Browse Results

Showing 80,601 through 80,625 of 85,149 results

Trust in Computer Systems and the Cloud

by Mike Bursell

Learn to analyze and measure risk by exploring the nature of trust and its application to cybersecurity Trust in Computer Systems and the Cloud delivers an insightful and practical new take on what it means to trust in the context of computer and network security and the impact on the emerging field of Confidential Computing. Author Mike Bursell’s experience, ranging from Chief Security Architect at Red Hat to CEO at a Confidential Computing start-up grounds the reader in fundamental concepts of trust and related ideas before discussing the more sophisticated applications of these concepts to various areas in computing. The book demonstrates in the importance of understanding and quantifying risk and draws on the social and computer sciences to explain hardware and software security, complex systems, and open source communities. It takes a detailed look at the impact of Confidential Computing on security, trust and risk and also describes the emerging concept of trust domains, which provide an alternative to standard layered security. Foundational definitions of trust from sociology and other social sciences, how they evolved, and what modern concepts of trust mean to computer professionals A comprehensive examination of the importance of systems, from open-source communities to HSMs, TPMs, and Confidential Computing with TEEs. A thorough exploration of trust domains, including explorations of communities of practice, the centralization of control and policies, and monitoring Perfect for security architects at the CISSP level or higher, Trust in Computer Systems and the Cloud is also an indispensable addition to the libraries of system architects, security system engineers, and master’s students in software architecture and security.

Trust in Computer Systems and the Cloud

by Mike Bursell

Learn to analyze and measure risk by exploring the nature of trust and its application to cybersecurity Trust in Computer Systems and the Cloud delivers an insightful and practical new take on what it means to trust in the context of computer and network security and the impact on the emerging field of Confidential Computing. Author Mike Bursell’s experience, ranging from Chief Security Architect at Red Hat to CEO at a Confidential Computing start-up grounds the reader in fundamental concepts of trust and related ideas before discussing the more sophisticated applications of these concepts to various areas in computing. The book demonstrates in the importance of understanding and quantifying risk and draws on the social and computer sciences to explain hardware and software security, complex systems, and open source communities. It takes a detailed look at the impact of Confidential Computing on security, trust and risk and also describes the emerging concept of trust domains, which provide an alternative to standard layered security. Foundational definitions of trust from sociology and other social sciences, how they evolved, and what modern concepts of trust mean to computer professionals A comprehensive examination of the importance of systems, from open-source communities to HSMs, TPMs, and Confidential Computing with TEEs. A thorough exploration of trust domains, including explorations of communities of practice, the centralization of control and policies, and monitoring Perfect for security architects at the CISSP level or higher, Trust in Computer Systems and the Cloud is also an indispensable addition to the libraries of system architects, security system engineers, and master’s students in software architecture and security.

Trust in Cyber-societies: Integrating the Human and Artificial Perspectives (Lecture Notes in Computer Science #2246)

by Rino Falcone Munindar Singh Yao-Hua Tan

This book is the result of the workshop “Deception, Fraud, and Trust in Agent Societies”, held in Barcelona on June 4, 2000 as part of the Autonomous Agents 2000 Conference, and organized by Rino Falcone, Munindar Singh, and Yao-Hua Tan. The aim of the workshop was to bring together researchers from di?- ent ?elds (Arti?cial Intelligence, Multi-Agent Systems, Cognitive Science, Game Theory, and Social and Organizational Sciences) that could contribute to a b- ter understanding of trust and deception in agent societies. The workshop scope included theoretical results as well as their applications in human-computer - teraction and electronic commerce. This book includes the revised and extended versions of the works presented at the workshop, incorporating many points that emerged in our discussions, as well as invited papers from experts in the ?eld, which in our view allows a complete coverage of all relevant issues. We gratefully acknowledge the ?nancial support from the Italian National Research Council - Institute for Cognitive S- ence and Technology and the ALFEBIITE European Project, contract number IST-1999-10298. We would like to express our gratitude to Cristiano Castelfranchi for his stimulating and valuable comments and suggestions both for the organization of the workshop and for the preparation of this book.

