top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Trust and Trustworthy Computing [[electronic resource] ] : 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011, Proceedings / / edited by Jonathan McCune, Boris Balacheff, Adrian Perrig, Ahmad-Reza Sadeghi, Angela Sasse, Yolanta Beres
Trust and Trustworthy Computing [[electronic resource] ] : 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011, Proceedings / / edited by Jonathan McCune, Boris Balacheff, Adrian Perrig, Ahmad-Reza Sadeghi, Angela Sasse, Yolanta Beres
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (VII, 314 p. 77 illus., 49 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Management information systems
Computer science
Algorithms
Computers and civilization
Application software
Cryptology
Computer Communication Networks
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Information Systems Applications (incl. Internet)
ISBN 3-642-21599-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465383603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trust and Trustworthy Computing [[electronic resource] ] : Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings / / edited by Alessandro Acquisti, Sean W. Smith, Ahmad-Reza Sadeghi
Trust and Trustworthy Computing [[electronic resource] ] : Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings / / edited by Alessandro Acquisti, Sean W. Smith, Ahmad-Reza Sadeghi
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIII, 441 p. 84 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Computer programming
Management information systems
Computer science
Algorithms
Computers and civilization
Computer Communication Networks
Cryptology
Programming Techniques
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
ISBN 1-280-38747-5
9786613565396
3-642-13869-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Technical Strand—Full Papers -- Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform -- SBAP: Software-Based Attestation for Peripherals -- Key Attestation from Trusted Execution Environments -- Anonymous Authentication with TLS and DAA -- Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation -- Towards a Trusted Mobile Desktop -- Application of Trusted Computing in Automation to Prevent Product Piracy -- Lagrangian E-Voting: Verifiability on Demand and Strong Privacy -- ?TSS – A Simplified Trusted Software Stack -- Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture -- A DAA Scheme Using Batch Proof and Verification -- A Pairing-Based DAA Scheme Further Reducing TPM Resources -- An Anonymous Attestation Scheme with Optional Traceability -- Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing -- SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms -- Technical Strand—Short Papers -- Escrowed Data and the Digital Envelope -- Engineering Attestable Services -- Dynamic Enforcement of Platform Integrity -- An Improved Memory Integrity Protection Scheme -- Robust Combiners for Software Hardening -- The PUF Promise -- Socio-Economic Strand -- Privacy Requirements Engineering for Trustworthy e-Government Services -- Can Competitive Insurers Improve Network Security? -- Nudge: Intermediaries’ Role in Interdependent Network Security -- How the Public Views Strategies Designed to Reduce the Threat of Botnets -- Axiomatic and Behavioural Trust -- The Leap of Faith from Online to Offline: An Exploratory Study of Couchsurfing.org -- The Role of Soft Information in Trust Building: Evidence from Online Social Lending -- Software on the Witness Stand: What Should It Take for Us to Trust It? -- Workshop on Trust in the Cloud -- Token-Based Cloud Computing -- Workshop on Security Hardware -- Oblivious Transfer Based on Physical Unclonable Functions.
Record Nr. UNISA-996466438903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trust and Trustworthy Computing [[electronic resource] ] : Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings / / edited by Alessandro Acquisti, Sean W. Smith, Ahmad-Reza Sadeghi
Trust and Trustworthy Computing [[electronic resource] ] : Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings / / edited by Alessandro Acquisti, Sean W. Smith, Ahmad-Reza Sadeghi
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIII, 441 p. 84 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Computer programming
Management information systems
Computer science
Algorithms
Computers and civilization
Computer Communication Networks
Cryptology
Programming Techniques
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
ISBN 1-280-38747-5
9786613565396
3-642-13869-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Technical Strand—Full Papers -- Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform -- SBAP: Software-Based Attestation for Peripherals -- Key Attestation from Trusted Execution Environments -- Anonymous Authentication with TLS and DAA -- Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation -- Towards a Trusted Mobile Desktop -- Application of Trusted Computing in Automation to Prevent Product Piracy -- Lagrangian E-Voting: Verifiability on Demand and Strong Privacy -- ?TSS – A Simplified Trusted Software Stack -- Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture -- A DAA Scheme Using Batch Proof and Verification -- A Pairing-Based DAA Scheme Further Reducing TPM Resources -- An Anonymous Attestation Scheme with Optional Traceability -- Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing -- SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms -- Technical Strand—Short Papers -- Escrowed Data and the Digital Envelope -- Engineering Attestable Services -- Dynamic Enforcement of Platform Integrity -- An Improved Memory Integrity Protection Scheme -- Robust Combiners for Software Hardening -- The PUF Promise -- Socio-Economic Strand -- Privacy Requirements Engineering for Trustworthy e-Government Services -- Can Competitive Insurers Improve Network Security? -- Nudge: Intermediaries’ Role in Interdependent Network Security -- How the Public Views Strategies Designed to Reduce the Threat of Botnets -- Axiomatic and Behavioural Trust -- The Leap of Faith from Online to Offline: An Exploratory Study of Couchsurfing.org -- The Role of Soft Information in Trust Building: Evidence from Online Social Lending -- Software on the Witness Stand: What Should It Take for Us to Trust It? -- Workshop on Trust in the Cloud -- Token-Based Cloud Computing -- Workshop on Security Hardware -- Oblivious Transfer Based on Physical Unclonable Functions.
