Trust management IX : 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings /: 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. (2015)
- Record Type:
- Book
- Title:
- Trust management IX : 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings /: 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. (2015)
- Main Title:
- Trust management IX : 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings
- Other Titles:
- Trust management 9
IFIPTM 2015 - Further Information:
- Note: Christian Damsgaard Jensen, Stephen Marsh, Theo Dimitrakos, Yuko Murayama (eds.).
- Editors:
- Jensen, Christian D
Marsh, Stephen
Dimitrakos, Theo
Murayama, Yuko - Other Names:
- IFIPTM (Conference), 9th
- Contents:
- Reputation -- from Social Perception to Internet Security -- Mathematical Modelling of Trust Issues in Federated Identity Management -- Simple and Practical Integrity Models for Binaries and Files -- Enabling NAME-Based Security and Trust -- Trust Driven Strategies for Privacy by Design -- Lightweight Practical Private One-Way Anonymous Messaging -- Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings -- Obscuring Provenance Confidential Information via Graph Transformation -- Social Network Culture Needs the Lens of Critical Trust Research -- Predicting Quality of Crowd sourced Annotations Using Graph Kernels -- An Architecture for Trustworthy Open Data Services -- 1, 2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space -- Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation -- The Detail of Trusted Messages: Retweets in a Context of Health and Fitness -- Reusable Defense Components for Online Reputation Systems -- Continuous Context-Aware Device Comfort Evaluation Method -- Special Session: Toward Trusted Cloud Ecosystems -- Foreword: Towards Trusted Cloud Ecosystems -- A Cloud Orchestrator for Deploying Public Services on the Cloud -- The Case of STRATEGIC Project -- Integrating Security Services in Cloud Service Stores -- Building an Eco-System of Trusted Services via User Control and Transparency on Personal Data -- Security-as-a-ServiceReputation -- from Social Perception to Internet Security -- Mathematical Modelling of Trust Issues in Federated Identity Management -- Simple and Practical Integrity Models for Binaries and Files -- Enabling NAME-Based Security and Trust -- Trust Driven Strategies for Privacy by Design -- Lightweight Practical Private One-Way Anonymous Messaging -- Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings -- Obscuring Provenance Confidential Information via Graph Transformation -- Social Network Culture Needs the Lens of Critical Trust Research -- Predicting Quality of Crowd sourced Annotations Using Graph Kernels -- An Architecture for Trustworthy Open Data Services -- 1, 2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space -- Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation -- The Detail of Trusted Messages: Retweets in a Context of Health and Fitness -- Reusable Defense Components for Online Reputation Systems -- Continuous Context-Aware Device Comfort Evaluation Method -- Special Session: Toward Trusted Cloud Ecosystems -- Foreword: Towards Trusted Cloud Ecosystems -- A Cloud Orchestrator for Deploying Public Services on the Cloud -- The Case of STRATEGIC Project -- Integrating Security Services in Cloud Service Stores -- Building an Eco-System of Trusted Services via User Control and Transparency on Personal Data -- Security-as-a-Service in Multi-cloud and Federated Cloud Environments -- The Role of SLAs in Building a Trusted Cloud for Europe. … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2015
- Extent:
- 1 online resource (xii, 277 pages), illustrations
- Subjects:
- 005.8
Computer science
Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Computer networks -- Security measures -- Congresses
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Engineering & Applied Sciences
Computer Science
Computers -- Security -- General
Computers -- Online Services -- General
Computer security
Computer networking & communications
Computer security
Information systems
Computers -- Social Aspects -- General
Ethical & social aspects of IT
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319184913
3319184911 - Related ISBNs:
- 3319184903
9783319184906
9783319184906 - Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed May 8, 2015).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.361779
- Ingest File:
- 01_325.xml