Trust in Social Media (Synthesis Lectures on Information Security, Privacy, and Trust)

by Jiliang Tang Huan Liu

Social media greatly enables people to participate in online activities and shatters the barrier for online users to create and share information at any place at any time. However, the explosion of user-generated content poses novel challenges for online users to find relevant information, or, in other words, exacerbates the information overload problem. On the other hand, the quality of user-generated content can vary dramatically from excellence to abuse or spam, resulting in a problem of information credibility. The study and understanding of trust can lead to an effective approach to addressing both information overload and credibility problems. Trust refers to a relationship between a trustor (the subject that trusts a target entity) and a trustee (the entity that is trusted). In the context of social media, trust provides evidence about with whom we can trust to share information and from whom we can accept information without additional verification. With trust, we make the mental shortcut by directly seeking information from trustees or trusted entities, which serves a two-fold purpose: without being overwhelmed by excessive information (i.e., mitigated information overload) and with credible information due to the trust placed on the information provider (i.e., increased information credibility). Therefore, trust is crucial in helping social media users collect relevant and reliable information, and trust in social media is a research topic of increasing importance and of practical significance. This book takes a computational perspective to offer an overview of characteristics and elements of trust and illuminate a wide range of computational tasks of trust. It introduces basic concepts, deliberates challenges and opportunities, reviews state-of-the-art algorithms, and elaborates effective evaluation methods in the trust study. In particular, we illustrate properties and representation models of trust, elucidate trust prediction with representative algorithms, and demonstrate real-world applications where trust is explicitly used. As a new dimension of the trust study, we discuss the concept of distrust and its roles in trust computing.

Trust in Technology: A Socio-Technical Perspective (Computer Supported Cooperative Work #36)

by Karen Clarke Gillian Hardstone Mark Rouncefield Ian Sommerville

Computer systems can only deliver benefits if functionality, users and usability are central to their design and deployment. This book encapsulates work done in the DIRC project (Interdisciplinary Research Collaboration in Dependability), bringing together a range of disciplinary approaches - computer science, sociology and software engineering - to produce a socio-technical systems perspective on the issues surrounding trust in technology in complex settings.

Trust in the Network Economy (Evolaris #2)


A lack of trust in online-transactions has been described as one of the most important obstacles for the development of e-business. Despite numerous activities in the fields of law and security, users have not yet gained the trust necessary for conducting e-business. This requires a new approach which is able to explain the importance and function of trust in the digital world. This book presents a new model of digital trust that is complemented by articles on law, security, business models and trust building signals. The book is published in a mixed German/English edition and is the first international reader covering trust and e-business from a multi-disciplinary approach.

Trust Management: Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, New Brunswick, Canada (IFIP Advances in Information and Communication Technology #238)

by Sandro Etalle Stephen Marsh

This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Moncton, New Brunswick, Canada, in 2007. The annual iTrust international conference looks at trust from multidisciplinary perspectives: economic, legal, psychology, philosophy, sociology as well as information technology. This volume, therefore, presents the most up-to-date research on privacy, security, and trust management.

Trust Management: Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings (Lecture Notes in Computer Science #3477)

by Peter Herrmann Valerie Issarny Simon Shiu

This volume constitutes the proceedings of the 3rd International Conference on Trust Management, held in Paris, France, during 23–26 May 2005. The conf- ence follows successful International Conferences in Crete in 2003 and Oxford in 2004. All conferences were organized by iTrust, which is a working group funded as a thematic network by the Future and Emerging Technologies (FET) unit of the Information Society Technologies (IST) program of the European Union. The purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of trust as a means of increasing security, building con?dence and facilitating collaboration in dynamic open s- tems. The notion of trust has been studied independently by di?erent academic disciplines, which has helped us to identify and understand di?erent aspects of trust. Theaimofthisconferencewastoprovideacommonforum,bringingtogether researchers from di?erent academic branches, such as the technology-oriented disciplines, law, social sciences and philosophy, in order to develop a deeper and more fundamental understanding of the issues and challenges in the area of trust management in dynamic open systems. The response to this conference was excellent; from the 71 papers submitted to the conference, we selected 21 full papers and 4 short papers for presentation. The program also included two keynote addresses, given by Steve Marsh from National Research Centre Canada, Institute for Information Technology, and Steve Kimbrough from the University of Pennsylvania; an industrial panel; 7 technology demonstrations; and a full day of tutorials.