Record Nr. UNINA-9910484560303321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trust Management [[electronic resource] ] : 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings / / edited by Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio MASSACCI
Trust Management [[electronic resource] ] : 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings / / edited by Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio MASSACCI
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XIV, 476 p.)
Disciplina 005.1
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Software engineering
Application software
Information storage and retrieval
Computer communication systems
Computers and civilization
Management information systems
Computer science
Software Engineering/Programming and Operating Systems
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Computer Communication Networks
Computers and Society
Management of Computing and Information Systems
ISBN 3-540-34297-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Why We Need a Non-reductionist Approach to Trust -- Full Papers -- Dynamic Trust Federation in Grids -- Being Trusted in a Social Network: Trust as Relational Capital -- A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments -- Normative Structures in Trust Management -- Gathering Experience in Trust-Based Interactions -- Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail -- Generating Predictive Movie Recommendations from Trust in Social Networks -- Temporal Logic-Based Specification and Verification of Trust Models -- Modelling Trade and Trust Across Cultures -- Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation -- Trust-Based Route Selection in Dynamic Source Routing -- Implementing Credential Networks -- Exploring Different Types of Trust Propagation -- PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation -- A Versatile Approach to Combining Trust Values for Making Binary Decisions -- Jiminy: A Scalable Incentive-Based Architecture for Improving Rating Quality -- Virtual Fingerprinting as a Foundation for Reputation in Open Systems -- Towards Automated Evaluation of Trust Constraints -- Provision of Trusted Identity Management Using Trust Credentials -- Acceptance of Voting Technology: Between Confidence and Trust -- B-Trust: Bayesian Trust Framework for Pervasive Computing -- TATA: Towards Anonymous Trusted Authentication -- The Design, Generation, and Utilisation of a Semantically Rich Personalised Model of Trust -- A Trust Assignment Model Based on Alternate Actions Payoff -- Privacy, Reputation, and Trust: Some Implications for Data Protection -- A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks -- Robust Reputations for Peer-to-Peer Marketplaces -- From Theory to Practice: Forgiveness as a Mechanism to Repair Conflicts in CMC -- A Novel Protocol for Communicating Reputation in P2P Networks -- A Scalable Probabilistic Approach to Trust Evaluation -- Demonstration Overviews -- The Agent Reputation and Trust (ART) Testbed -- Trust Establishment in Emergency Case -- Evaluating Trust and Authenticity with Caution -- Using Jiminy for Run-Time User Classification Based on Rating Behaviour -- Traust: A Trust Negotiation Based Authorization Service -- The Interactive Cooperation Tournament -- eTVRA, a Threat, Vulnerability and Risk Assessment Tool for eEurope.
Record Nr. UNISA-996466164903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trust Management [[electronic resource] ] : 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings / / edited by Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio MASSACCI
Trust Management [[electronic resource] ] : 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings / / edited by Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio MASSACCI
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XIV, 476 p.)
