Trust Management II: Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway

Front Cover
Yücel Karabulut, John C. Mitchell, Peter Herrmann, Christian Damsgaard Jensen
Springer Science & Business Media, 2008 M06 6 - 372 pages
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re levant problems from both research and practice in the areas of academia, busi ness, and government. IFIPTM 2008 is an open IFIP conference, which only accepts contributed pa pers, so all papers in these proceedings have passed strict peer review. The pro gram of the conference features both theoretical research papers and reports of real world case studies. IFIPTM 2008 received 62 submissions. The program commit tee selected 22 papers for presentation and inclusion in the proceedings. In addi tion, the program and the proceedings include 3 demo descriptions. The highlights of IFIPTM 2008 include invited talks and tutorials by industri al and academic experts in the fields of trust management, privacy and security, including Jon Bing and Michael Steiner.
 

Contents

Full Papers
1
A Trust Evaluation Method Based on Logic and Probability Theory
17
A UMLbased Method for the Development of Policies to Support
33
Analyzing the Robustness of CertainTrust Sebastian Ries Andreas Heinemann
51
An Intensional Functional Model of Trust
68
A Translation Mechanism for Recommendations
87
Modeling Trust for Recommender Systems using Similarity Metrics
103
TrustBased Collaborative Filtering
119
Cooperation in Growing Communities
198
A Model for Reasoning About the Privacy Impact of Composite Service
215
Protecting Location Privacy through Semanticsaware Obfuscation
231
Towards Collaborative DataPrivacy Protection
247
Automatic Verification of Privacy Properties in the Applied pi Calculus
263
Place and Time Authentication of Cultural Assets
279
A Lightweight Binary Authentication System for Windows
295
Towards StandardsCompliant Trust Negotiation for Web Services
311

Social Filtering for Robust Recommendations
135
Continuous Ratings in Discrete Bayesian Reputation Systems
151
A Robust and KnotAware TrustBased Reputation Model
167
A Case Study in Modelling Trust
183
Assigning Responsibility for Failed Obligations
327
Role and RelationshipBased Identity Management for Private
343
Demonstration Overviews
359
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information