skip to content
Managing trust in cyberspace Preview this item
ClosePreview this item
Checking...

Managing trust in cyberspace

Author: Sabu M Thampi; Bharat K Bhargava; Pradeep K Atrey
Publisher: Boca Raton : Taylor & Francis, 2014.
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
"Preface Traditional security mechanisms restrict access to authorized users only, in order to protect resources from malicious users. However, in many contexts, we must protect ourselves from those who offer resources, so that the problem is in fact reversed. This improper usage cannot be addressed by traditional security mechanisms, and the issues relate more to trustworthiness than security. Trust is a vital  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: Sabu M Thampi; Bharat K Bhargava; Pradeep K Atrey
ISBN: 9781466568440 1466568445 1466568453 9781466568457
OCLC Number: 796751494
Description: xii, 486 pages : illustrations ; 24 cm
Contents: Analyzing trust and security in computing and communications systems / Al-Sakib Khan Pathan --
Cloud computing: trust issues, challenges, and solutions / Sanchika Gupta, Padam Kumar, and Ajith Abraham --
A survey of trust and trust management in cloud computing / Vimal Kumar, Brijesh Chejerla, Sanjay Madria, and Mukesh Mohania --
Trust models for data integrity and data shredding in cloud / Ashutosh Saxena, Nitin Singh Chauhan, and Sravan Rondla --
Key management solutions for database as service: a selective survey / Sumitra Binu and Pethuru Raj Chelliah --
Trustworthy coordination in Ad hoc networks / Aakanksha and Punam Bedi --
Toward a computational trust model for secure peer-to-peer communication / Shyam P. Joy and Priya Chandran --
Trust in autonomic and self-organized networks / Karuppanan Komathy --
Security and quality issues in trusting e-government service delivery / Maslin Masrom, Edith AiLing Lim, and Sabariyah Din --
Context-aware e-commerce applications: trust issues and their solutions / Farag Azzedin, Sajjad Mahmood, and Muhammad Akhlaq --
A walk-through of online identity management / Ravi Sankar Veerubhotla and Richa Garg --
Trust in digital rights management systems / Tony Thomas --
Privacy and trust management in safety-related C2X communication / Axel Sikora --
Using trust and argumentation in multiagent recommender systems / Punam Bedi and Pooja Vashisth --
A multiagent framework for selection of trustworthy service providers / Punam Bedi, Bhavna Gupta, and Harmeet Kaur --
Trust issues in modern embedded computing / Alex Pappachen James and Sugathan Sherin --
A framework of content- and context-based network monitoring / Eliot Foye, Shivani Prasad, Steven Sivan, Stephen Faatamai, Wei Q. Yan, and William Liu --
A comparison of three sophisticated cyber weapons / Makkuva Shyam Vinay and Manoj Balakrishnan --
Trust in cyberspace: new information security paradigm / Roberto Uzal, Narayan C. Debnath, Daniel Riesco, and German Montejano --
A comprehensive survey of antiforensics for network security / Rahul Chandran and Wei Q. Yan --
Password security and protection / Emery Moodley, Gary Huo, Mindy Hsieh, Stephen Cai, and Wei Q. Yan.
Responsibility: edited by Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey.
More information:

Abstract:

"Preface Traditional security mechanisms restrict access to authorized users only, in order to protect resources from malicious users. However, in many contexts, we must protect ourselves from those who offer resources, so that the problem is in fact reversed. This improper usage cannot be addressed by traditional security mechanisms, and the issues relate more to trustworthiness than security. Trust is a vital factor in our daily coexistence with other people, who can be unpredictable. Trust helps to reduce the uncertainty caused by this unpredictability to an acceptable level. The notion of trust includes trust management systems. These systems gather information required for creating a trust relationship and dynamically monitor and fine-tune present relationships. Thus, trust management provides a basis for cooperation to develop. The schemes include both centralized and distributed approaches. The main aim of this book is to provide relevant theoretical frameworks and the latest research findings in the area of trust management. This includes cross-disciplinary examination of fundamental issues underpinning computational trust models. The book thoroughly discusses various trust management processes for dynamic open systems and their applications. Moreover, most of the chapters are written in a tutorial style so that even readers without a specialized knowledge of the subject can easily grasp some of the ideas in this area. There are 21 chapters in this book which discuss trust and security in cloud computing, peer-to-peer (P2P) networks, autonomic networks, multiagent systems, vehicular ad hoc networks, digital rights management, e-commerce, e-governance, embedded computing, and a number of other topics"--