Disciplina 005.1
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Software engineering
Application software
Information storage and retrieval
Computer communication systems
Computers and civilization
Management information systems
Computer science
Software Engineering/Programming and Operating Systems
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Computer Communication Networks
Computers and Society
Management of Computing and Information Systems
ISBN 3-540-34297-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Why We Need a Non-reductionist Approach to Trust -- Full Papers -- Dynamic Trust Federation in Grids -- Being Trusted in a Social Network: Trust as Relational Capital -- A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments -- Normative Structures in Trust Management -- Gathering Experience in Trust-Based Interactions -- Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail -- Generating Predictive Movie Recommendations from Trust in Social Networks -- Temporal Logic-Based Specification and Verification of Trust Models -- Modelling Trade and Trust Across Cultures -- Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation -- Trust-Based Route Selection in Dynamic Source Routing -- Implementing Credential Networks -- Exploring Different Types of Trust Propagation -- PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation -- A Versatile Approach to Combining Trust Values for Making Binary Decisions -- Jiminy: A Scalable Incentive-Based Architecture for Improving Rating Quality -- Virtual Fingerprinting as a Foundation for Reputation in Open Systems -- Towards Automated Evaluation of Trust Constraints -- Provision of Trusted Identity Management Using Trust Credentials -- Acceptance of Voting Technology: Between Confidence and Trust -- B-Trust: Bayesian Trust Framework for Pervasive Computing -- TATA: Towards Anonymous Trusted Authentication -- The Design, Generation, and Utilisation of a Semantically Rich Personalised Model of Trust -- A Trust Assignment Model Based on Alternate Actions Payoff -- Privacy, Reputation, and Trust: Some Implications for Data Protection -- A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks -- Robust Reputations for Peer-to-Peer Marketplaces -- From Theory to Practice: Forgiveness as a Mechanism to Repair Conflicts in CMC -- A Novel Protocol for Communicating Reputation in P2P Networks -- A Scalable Probabilistic Approach to Trust Evaluation -- Demonstration Overviews -- The Agent Reputation and Trust (ART) Testbed -- Trust Establishment in Emergency Case -- Evaluating Trust and Authenticity with Caution -- Using Jiminy for Run-Time User Classification Based on Rating Behaviour -- Traust: A Trust Negotiation Based Authorization Service -- The Interactive Cooperation Tournament -- eTVRA, a Threat, Vulnerability and Risk Assessment Tool for eEurope.
Record Nr. UNINA-9910483671803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trust Management [[electronic resource] ] : Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings / / edited by Peter Herrmann, Valerie Issarny, Simon Shiu
Trust Management [[electronic resource] ] : Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings / / edited by Peter Herrmann, Valerie Issarny, Simon Shiu
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 428 p.)
Disciplina 004
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Information storage and retrieval
Computer communication systems
Computers and civilization
Management information systems
Computer science
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Computer Communication Networks
Computers and Society
Management of Computing and Information Systems
ISBN 9783540320401
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Third International Conference on Trust Management -- Foraging for Trust: Exploring Rationality and the Stag Hunt Game -- Trust, Untrust, Distrust and Mistrust – An Exploration of the Dark(er) Side -- Security and Trust in the Italian Legal Digital Signature Framework -- Specifying Legal Risk Scenarios Using the CORAS Threat Modelling Language -- On Deciding to Trust -- Trust Management Survey -- Can We Manage Trust? -- Operational Models for Reputation Servers -- A Representation Model of Trust Relationships with Delegation Extensions -- Affect and Trust -- Reinventing Forgiveness: A Formal Investigation of Moral Facilitation -- Modeling Social and Individual Trust in Requirements Engineering Methodologies -- Towards a Generic Trust Model – Comparison of Various Trust Update Algorithms -- A Probabilistic Trust Model for Handling Inaccurate Reputation Sources -- Trust as a Key to Improving Recommendation Systems -- Alleviating the Sparsity Problem of Collaborative Filtering Using Trust Inferences -- Experience-Based Trust: Enabling Effective Resource Selection in a Grid Environment -- Interactive Credential Negotiation for Stateful Business Processes -- An Evidence Based Architecture for Efficient, Attack-Resistant Computational Trust Dissemination in Peer-to-Peer Networks -- Towards an Evaluation Methodology for Computational Trust Systems -- Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy -- Trust Transfer: Encouraging Self-recommendations Without Sybil Attack -- Privacy-Preserving Search and Updates for Outsourced Tree-Structured Data on Untrusted Servers -- Persistent and Dynamic Trust: Analysis and the Related Impact of Trusted Platforms -- Risk Models for Trust-Based Access Control(TBAC) -- Combining Trust and Risk to Reduce the Cost of Attacks -- IWTrust: Improving User Trust in Answers from the Web -- Trust Record: High-Level Assurance and Compliance -- Implementation of the SECURE Trust Engine -- The CORAS Tool for Security Risk Analysis -- Towards a Grid Platform Enabling Dynamic Virtual Organisations for Business Applications -- Multimedia Copyright Protection Platform Demonstrator -- ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements -- The VoteSecureTM Secure Internet Voting System.
Record Nr. UNISA-996465717303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trust Management [[electronic resource] ] : Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings / / edited by Peter Herrmann, Valerie Issarny, Simon Shiu
Trust Management [[electronic resource] ] : Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings / / edited by Peter Herrmann, Valerie Issarny, Simon Shiu
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 428 p.)
