Trust Management Second International Conference, iTrust 2004, Oxford, UK, March 29 - April 1, 2004, Proceedings /

Trust Management Second International Conference, iTrust 2004, Oxford, UK, March 29 - April 1, 2004, Proceedings / [electronic resource] : edited by Christian Jensen, Stefan Poslad, Theo Dimitrakos. - 1st ed. 2004. - XIV, 382 p. online resource. - Lecture Notes in Computer Science, 2995 1611-3349 ; . - Lecture Notes in Computer Science, 2995 .

Keynote Addresses -- Addressing the Data Problem: The Legal Framework Governing Forensics in an Online Environment -- KAoS: A Policy and Domain Services Framework for Grid Computing and Semantic Web Services -- W5: The Five W’s of the World Wide Web -- Full Papers -- A Case for Evidence-Aware Distributed Reputation Systems -- Enhanced Reputation Mechanism for Mobile Ad Hoc Networks -- Pinocchio: Incentives for Honest Participation in Distributed Trust Management -- History-Based Signature or How to Trust Anonymous Documents -- Trading Privacy for Trust -- Supporting Privacy in Decentralized Additive Reputation Systems -- Engineering Trust Based Collaborations in a Global Computing Environment -- Analysing the Relationship between Risk and Trust -- Using Risk Analysis to Assess User Trust -- E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities -- Requirements Engineering Meets Trust Management -- Towards Dynamic Security Perimeters for Virtual Collaborative Networks -- Human Experiments in Trust Dynamics -- Using Trust in Recommender Systems: An Experimental Analysis -- Modeling Controls for Dynamic Value Exchanges in Virtual Organizations -- Analyzing Correlation between Trust and User Similarity in Online Communities -- Trust Development and Management in Virtual Communities -- Managing Internet-Mediated Community Trust Relations -- Reasoning About Trust: A Formal Logical Framework -- Trust Mediation in Knowledge Management and Sharing -- Enhanced Accountability for Electronic Processes -- Short Papers and Experience Reports -- The Use of Formal Methods in the Analysis of Trust (Position Paper) -- Computing Recommendations to Trust -- Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements -- Towards TrustRelationship Planning for Virtual Organizations -- Trust, Security, and Contract Management Challenges for Grid-Based Application Service Provision -- Deploying Trust Policies on the Semantic Web.

9783540247470

10.1007/b96545 doi


Software engineering.
Information storage and retrieval systems.
Computer networks .
Application software.
User interfaces (Computer systems).
Human-computer interaction.
Computers and civilization.
Software Engineering.
Information Storage and Retrieval.
Computer Communication Networks.
Computer and Information Systems Applications.
User Interfaces and Human Computer Interaction.
Computers and Society.

QA76.758

005.1
© 2024 IIIT-Delhi, library@iiitd.ac.in