Nishigaki, Masakatsu.

Trust Management IV 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010. Proceedings / [electronic resource] : edited by Masakatsu Nishigaki, Audun Jøsang, Yuko Murayama, Stephen Marsh. - XII, 277p. 86 illus. online resource. - IFIP Advances in Information and Communication Technology, 321 1868-4238 ; .

Privacy and Trust -- Schemes for Privately Computing Trust and Reputation -- Self-service Privacy: User-Centric Privacy for Network-Centric Identity -- Naïve Security in a Wi-Fi World -- Security Through Trust -- Securing Class Initialization -- xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement -- Metric Strand Spaces for Locale Authentication Protocols -- Visitor Access Control Scheme Utilizing Social Relationship in the Real World -- Trust Models and Management -- Impact of Trust Management and Information Sharing to Adversarial Cost in Ranking Systems -- Shinren: Non-monotonic Trust Management for Distributed Systems -- Modeling and Analysis of Trust Management Protocols: Altruism versus Selfishness in MANETs -- Trust Models -- Trustworthiness in Networks: A Simulation Approach for Approximating Local Trust and Distrust Values -- Design of Graded Trusts by Using Dynamic Path Validation -- Implementation and Performance Analysis of the Role-Based Trust Management System, RT C -- A Formal Notion of Trust – Enabling Reasoning about Security Properties -- Experimental and Experiential Trust -- Leveraging a Social Network of Trust for Promoting Honesty in E-Marketplaces -- Does Trust Matter for User Preferences? A Study on Epinions Ratings -- Bringing the Virtual to the Farmers’ Market: Designing for Trust in Pervasive Computing Systems -- Incorporating Interdependency of Trust Values in Existing Trust Models for Trust Dynamics.

This book constitutes the refereed proceedings of the 4th IFIP WG 11.11 International Conference, IFIPTM 2010, held in Morioka, Japan, in June 2010. The 18 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on privacy and trust; security through trust; trust models and management; trust models; and experimental and experiential trust.


Computer science.
Computer Communication Networks.
Data encryption (Computer science).
Information systems.
Information Systems.
Computer Science.
Computer Communication Networks.
Data Encryption.
Management of Computing and Information Systems.
Computers and Society.
Information Systems Applications (incl.Internet).
User Interfaces and Human Computer Interaction.