Trust Management II: Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, NorwayYücel Karabulut, John C. Mitchell, Peter Herrmann, Christian Damsgaard Jensen Springer Science & Business Media, 2008 M06 6 - 372 pages This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re levant problems from both research and practice in the areas of academia, busi ness, and government. IFIPTM 2008 is an open IFIP conference, which only accepts contributed pa pers, so all papers in these proceedings have passed strict peer review. The pro gram of the conference features both theoretical research papers and reports of real world case studies. IFIPTM 2008 received 62 submissions. The program commit tee selected 22 papers for presentation and inclusion in the proceedings. In addi tion, the program and the proceedings include 3 demo descriptions. The highlights of IFIPTM 2008 include invited talks and tutorials by industri al and academic experts in the fields of trust management, privacy and security, including Jon Bing and Michael Steiner. |
Contents
Full Papers | 1 |
A Trust Evaluation Method Based on Logic and Probability Theory | 17 |
A UMLbased Method for the Development of Policies to Support | 33 |
Analyzing the Robustness of CertainTrust Sebastian Ries Andreas Heinemann | 51 |
An Intensional Functional Model of Trust | 68 |
A Translation Mechanism for Recommendations | 87 |
Modeling Trust for Recommender Systems using Similarity Metrics | 103 |
TrustBased Collaborative Filtering | 119 |
Cooperation in Growing Communities | 198 |
A Model for Reasoning About the Privacy Impact of Composite Service | 215 |
Protecting Location Privacy through Semanticsaware Obfuscation | 231 |
Towards Collaborative DataPrivacy Protection | 247 |
Automatic Verification of Privacy Properties in the Applied pi Calculus | 263 |
Place and Time Authentication of Cultural Assets | 279 |
A Lightweight Binary Authentication System for Windows | 295 |
Towards StandardsCompliant Trust Negotiation for Web Services | 311 |
Social Filtering for Robust Recommendations | 135 |
Continuous Ratings in Discrete Bayesian Reputation Systems | 151 |
A Robust and KnotAware TrustBased Reputation Model | 167 |
A Case Study in Modelling Trust | 183 |
Assigning Responsibility for Failed Obligations | 327 |
Role and RelationshipBased Identity Management for Private | 343 |
Demonstration Overviews | 359 |
Other editions - View all
Common terms and phrases
access control agents algorithm Alice application approach assigned attack authentication behavior binary buyer certificate collaborative filtering component Computer context credential cultural asset dataset defined described Dirichlet distribution disclosed distributed domain element evaluation example executable feedback filtering folksonomy framework function Fuzzy Fuzzy Cognitive Maps identify IEEE interactions issuer judgements knot malicious method MovieLens nodes obfuscated obligations paper parameter participants payoff Peter Herrmann physical entity predictions privacy impact protocol query ratings recommender systems relationship relationship-based identity represented reputation score reputation systems requires RFID role scenario security token sensitivity signature similarity social specific Standard TuLiP strategy strong phase tion transactions Trust Management trust metric trust model trust negotiation trust value trustworthiness user’s vector verified web of trust web services weight workflow WS-SecurityPolicy WS-Trust