Reviews

Editorial reviews

Publisher Synopsis

"Academia and industry...need a published book covering [trust management] ... The research on trust has advanced and is mature enough to have a book only focused on this topic. ... it is a hot topic Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/796751494> # Managing trust in cyberspace
    a schema:Book, schema:CreativeWork ;
    library:oclcnum "796751494" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/flu> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1685213994#Topic/cyberspace> ; # Cyberspace
    schema:about <http://experiment.worldcat.org/entity/work/data/1685213994#Topic/trust_economic_aspects> ; # Trust--Economic aspects
    schema:about <http://experiment.worldcat.org/entity/work/data/1685213994#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/1685213994#Topic/computers_security_cryptography> ; # COMPUTERS--Security--Cryptography
    schema:about <http://id.loc.gov/authorities/subjects/sh2008006980> ; # Information technology--Management
    schema:about <http://experiment.worldcat.org/entity/work/data/1685213994#Topic/information_technology_management> ; # Information technology--Management
    schema:about <http://experiment.worldcat.org/entity/work/data/1685213994#Topic/computers_networking_general> ; # COMPUTERS--Networking--General
    schema:about <http://id.worldcat.org/fast/973112> ; # Information technology--Management
    schema:about <http://experiment.worldcat.org/entity/work/data/1685213994#Topic/informationstechnik> ; # Informationstechnik
    schema:about <http://experiment.worldcat.org/entity/work/data/1685213994#Topic/management> ; # Management
    schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
    schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/1685213994#Topic/cyberspace_security_measures> ; # Cyberspace--Security measures
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1685213994#Topic/rechnernetz> ; # Rechnernetz
    schema:about <http://experiment.worldcat.org/entity/work/data/1685213994#Topic/vertrauen> ; # Vertrauen
    schema:about <http://experiment.worldcat.org/entity/work/data/1685213994#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:bookFormat bgn:PrintBook ;
    schema:datePublished "2014" ;
    schema:description ""Preface Traditional security mechanisms restrict access to authorized users only, in order to protect resources from malicious users. However, in many contexts, we must protect ourselves from those who offer resources, so that the problem is in fact reversed. This improper usage cannot be addressed by traditional security mechanisms, and the issues relate more to trustworthiness than security. Trust is a vital factor in our daily coexistence with other people, who can be unpredictable. Trust helps to reduce the uncertainty caused by this unpredictability to an acceptable level. The notion of trust includes trust management systems. These systems gather information required for creating a trust relationship and dynamically monitor and fine-tune present relationships. Thus, trust management provides a basis for cooperation to develop. The schemes include both centralized and distributed approaches. The main aim of this book is to provide relevant theoretical frameworks and the latest research findings in the area of trust management. This includes cross-disciplinary examination of fundamental issues underpinning computational trust models. The book thoroughly discusses various trust management processes for dynamic open systems and their applications. Moreover, most of the chapters are written in a tutorial style so that even readers without a specialized knowledge of the subject can easily grasp some of the ideas in this area. There are 21 chapters in this book which discuss trust and security in cloud computing, peer-to-peer (P2P) networks, autonomic networks, multiagent systems, vehicular ad hoc networks, digital rights management, e-commerce, e-governance, embedded computing, and a number of other topics"--"@en ;
