Buch, Englisch, Band 454, 277 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 4453 g
Reihe: IFIP Advances in Information and Communication Technology
9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings
Buch, Englisch, Band 454, 277 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 4453 g
Reihe: IFIP Advances in Information and Communication Technology
ISBN: 978-3-319-38708-6
Verlag: Springer International Publishing
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Cloud-Computing, Grid-Computing
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsinformatik, SAP, IT-Management
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Social Media, Semantic Web, Web 2.0
- Mathematik | Informatik EDV | Informatik Angewandte Informatik Wirtschaftsinformatik
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
Weitere Infos & Material
Reputation - from Social Perception to Internet Security.- Mathematical Modelling of Trust Issues in Federated Identity Management.- Simple and Practical Integrity Models for Binaries and Files.- Enabling NAME-Based Security and Trust.- Trust Driven Strategies for Privacy by Design.- Lightweight Practical Private One-Way Anonymous Messaging.- Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings.- Obscuring Provenance Confidential Information via Graph Transformation.- Social Network Culture Needs the Lens of Critical Trust Research.- Predicting Quality of Crowd sourced Annotations Using Graph Kernels.- An Architecture for Trustworthy Open Data Services.- 1,2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space.- Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation.- The Detail of Trusted Messages: Retweets in a Context of Health and Fitness.- Reusable Defense Components for Online Reputation Systems.- Continuous Context-Aware Device Comfort Evaluation Method.- Special Session: Toward Trusted Cloud Ecosystems.- Foreword: Towards Trusted Cloud Ecosystems.- A Cloud Orchestrator for Deploying Public Services on the Cloud – The Case of STRATEGIC Project.- Integrating Security Services in Cloud Service Stores.- Building an Eco-System of Trusted Services via User Control and Transparency on Personal Data.- Security-as-a-Service in Multi-cloud and Federated Cloud Environments.- The Role of SLAs in Building a Trusted Cloud for Europe.