IFIP TC6 Open Digital Library

1. IFIPTM 2007: New Brunswick, Canada

Trust Management - Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30- August 2, 2007, New Brunswick, Canada

Sandro Etalle, Stephen Marsh

Springer, IFIP 238, ISBN: 978-0-387-73654-9



Contents

Private Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust.

Danfeng Yao, Roberto Tamassia, Seth Proctor

 1-16

Trust Transfer in Distributed Systems.

Changyu Dong, Giovanni Russello, Naranker Dulay

 17-29

Trust without Truth.

Michel Deriaz

 31-45

Mining and Detecting Connection-Chains in Network Traffic.

Ahmad Almulhem, Issa Traoré

 47-57

A Privacy-Aware Service Discovery Middleware for Pervasive Environments.

Roberto Speicys Cardoso, Pierre-Guillaume Raverdy, Valérie Issarny

 59-74

Analysis of the implicit trust within the OLSR protocol.

Asmaa Adnane, Rafael Timóteo de Sousa Júnior, Christophe Bidan, Ludovic Mé

 75-90

Validating a Trust-based Access Control System.

William Joseph Adams, Nathaniel J. Davis IV

 91-106

Negotiation for Authorisation in Virtual Organisations.

Shamimabi Paurobally

 107-122

A Geo Time Authentication System.

Leonardo Mostarda, Arianna Tocchio, Paola Inverardi, Stefania Costantini

 123-138

Content Trust Model for Detecting Web Spam.

Wei Wang 0033, Guosun Zeng

 139-152

Applied Computational Trust in Utilities Management: a Case Study on The Town Council of Cava de' Tirreni.

Pierpaolo Dondio, Edmondo Manzo, Stephen Barrett

 153-168

A trust protocol for community collaboration.

Samuel Galice, Marine Minier, Stéphane Ubéda

 169-184

Towards an Understanding of Security, Privacy and Safety in Maritime Self-Reporting Systems.

Mark McIntyre, Lynne Genik, Peter Mason, Tim Hammond

 185-206

Dismantling the Twelve Privacy Purposes.

Sabah Al-Fedaghi

 207-222

A Framework for Privacy-Preserving E-learning.

Esma Aïmeur, Hicham Hage, Flavien Serge Mani Onana

 223-238

Exploiting Trust and Suspicion for Real-time Attack Recognition in Recommender Applications.

Ebrahim Bagheri, Ali A. Ghorbani

 239-254

Self-Selection Bias in Reputation Systems.

Mark A. Kramer

 255-268

Resisting Sybils in Peer-to-peer Markets.

Jonathan Traupman

 269-284

A Trust Model for an Open, Decentralized Reputation System.

Andreas Gutscher

 285-300

Control Flow Based Pointcuts for Security Hardening Concerns.

Marc-André Laverdière, Azzam Mourad, Andrei Soeanu, Mourad Debbabi

 301-316

Design of Trusted Systems with Reusable Collaboration Models.

Peter Herrmann, Frank Alexander Kraemer

 317-332

MUQAMI: A Locally Distributed Key Management Scheme for Clustered Sensor Networks.

Syed Muhammad Khaliq-ur-Rahman Raazi, Adil Mehmood Khan, Faraz Idris Khan, Sungyoung Lee, Young Jae Song, Young-Koo Lee

 333-348

Trust based Approach for Improving Data Reliability in Industrial Sensor Networks.

Tatyana Ryutov, B. Clifford Neuman

 349-365

The AI Hardness of CAPTCHAs does not imply Robust Network Security.

Allan Caine, Urs Hengartner

 367-382

Resilia: a Safe and Secure Distributed Backup System for Small and Medium Enterprises.

Christian Damsgaard Jensen, Fernando Meira, Jacob Nittegaard-Nielsen

 383-398

Integrity in Open Collaborative Authoring Systems.

Christian Damsgaard Jensen

 399-402

Service-Oriented Approach to Visualize IT Security Performance Metrics.

Clemens Martin, Mustapha Refai

 403-406

From Early Requirements Analysis towards Secure Workflows.

Ganna Frankova, Fabio Massacci, Magali Seguran

 407-410

Monitors for Usage Control.

Manuel Hilty, Alexander Pretschner, David A. Basin, Christian Schaefer, Thomas Walter

 411-414

Design of Trusted Systems with Reusable Collaboration Models.

Peter Herrmann, Frank Alexander Kraemer

 417