000916135 000__ 04941cam\a2200577Ii\4500 000916135 001__ 916135 000916135 005__ 20230306150525.0 000916135 006__ m\\\\\o\\d\\\\\\\\ 000916135 007__ cr\cn\nnnunnun 000916135 008__ 191031s2019\\\\sz\a\\\\o\\\\\101\0\eng\d 000916135 019__ $$a1125986135$$a1126611642 000916135 020__ $$a9783030337162$$q(electronic book) 000916135 020__ $$a3030337162$$q(electronic book) 000916135 020__ $$z9783030337155 000916135 0247_ $$a10.1007/978-3-030-33716-2$$2doi 000916135 0247_ $$a10.1007/978-3-030-33 000916135 035__ $$aSP(OCoLC)on1125947681 000916135 035__ $$aSP(OCoLC)1125947681$$z(OCoLC)1125986135$$z(OCoLC)1126611642 000916135 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP$$dLQU$$dUKMGB$$dDKU 000916135 049__ $$aISEA 000916135 050_4 $$aQA76.9.A25$$bT78 2019eb 000916135 08204 $$a004$$223 000916135 1112_ $$aIFIPTM (Conference)$$n(13th :$$d2019 :$$cCopenhagen, Denmark) 000916135 24510 $$aTrust management XIII :$$b13th IFIP WG 11.11 International Conference, IFIPTM 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings /$$cWeizhi Meng, Piotr Cofta, Christian Damsgaard Jensen, Tyrone Grandison (eds.). 000916135 2463_ $$aTrust management 13 000916135 2463_ $$aIFIPTM 2019 000916135 264_1 $$aCham, Switzerland :$$bSpringer,$$c2019. 000916135 300__ $$a1 online resource (x, 225 pages) :$$billustrations. 000916135 336__ $$atext$$btxt$$2rdacontent 000916135 337__ $$acomputer$$bc$$2rdamedia 000916135 338__ $$aonline resource$$bcr$$2rdacarrier 000916135 4901_ $$aIFIP Advances in Information and Communication Technology,$$x1868-4238 ;$$v563 000916135 500__ $$aInternational conference proceedings. 000916135 500__ $$aIncludes author index. 000916135 50580 $$tGDPR modelling for log-based compliance checking /$$rColombe de Montety, Thibaud Antignac, and Christophe Slim --$$tA role and trust access control model for preserving privacy and image anonymization in social networks /$$rNadav Voloch, Priel Nissim, Mor Elmakies, and Ehud Gudes --$$tWhy we trust dynamic consent to delivery on privacy /$$rArianna Schuler Scott, Michael Goldsmith, Harriet Teare, Helena Webb, and Sadie Creese --$$tThe reputation lag attack /$$rSean Sirur and Tim Muller --$$tAn unforeseen equivalence between uncertainty and entropy /$$rTim Muller --$$tUser recognition based on daily actigraphy patterns /$$rEnrique Garcia-Ceja and Brice Morin --$$tValue-based core areas of trustworthiness in online services /$$rDanny S. Guamán, Jose M. del Alamo, Hristina Veljanova, Stefan Reichmann, and Anna Haselbacher --$$tTrusting the IoT : there is more to trust than trustworthiness /$$rPiotr Cofta --$$tA granular approach to source trustworthiness for negative trust assessment /$$rDavide Ceolin and Giuseppe Primiero --$$tA fair (t, n)-threshold secret sharing scheme with efficient cheater identifying /$$rHua Shen, Daijie Sun, Lan Zhao, and Mingwu Zhang --$$temmy : trust-enhancing authentication library /$$rMiha Stopar, Manca Bizjak, Jolanda Modic, Jan Hartman, Anže Žitnik, and Tilen Marc --$$tCrowdLED : towards crowd-empowered and privacy-preserving data sharing using smart contracts /$$rConstantinos Pouyioukka, Thanassis Giannetsos, and Weizhi Meng 000916135 50580 $$tSDKSE-KGA : a secure dynamic keyword searchable encryption scheme against keyword guessing attacks /$$rHongyuan Chen, Zhenfu Cao, Xiaolei Dong, and Jiachen Shen --$$tOn trust confusional, trust ignorant, and trust transitions /$$rYoshinobu Kawabe, Yuki Koizumi, Tetsushi Ohki, Masakatsu Nishigaki, Toru Hasegawa, and Tetsuhisa Oda --$$tA framework for blockchain-based verification of integrity and authenticity /$$rAnirban Basu, Theo Dimitrakos, Yuto Nakano, and Shinsaku Kiyomoto --$$tTPL : a trust policy language /$$rSebastian Mödersheim, Anders Schlichtkrull, Georg Wagner, Stefan More, and Lukas Alber. 000916135 506__ $$aAccess limited to authorized users. 000916135 520__ $$aThis book constitutes the refereed proceedings of the 13th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2019, held in Copenhagen, Denmark, in July 2019. The 7 revised full papers, 3 short papers, and 6 work-in-progress papers presented were carefully reviewed and selected from 32 submissions. The papers cover a broad range of topics related to trust, security and privacy and focus on trust in information technology and identity management, socio-technical and sociological trust, and emerging technology for trust. 000916135 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed October 31, 2019). 000916135 650_0 $$aComputer security$$vCongresses. 000916135 650_0 $$aData encryption (Computer science)$$vCongresses. 000916135 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000916135 7001_ $$aMeng, Weizhi,$$d1986-$$eeditor. 000916135 7001_ $$aCofta, Piotr,$$eeditor. 000916135 7001_ $$aJensen, Christian D.,$$eeditor. 000916135 7001_ $$aGrandison, Tyrone,$$eeditor. 000916135 830_0 $$aIFIP advances in information and communication technology ;$$v563. 000916135 852__ $$bebk 000916135 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-33716-2$$zOnline Access$$91397441.1 000916135 909CO $$ooai:library.usi.edu:916135$$pGLOBAL_SET 000916135 980__ $$aEBOOK 000916135 980__ $$aBIB 000916135 982__ $$aEbook 000916135 983__ $$aOnline 000916135 994__ $$a92$$bISE