Managing trust in cyberspace

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust bet...

Descripción completa

Detalles Bibliográficos
Otros Autores: Thampi, Sabu, author (author), Thampi, Sabu M., editor (editor), Bhargava, Bharat K., 1948- editor, Atrey, Pradeep K., editor
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton : CRC Press, Taylor & Francis Group [2014]
Edición:1st edition
Colección:Gale eBooks
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628721806719
Tabla de Contenidos:
  • Front Cover; Contents; Preface; Contributors; Chapter 1: Analyzing Trust and Security in Computing and Communications Systems; Chapter 2: Cloud Computing: Trust Issues, Challenges, and Solutions; Chapter 3: A Survey of Trust and Trust Management in Cloud Computing; Chapter 4: Trust Models for Data Integrity and Data Shredding in Cloud; Chapter 5: Key Management Solutions for Database as a Service: A Selective Survey; Chapter 6: Trustworthy Coordination in Ad Hoc Networks; Chapter 7: Toward a Computational Trust Model for Secure Peer-to-Peer Communication
  • Chapter 8: Trust in Autonomic and Self- Organized NetworksChapter 9: Security and Quality Issues in Trusting E-Government Service Delivery; Chapter 10: Context-Aware E-Commerce Applications: Trust Issues and Their Solutions; Chapter 11: A Walk-Through of Online Identity Management; Chapter 12: Trust in Digital Rights Management Systems; Chapter 13: Privacy and Trust Management in Safety-Related C2X Communication; Chapter 14: Using Trust and Argumentation in Multiagent Recommender Systems; Chapter 15: A Multiagent Framework for Selection of Trustworthy Service Providers
  • Chapter 16: Trust Issues in Modern Embedded ComputingChapter 17: A Framework of Content- and Context- Based Network Monitoring; Chapter 18: A Comparison of Three Sophisticated Cyber Weapons; Chapter 19: Trust in Cyberspace: New Information Security Paradigm; Chapter 20: A Comprehensive Survey of Antiforensics for Network Security; Chapter 21: Password Security and Protection; Back Cover