Trust Management: First International Conference, iTrust 2003, Heraklion, Crete, Greece, May 28-30, 2002, Proceedings (Lecture Notes in Computer Science #2692)

by Paddy Nixon Sotirios Terzis

iTrust is an Information Society Technologies (IST) working group, which started on 1st of August, 2002. The working group is being funded as a concerted action/ thematic network by the Future and Emerging Technologies (FET) unit of the IST program. The aim of iTrust is to provide a forum for cross-disciplinary investigation of the application of trust as a means of establishing security and con?dence in the global computing infrastructure, recognizing trust as a crucial enabler for meaningful and mutually bene?cial interactions. The proposed forum is intended to bring together researchers with a keen interest in complementary aspects of trust, from technology-oriented disciplines and the ?elds of law, social sciences, and philosophy. Hence providing the c- sortium participants (and the research communities associated with them) with the common background necessary for advancing toward an in-depth underst- ding of the fundamental issues and challenges in the area of trust management in open systems. Broadly the initiative aims to: – facilitate the cross-disciplinary investigation of fundamental issues underp- ning computational trust models by bringing together expertise from te- nology oriented sciences, law, philosophy, and social sciences – facilitate the emergence of widely acceptable trust management processes for dynamic open systems and applications – facilitate the development of new paradigms in the area of dynamic open systems which e?ectively utilize computational trust models – help the incorporation of trust management elements in existing standards.

Trust Management: 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings (Lecture Notes in Computer Science #3986)

by William H. Winsborough Fabio Martinelli Fabio Massacci Ketil Stølen

This book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised full papers and 4 revised short papers are presented together with 1 keynote paper and 7 trust management tool and systems demonstration reports. Besides technical issues in distributed computing and open systems, topics from law, social sciences, business, and philosophy are addressed.

Trust Management for Service-Oriented Environments

by Zaki Malik Athman Bouguettaya

Web services and service oriented environments are key enablers for the migration of entertainment, business, sociability, science and health-care from the physical world to the virtual world. The result of this on-going migration is a new place very much different from the physical world, one where interconnected services interact with human users, sensors and embedded devices. Yet for this vision to become reality, trust needs to be addressed as members of the global e-society r- ularly today deal with the question whether they can trust other, unknown parties. Trust is a vital component of internet-based interactions and service-oriented en- ronment, but all too often it is assumed to be an implicit property that exists in the background rather than being an explicit property that is well-de ned and quant- able. While providing trust is challenging in existing computing systems, providing trust in service oriented environments is much more complex due to the dynamic and adaptable nature of these environment which are often large scale and across domains. To date the problem of trust for service oriented environments has been largely unexplored. This book represents the rst comprehensivecoverageof the principles,methods and systems for trust management and evaluation in service oriented environments.

Trust Management II: Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway (IFIP Advances in Information and Communication Technology #263)

by Yücel Karabulut John C. Mitchell Peter Herrmann Christian Damsgaard Jensen

This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re levant problems from both research and practice in the areas of academia, busi ness, and government. IFIPTM 2008 is an open IFIP conference, which only accepts contributed pa pers, so all papers in these proceedings have passed strict peer review. The pro gram of the conference features both theoretical research papers and reports of real world case studies. IFIPTM 2008 received 62 submissions. The program commit tee selected 22 papers for presentation and inclusion in the proceedings. In addi tion, the program and the proceedings include 3 demo descriptions. The highlights of IFIPTM 2008 include invited talks and tutorials by industri al and academic experts in the fields of trust management, privacy and security, including Jon Bing and Michael Steiner.

Trust Management III: Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009, Proceedings (IFIP Advances in Information and Communication Technology #300)

by Ninghui Li Elisa Bertino Yücel Karabulut Elena Ferrari

This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, IFIPTM 2009, held in West Lafayette, IN, USA, in June 2009. The 17 revised full papers presented together with one invited paper and 5 demo descriptions were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on social aspects and usability, trust reasoning and processing, data security, enhancements to subjective logic, information sharing, risk assessment, and simulation of trust and reputation systems.

Trust Management in Cloud Services

by Talal H. Noor Quan Z. Sheng Athman Bouguettaya

This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust in cloud computing and the best criteria for selecting a service cloud. The techniques have been validated by a prototype system implementation and experimental studies using a collection of real world trust feedbacks on cloud services. The authors present the design and implementation of a novel protocol that preserves the consumers’ privacy, an adaptive and robust credibility model, a scalable availability model that relies on a decentralized architecture, and a cloud service crawler engine for automatic cloud services discovery. This book also analyzes results from a performance study on a number of open research issues for trust management in cloud environments including distribution of providers, geographic location and languages. These open research issues illustrate both an overview of the current state of cloud computing and potential future directions for the field. Trust Management in Cloud Services contains both theoretical and applied computing research, making it an ideal reference or secondary text book to both academic and industry professionals interested in cloud services. Advanced-level students in computer science and electrical engineering will also find the content valuable.

