000762704 000__ 04496cam\a2200541Ii\4500 000762704 001__ 762704 000762704 005__ 20230306142235.0 000762704 006__ m\\\\\o\\d\\\\\\\\ 000762704 007__ cr\cn\nnnunnun 000762704 008__ 150508s2015\\\\sz\a\\\\o\\\\\101\0\eng\d 000762704 020__ $$a9783319184913$$q(electronic book) 000762704 020__ $$a3319184911$$q(electronic book) 000762704 020__ $$z9783319184906 000762704 0247_ $$a10.1007/978-3-319-18491-3$$2doi 000762704 035__ $$aSP(OCoLC)ocn908634654 000762704 035__ $$aSP(OCoLC)908634654 000762704 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDXCP$$dCOO$$dCDX$$dUWO$$dVLB$$dOCLCF$$dOCLCO$$dOHI$$dOCLCO$$dOCLCQ$$dOCLCO$$dGW5XE$$dIAO$$dIAS$$dIAD$$dJBG 000762704 049__ $$aISEA 000762704 050_4 $$aQA76.9.A25$$bT78 2015eb 000762704 08204 $$a005.8$$223 000762704 1112_ $$aIFIPTM (Conference)$$n(9th :$$d2015 :$$cHamburg, Germany) 000762704 24510 $$aTrust management IX :$$b9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings /$$cChristian Damsgaard Jensen, Stephen Marsh, Theo Dimitrakos, Yuko Murayama (eds.). 000762704 2463_ $$aTrust management 9 000762704 2463_ $$aIFIPTM 2015 000762704 264_1 $$aCham :$$bSpringer,$$c2015. 000762704 300__ $$a1 online resource (xii, 277 pages) :$$billustrations. 000762704 336__ $$atext$$btxt$$2rdacontent 000762704 337__ $$acomputer$$bc$$2rdamedia 000762704 338__ $$aonline resource$$bcr$$2rdacarrier 000762704 4901_ $$aIFIP advances in information and communication technology,$$x1868-4238 ;$$v454 000762704 500__ $$aIncludes author index. 000762704 5050_ $$aReputation -- from Social Perception to Internet Security -- Mathematical Modelling of Trust Issues in Federated Identity Management -- Simple and Practical Integrity Models for Binaries and Files -- Enabling NAME-Based Security and Trust -- Trust Driven Strategies for Privacy by Design -- Lightweight Practical Private One-Way Anonymous Messaging -- Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings -- Obscuring Provenance Confidential Information via Graph Transformation -- Social Network Culture Needs the Lens of Critical Trust Research -- Predicting Quality of Crowd sourced Annotations Using Graph Kernels -- An Architecture for Trustworthy Open Data Services -- 1,2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space -- Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation -- The Detail of Trusted Messages: Retweets in a Context of Health and Fitness -- Reusable Defense Components for Online Reputation Systems -- Continuous Context-Aware Device Comfort Evaluation Method -- Special Session: Toward Trusted Cloud Ecosystems -- Foreword: Towards Trusted Cloud Ecosystems -- A Cloud Orchestrator for Deploying Public Services on the Cloud {u2013} The Case of STRATEGIC Project -- Integrating Security Services in Cloud Service Stores -- Building an Eco-System of Trusted Services via User Control and Transparency on Personal Data -- Security-as-a-Service in Multi-cloud and Federated Cloud Environments -- The Role of SLAs in Building a Trusted Cloud for Europe. 000762704 506__ $$aAccess limited to authorized users. 000762704 520__ $$aThis book constitutes the refereed proceedings of the 9th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2015, held in Hamburg, Germany, in May 2015. The 10 revised full papers and 5 short papers presented were carefully reviewed and selected from 28 submissions. In addition, the book contains one invited paper and 5 papers from a special session on trusted cloud ecosystems. The papers cover a wide range of topics including trust and reputation and models thereof, the relationship between trust and security, socio-technical aspects of trust, reputation and privacy, trust in the cloud and behavioural models of trust. 000762704 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed May 8, 2015). 000762704 650_0 $$aComputer security$$vCongresses. 000762704 650_0 $$aData encryption (Computer science)$$vCongresses. 000762704 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000762704 7001_ $$aJensen, Christian D.,$$eeditor. 000762704 7001_ $$aMarsh, Stephen,$$eeditor. 000762704 7001_ $$aDimitrakos, Theo,$$eeditor. 000762704 7001_ $$aMurayama, Yuko,$$eeditor. 000762704 77608 $$iPrint version:$$z9783319184906 000762704 830_0 $$aIFIP advances in information and communication technology ;$$v454. 000762704 852__ $$bebk 000762704 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-18491-3$$zOnline Access$$91397441.1 000762704 909CO $$ooai:library.usi.edu:762704$$pGLOBAL_SET 000762704 980__ $$aEBOOK 000762704 980__ $$aBIB 000762704 982__ $$aEbook 000762704 983__ $$aOnline 000762704 994__ $$a92$$bISE