Disciplina 004
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Information storage and retrieval
Computer communication systems
Computers and civilization
Management information systems
Computer science
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Computer Communication Networks
Computers and Society
Management of Computing and Information Systems
ISBN 9783540320401
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Third International Conference on Trust Management -- Foraging for Trust: Exploring Rationality and the Stag Hunt Game -- Trust, Untrust, Distrust and Mistrust – An Exploration of the Dark(er) Side -- Security and Trust in the Italian Legal Digital Signature Framework -- Specifying Legal Risk Scenarios Using the CORAS Threat Modelling Language -- On Deciding to Trust -- Trust Management Survey -- Can We Manage Trust? -- Operational Models for Reputation Servers -- A Representation Model of Trust Relationships with Delegation Extensions -- Affect and Trust -- Reinventing Forgiveness: A Formal Investigation of Moral Facilitation -- Modeling Social and Individual Trust in Requirements Engineering Methodologies -- Towards a Generic Trust Model – Comparison of Various Trust Update Algorithms -- A Probabilistic Trust Model for Handling Inaccurate Reputation Sources -- Trust as a Key to Improving Recommendation Systems -- Alleviating the Sparsity Problem of Collaborative Filtering Using Trust Inferences -- Experience-Based Trust: Enabling Effective Resource Selection in a Grid Environment -- Interactive Credential Negotiation for Stateful Business Processes -- An Evidence Based Architecture for Efficient, Attack-Resistant Computational Trust Dissemination in Peer-to-Peer Networks -- Towards an Evaluation Methodology for Computational Trust Systems -- Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy -- Trust Transfer: Encouraging Self-recommendations Without Sybil Attack -- Privacy-Preserving Search and Updates for Outsourced Tree-Structured Data on Untrusted Servers -- Persistent and Dynamic Trust: Analysis and the Related Impact of Trusted Platforms -- Risk Models for Trust-Based Access Control(TBAC) -- Combining Trust and Risk to Reduce the Cost of Attacks -- IWTrust: Improving User Trust in Answers from the Web -- Trust Record: High-Level Assurance and Compliance -- Implementation of the SECURE Trust Engine -- The CORAS Tool for Security Risk Analysis -- Towards a Grid Platform Enabling Dynamic Virtual Organisations for Business Applications -- Multimedia Copyright Protection Platform Demonstrator -- ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements -- The VoteSecureTM Secure Internet Voting System.
Record Nr. UNINA-9910483188203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trust Management in Cloud Services [[electronic resource] /] / by Talal H. Noor, Quan Z. Sheng, Athman Bouguettaya
Trust Management in Cloud Services [[electronic resource] /] / by Talal H. Noor, Quan Z. Sheng, Athman Bouguettaya
Autore Noor Talal H
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (130 p.)
Disciplina 004
004.6
005.7
005.74
Soggetto topico Application software
Computer communication systems
Management information systems
Computer science
Business
Management science
Information Systems Applications (incl. Internet)
Computer Communication Networks
Management of Computing and Information Systems
Business and Management, general
ISBN 3-319-12250-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Background -- Trust Management and Discovery of Cloud Services -- Robust and Adaptive Credibility Model -- Scalable Availability Model -- Cloud Service Crawler Engine -- Implementation and Performance Study -- Conclusions.
Record Nr. UNINA-9910298979903321
Noor Talal H  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings / / edited by Javier Lopez, Simone Fischer-Hübner, Costas Lambrinoudakis
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings / / edited by Javier Lopez, Simone Fischer-Hübner, Costas Lambrinoudakis
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (X, 247 p. 66 illus.)
Disciplina 658.478
Collana Security and Cryptology
Soggetto topico Computer security
Software engineering
Data encryption (Computer science)
Application software
Management information systems
Computer science
Computer communication systems
Systems and Data Security
Software Engineering
Cryptology
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
Computer Communication Networks
ISBN 3-319-64483-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy in Mobile Environments -- Transparence and Privacy Enhancing Technologies -- Security Measures -- Cloud - IoT Security and Privacy -- Security Awareness and Social Engineering - Policy Languages.
Record Nr. UNINA-9910483288403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings / / edited by Javier Lopez, Simone Fischer-Hübner, Costas Lambrinoudakis
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings / / edited by Javier Lopez, Simone Fischer-Hübner, Costas Lambrinoudakis
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (X, 247 p. 66 illus.)
Disciplina 658.478
Collana Security and Cryptology
Soggetto topico Computer security
Software engineering
Data encryption (Computer science)
Application software
Management information systems
Computer science
Computer communication systems
Systems and Data Security
Software Engineering
Cryptology
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
Computer Communication Networks
ISBN 3-319-64483-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy in Mobile Environments -- Transparence and Privacy Enhancing Technologies -- Security Measures -- Cloud - IoT Security and Privacy -- Security Awareness and Social Engineering - Policy Languages.
Record Nr. UNISA-996466176003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...