Trust Management in the Chinese E-Commerce Market: Based on the Perspective of the Adverse Selection (Advanced Studies in E-Commerce)

by Yong Pan

Based on the classic adverse selection model, this book sets up the cyber “lemons” market model and analyzes the basic rule of asymmetric information. This book focuses on the topics as following: Is there “lemons” in e-commerce market? What rule do the cyber “lemons” characterize? How to build the cyber “lemon” market model? What is the particularity of adverse selection in cyber markets? What is more, how to eliminate or avoid the cyber “lemons” in Chinse e-commerce market?This book aims to provide the accumulation for e-commerce research and support decision-making for management in Chinese e-commerce markets, and suggests trust management solutions to eliminate or decrease the cyber ‘lemons’. Through this book, it helps readers understand the ideas and effective methods of trust management in the Chinse e-commerce market, while deepening the reverse selection model and theory.

Trust Management in the Internet of Vehicles

by Adnan Mahmood Michael Sheng Wei Emma Zhang Sira Yongchareon

The Internet of Vehicles (IoV) is referred to as an efficient and inevitable convergence of the Internet of Things, intelligent transportation systems, edge / fog and cloud computing, and big data, all of which could be intelligently harvested for the cooperative vehicular safety and non-safety applications as well as cooperative mobility management. A secure and low-latency communication is, therefore, indispensable to meet the stringent performance requirements of the safety-critical vehicular applications. Whilst the challenges surrounding low latency are being addressed by the researchers in both academia and industry, it is the security of an IoV network which is of paramount importance, as a single malicious message is perfectly capable enough of jeopardizing the entire networking infrastructure and can prove fatal for the vehicular passengers and the vulnerable pedestrians. This book thus investigates the promising notion of trust in a bid to strengthen the resilience of the IoV networks. It not only introduces trust categorically in the context of an IoV network, i.e., in terms of its fundamentals and salient characteristics, but further envisages state-of-the-art trust models and intelligent trust threshold mechanisms for segregating both malicious and non-malicious vehicles. Furthermore, open research challenges and recommendations for addressing the same are discussed in the same too.

Trust Management in the Internet of Vehicles

by Adnan Mahmood Michael Sheng Wei Emma Zhang Sira Yongchareon

The Internet of Vehicles (IoV) is referred to as an efficient and inevitable convergence of the Internet of Things, intelligent transportation systems, edge / fog and cloud computing, and big data, all of which could be intelligently harvested for the cooperative vehicular safety and non-safety applications as well as cooperative mobility management. A secure and low-latency communication is, therefore, indispensable to meet the stringent performance requirements of the safety-critical vehicular applications. Whilst the challenges surrounding low latency are being addressed by the researchers in both academia and industry, it is the security of an IoV network which is of paramount importance, as a single malicious message is perfectly capable enough of jeopardizing the entire networking infrastructure and can prove fatal for the vehicular passengers and the vulnerable pedestrians. This book thus investigates the promising notion of trust in a bid to strengthen the resilience of the IoV networks. It not only introduces trust categorically in the context of an IoV network, i.e., in terms of its fundamentals and salient characteristics, but further envisages state-of-the-art trust models and intelligent trust threshold mechanisms for segregating both malicious and non-malicious vehicles. Furthermore, open research challenges and recommendations for addressing the same are discussed in the same too.

Trust Management IV: 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010, Proceedings (IFIP Advances in Information and Communication Technology #321)

by Masakatsu Nishigaki Audun Josang Yuko Murayama Stephen Marsh

This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided a truly global platform for the reporting of research, development, policy, and practice in the interdependent arrears of privacy, se- rity, and trust. Building on the traditions inherited from the highly succe- ful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, the IFIPTM 2008 conference in Trondheim, Norway, and the IFIPTM 2009 conference at Purdue University in Indiana, USA, IFIPTM 2010 focused on trust, privacy and security from multidisciplinary persp- tives. The conference is an arena for discussion on relevant problems from both research and practice in the areas of academia, business, and government. IFIPTM 2010 was an open IFIP conference. The program of the conference featured both theoretical research papers and reports of real-world case studies. IFIPTM 2010 received 61 submissions from 25 di?erent countries: Japan (10), UK (6), USA (6), Canada (5), Germany (5), China (3), Denmark (2), India (2), Italy (2), Luxembourg (2), The Netherlands (2), Switzerland (2), Taiwan (2), Austria, Estonia, Finland, France, Ireland, Israel, Korea,Malaysia, Norway, Singapore, Spain, Turkey. The Program Committee selected 18 full papers for presentation and inclusion in the proceedings. In addition, the program and the proceedings include two invited papers by academic experts in the ?elds of trust management, privacy and security, namely, Toshio Yamagishi and Pamela Briggs.

