Trust Management: Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This volume constitutes the proceedings of the 3rd International Conference on Trust Management, held in Paris, France, during 23–26 May 2005. The conf- ence follows successful International Conferences in Crete in 2003 and Oxford in 2004. All conferences were organized by iTrust, which is a working group funded as a thematic network by the Future and Emerging Technologies (FET) unit of the Information Society Technologies (IST) program of the European Union. The purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of trust as a means of increasing security, building con?dence and facilitating collaboration in dynamic open s- tems. The notion of trust has been studied independently by di?erent academic disciplines, which has helped us to identify and understand di?erent aspects of trust. Theaimofthisconferencewastoprovideacommonforum,bringingtogether researchers from di?erent academic branches, such as the technology-oriented disciplines, law, social sciences and philosophy, in order to develop a deeper and more fundamental understanding of the issues and challenges in the area of trust management in dynamic open systems. The response to this conference was excellent; from the 71 papers submitted to the conference, we selected 21 full papers and 4 short papers for presentation. The program also included two keynote addresses, given by Steve Marsh from National Research Centre Canada, Institute for Information Technology, and Steve Kimbrough from the University of Pennsylvania; an industrial panel; 7 technology demonstrations; and a full day of tutorials.

Author(s): Steven O. Kimbrough (auth.), Peter Herrmann, Valérie Issarny, Simon Shiu (eds.)
Series: Lecture Notes in Computer Science 3477 : Information Systems and Applications, incl. Internet/Web, and HCI
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005

Language: English
Pages: 428
Tags: Information Systems Applications (incl.Internet); Information Storage and Retrieval; Computer Communication Networks; Computers and Society; Management of Computing and Information Systems

Front Matter....Pages -
Foraging for Trust: Exploring Rationality and the Stag Hunt Game....Pages 1-16
Trust, Untrust, Distrust and Mistrust – An Exploration of the Dark(er) Side....Pages 17-33
Security and Trust in the Italian Legal Digital Signature Framework....Pages 34-44
Specifying Legal Risk Scenarios Using the CORAS Threat Modelling Language....Pages 45-60
On Deciding to Trust....Pages 61-76
Trust Management Survey....Pages 77-92
Can We Manage Trust?....Pages 93-107
Operational Models for Reputation Servers....Pages 108-115
A Representation Model of Trust Relationships with Delegation Extensions....Pages 116-130
Affect and Trust....Pages 131-145
Reinventing Forgiveness: A Formal Investigation of Moral Facilitation....Pages 146-160
Modeling Social and Individual Trust in Requirements Engineering Methodologies....Pages 161-176
Towards a Generic Trust Model – Comparison of Various Trust Update Algorithms....Pages 177-192
A Probabilistic Trust Model for Handling Inaccurate Reputation Sources....Pages 193-209
Trust as a Key to Improving Recommendation Systems....Pages 210-223
Alleviating the Sparsity Problem of Collaborative Filtering Using Trust Inferences....Pages 224-239
Experience-Based Trust: Enabling Effective Resource Selection in a Grid Environment....Pages 240-255
Interactive Credential Negotiation for Stateful Business Processes....Pages 256-272
An Evidence Based Architecture for Efficient, Attack-Resistant Computational Trust Dissemination in Peer-to-Peer Networks....Pages 273-288
Towards an Evaluation Methodology for Computational Trust Systems....Pages 289-304
Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy....Pages 305-320
Trust Transfer: Encouraging Self-recommendations Without Sybil Attack....Pages 321-337
Privacy-Preserving Search and Updates for Outsourced Tree-Structured Data on Untrusted Servers....Pages 338-354
Persistent and Dynamic Trust: Analysis and the Related Impact of Trusted Platforms....Pages 355-363
Risk Models for Trust-Based Access Control(TBAC)....Pages 364-371
Combining Trust and Risk to Reduce the Cost of Attacks....Pages 372-383
IWTrust: Improving User Trust in Answers from the Web....Pages 384-392
Trust Record: High-Level Assurance and Compliance....Pages 393-396
Implementation of the SECURE Trust Engine....Pages 397-401
The CORAS Tool for Security Risk Analysis....Pages 402-405
Towards a Grid Platform Enabling Dynamic Virtual Organisations for Business Applications....Pages 406-410
Multimedia Copyright Protection Platform Demonstrator....Pages 411-414
ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements....Pages 415-419
The VoteSecure TM Secure Internet Voting System....Pages 420-423
Back Matter....Pages -