    schema:description "Analyzing trust and security in computing and communications systems / Al-Sakib Khan Pathan -- Cloud computing: trust issues, challenges, and solutions / Sanchika Gupta, Padam Kumar, and Ajith Abraham -- A survey of trust and trust management in cloud computing / Vimal Kumar, Brijesh Chejerla, Sanjay Madria, and Mukesh Mohania -- Trust models for data integrity and data shredding in cloud / Ashutosh Saxena, Nitin Singh Chauhan, and Sravan Rondla -- Key management solutions for database as service: a selective survey / Sumitra Binu and Pethuru Raj Chelliah -- Trustworthy coordination in Ad hoc networks / Aakanksha and Punam Bedi -- Toward a computational trust model for secure peer-to-peer communication / Shyam P. Joy and Priya Chandran -- Trust in autonomic and self-organized networks / Karuppanan Komathy -- Security and quality issues in trusting e-government service delivery / Maslin Masrom, Edith AiLing Lim, and Sabariyah Din -- Context-aware e-commerce applications: trust issues and their solutions / Farag Azzedin, Sajjad Mahmood, and Muhammad Akhlaq -- A walk-through of online identity management / Ravi Sankar Veerubhotla and Richa Garg -- Trust in digital rights management systems / Tony Thomas -- Privacy and trust management in safety-related C2X communication / Axel Sikora -- Using trust and argumentation in multiagent recommender systems / Punam Bedi and Pooja Vashisth -- A multiagent framework for selection of trustworthy service providers / Punam Bedi, Bhavna Gupta, and Harmeet Kaur -- Trust issues in modern embedded computing / Alex Pappachen James and Sugathan Sherin -- A framework of content- and context-based network monitoring / Eliot Foye, Shivani Prasad, Steven Sivan, Stephen Faatamai, Wei Q. Yan, and William Liu -- A comparison of three sophisticated cyber weapons / Makkuva Shyam Vinay and Manoj Balakrishnan -- Trust in cyberspace: new information security paradigm / Roberto Uzal, Narayan C. Debnath, Daniel Riesco, and German Montejano -- A comprehensive survey of antiforensics for network security / Rahul Chandran and Wei Q. Yan -- Password security and protection / Emery Moodley, Gary Huo, Mindy Hsieh, Stephen Cai, and Wei Q. Yan."@en ;
    schema:editor <http://viaf.org/viaf/24779048> ; # Bharat K. Bhargava
    schema:editor <http://viaf.org/viaf/270197001> ; # Sabu M. Thampi
    schema:editor <http://viaf.org/viaf/305443163> ; # Pradeep K. Atrey
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1685213994> ;
    schema:image <http://images.tandf.co.uk/common/jackets/websmall/978146656/9781466568440.jpg> ;
    schema:inLanguage "en" ;
    schema:name "Managing trust in cyberspace"@en ;
    schema:productID "796751494" ;
    schema:workExample <http://worldcat.org/isbn/9781466568440> ;
    schema:workExample <http://worldcat.org/isbn/9781466568457> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/796751494> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1685213994#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1685213994#Topic/computers_networking_general> # COMPUTERS--Networking--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Networking--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1685213994#Topic/computers_security_cryptography> # COMPUTERS--Security--Cryptography
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--Cryptography"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1685213994#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1685213994#Topic/information_technology_management> # Information technology--Management
    a schema:Intangible ;
    schema:name "Information technology--Management"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1685213994#Topic/informationstechnik> # Informationstechnik
    a schema:Intangible ;
    schema:name "Informationstechnik"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh2008006980> # Information technology--Management
    a schema:Intangible ;
    schema:name "Information technology--Management"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
    schema:hasPart <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/973112> # Information technology--Management
    a schema:Intangible ;
    schema:hasPart <http://id.loc.gov/authorities/subjects/sh2008006980> ; # Information technology--Management
    schema:name "Information technology--Management"@en ;
    .

<http://viaf.org/viaf/24779048> # Bharat K. Bhargava
    a schema:Person ;
    schema:birthDate "1948" ;
    schema:familyName "Bhargava" ;
    schema:givenName "Bharat K." ;
    schema:name "Bharat K. Bhargava" ;
    .

<http://viaf.org/viaf/270197001> # Sabu M. Thampi
    a schema:Person ;
    schema:familyName "Thampi" ;
    schema:givenName "Sabu M." ;
    schema:name "Sabu M. Thampi" ;
    .

<http://viaf.org/viaf/305443163> # Pradeep K. Atrey
    a schema:Person ;
    schema:familyName "Atrey" ;
    schema:givenName "Pradeep K." ;
    schema:name "Pradeep K. Atrey" ;
    .

<http://worldcat.org/isbn/9781466568440>
    a schema:ProductModel ;
    schema:isbn "1466568445" ;
    schema:isbn "9781466568440" ;
    .

<http://worldcat.org/isbn/9781466568457>
    a schema:ProductModel ;
    schema:isbn "1466568453" ;
    schema:isbn "9781466568457" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.