Trust Management IX: 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings (IFIP Advances in Information and Communication Technology #454)

by Christian Damsgaard Jensen Stephen Marsh Theo Dimitrakos Yuko Murayama

This book constitutes the refereed proceedings of the 9th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2015, held in Hamburg, Germany, in May 2015. The 10 revised full papers and 5 short papers presented were carefully reviewed and selected from 28 submissions. In addition, the book contains one invited paper and 5 papers from a special session on trusted cloud ecosystems. The papers cover a wide range of topics including trust and reputation and models thereof, the relationship between trust and security, socio-technical aspects of trust, reputation and privacy, trust in the cloud and behavioural models of trust.

Trust Management V: 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, Denmark, June 29 - July 1, 2011, Proceedings (IFIP Advances in Information and Communication Technology #358)

by Ian Wakeman Ehud Gudes Christian Damsgaard Jensen Jason Crampton

This book constitutes the refereed proceedings of the 5th IFIP WG 11.11 International Conference, IFIPTM 2011, held in Copenhagen, Denmark, in June/July 2011. The 14 revised full papers and 8 short papers presented together with the abstracts of 4 keynote talks were carefully reviewed and selected from 42 submissions. The papers feature both theoretical research and real-world case studies from academia, business and government focusing on areas such as: trust models, social and behavioral aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems, and identity management.

Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012, Proceedings (IFIP Advances in Information and Communication Technology #374)

by Theo Dimitrakos Rajat Moona Dhiren Patel D. Harrison McKnight

This book constitutes the refereed proceedings of the 6th IFIP WG 11.11 International Conference, IFIPTM 2012, held in Surat, India, in May 2012. The 12 revised full papers presented together with 8 short papers and the abstracts of 4 keynote talks were carefully reviewed and selected from 51 submissions. Building on the traditions inherited from the iTrust and previous IFIPTM conferences, IFIPTM 2012 is a multi-disciplinary conference focusing on areas such as: trust models, social, economic and behavioural aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems, and identity management.

Trust Management VII: 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013, Proceedings (IFIP Advances in Information and Communication Technology #401)

by Carmen Fernandez-Gago Fabio Martinelli Siani Pearson Isaac Agudo

This book constitutes the refereed proceedings of the 7th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2013, held in Malaga, Spain, in June 2013. The 14 revised full papers and 9 short papers presented were carefully reviewed and selected from 62 submissions. The papers cover a wide range of topics focusing on multi-disciplinary areas such as: trust models, social foundations of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems, and identity management.

Trust Management VIII: 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014, Proceedings (IFIP Advances in Information and Communication Technology #430)

by Jianying Zhou Nurit Gal-Oz Jie Zhang Ehud Gudes

This book constitutes the refereed proceedings of the 8th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2014, held in Singapore, in July 2014. The 12 revised full papers and 5 short papers presented were carefully reviewed and selected from 36 submissions. In addition, the book contains one invited paper. The papers cover a wide range of topics focusing on the following main areas: trust and reputation models; privacy issues and social and behavioral models of trust; the relationship between trust and security; trust under attacks and trust in the cloud environment.

Trust Management X: 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings (IFIP Advances in Information and Communication Technology #473)

by Sheikh Mahbub Habib Julita Vassileva Sjouke Mauw Max Mühlhäuser

This book constitutes the refereed proceedings of the 10th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2016, held in Darmstadt, Germany, in July 2016. The 7 revised full papers and 7 short papers presented together with an invited paper were carefully reviewed and selected from 26 submissions. The papers cover a wide range of topics including trust architecture, trust modeling, trust metrics and computation, reputation and privacy, security and trust, sociotechnical aspects of trust, and attacks on trust and reputation systems.

Refine Search

Showing 80,601 through 80,625 of 85,149 results