jan-Philipp Steghöfer, Elisabeth André, Jörg Hähner, Christian Müller-Schloer, Theo Ungerer
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Birkhäuser, , 2016
Descrizione fisica 1 online resource (XIV, 244 p. 76 illus., 54 illus. in color.)
Disciplina 005.1
Collana Autonomic Systems
Soggetto topico Software engineering
Artificial intelligence
Software Engineering
Artificial Intelligence
ISBN 3-319-29201-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I: Design of Trustworthy Self-Organizing Large-Scale Open Systems Wolfgang Reif et al. -- Part II: HCI Design for Trustworthy Organic Computing Elisabeth André et al. -- Part III: Self-Organizing Trusted Communities a Top-down Approach Christian Müller-Schloer et al. -- Part IV: Self-Organizing Trusted Communities a Bottom-up Approach Jörg Hähner et al. -- Part V: A Trust-Enabling Middleware (TEM) Theo Ungerer et al. -- Part V-X: Invited Contributions.
Record Nr. UNINA-9910255004203321
Cham : , : Springer International Publishing : , : Imprint : Birkhäuser, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui