Synopses & Reviews
This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Moncton, New Brunswick, Canada from July 29 to August 2, 2007.The annual iTrust international conference looks at trust from multidisciplinary perspectives: economic, legal, psychology, philosophy, sociology as well as information technology. The annual PST conference has quickly established itself as a leader in multidisciplinary research on a wide range of topics related to Privacy, Security and Trust, looked at from research and practice, through academe, business, and government. The two conferences have come together this year to take a more thorough look at all elements of trust management.The highlights of IFIPTM 2007 included invited talks by industrial and academic experts including Larry Korba from NRC-IIT, Brian O'Higgins of 3rd Brigade, Jim Robbins from EWA, Jonathan Cave from RAND, Roger London, and Bruce Cowper from Microsoft Canada.
Synopsis
Private Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust.- Trust Transfer in Distributed Systems.- Trust without Truth.- Mining and Detecting Connection-Chains in Network Traffic.- A Privacy-Aware Service Discovery Middleware for Pervasive Environments.- Analysis of the implicit trust within the OLSR protocol.- Validating a Trust-based Access Control System.- Negotiation for Authorisation in Virtual Organisations.- A Geo Time Authentication System.- Content Trust Model for Detecting Web Spam.- Applied Computational Trust in Utilities Management: a Case Study on The Town Council of Cava de' Tirreni.- A trust protocol for community collaboration.- Towards an Understanding of Security, Privacy and Safety in Maritime Self-Reporting Systems.- Dismantling the Twelve Privacy Purposes.- A Framework for Privacy-Preserving E-learning.- Exploiting Trust and Suspicion for Real-time Attack Recognition in Recommender Applications.- Self-Selection Bias in Reputation Systems.- Resisting Sybils in Peer-to-peer Markets.- A Trust Model for an Open, Decentralized Reputation System.- Control Flow Based Pointcuts for Security Hardening Concerns.- Design of Trusted Systems with Reusable Collaboration Models.- MUQAMI: A Locally Distributed Key Management Scheme for Clustered Sensor Networks.- Trust based Approach for Improving Data Reliability in Industrial Sensor Networks.- The AI Hardness of CAPTCHAs does not imply Robust Network Security.- Resilia: a Safe and Secure Distributed Backup System for Small and Medium Enterprises.- Integrity in Open Collaborative Authoring Systems.- Service-Oriented Approach to Visualize IT Security Performance Metrics.- From Early Requirements Analysis towards Secure Workflows.- Monitors for Usage Control.- Design of Trusted Systems with Reusable Collaboration Models.
Synopsis
This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Moncton, New Brunswick, Canada, in 2007. The annual iTrust international conference looks at trust from multidisciplinary perspectives: economic, legal, psychology, philosophy, sociology as well as information technology. This volume, therefore, presents the most up-to-date research on privacy, security, and trust management.
Table of Contents
Trust Transfer in Distributed Systems.- Mining and Detecting Connection-Chains in Network Traffic.- Validating a Trust-based Access Control System.- Content Trust Model for Detecting Web Spam.- Self-Selection Bias in Reputation Systems.- Design of Trusted Systems with Reusable Collaboration Models.- The AI Hardness of CAPTCHAs does not imply Robust Network Security.- Improving Integrity in Open Collaborative Authoring Systems.- Service-Oriented Approach to Visualizze IT Security Performance Metrics.- Monitors for Usage Control.