Managing Trust in Cyberspace
Book Details:
Publisher: | Chapman and Hall/CRC |
Series: |
CRC Press
|
Author: | Sabu M. Thampi |
Edition: | 1 |
ISBN-10: | 1466568445 |
ISBN-13: | 9781466568440 |
Pages: | 498 |
Published: | Dec 14 2013 |
Posted: | Nov 19 2014 |
Language: | English |
Book format: | PDF |
Book size: | 10.82 MB |
Book Description:
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooperation to develop. Bringing together expertise from technology-oriented sciences, law, philosophy, and social sciences, Managing Trust in Cyberspace addresses fundamental issues underpinning computational trust models and covers trust management processes for dynamic open systems and applications in a tutorial style that aids in understanding. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book also presents a walk-through of online identity management and examines using trust and argumentation in recommender systems. It concludes with a comprehensive survey of anti-forensics for network security and a review of password security and protection. Researchers and practitioners in fields such as distributed computing, Internet technologies, networked systems, information systems, human computer interaction, human behavior modeling, and intelligent informatics especially benefit from a discussion of future trust management research directions including pervasive and ubiquitous computing, wireless ad-hoc and sensor networks, cloud computing, social networks, e-services, P2P networks, near-field communications (NFC), electronic knowledge management, and nano-communication networks.
An Introduction to Solving Crimes in Cyberspace
Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations. Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of on...
How Conflicts in Cyberspace Are Challenging America and Changing the World
The binary system of counting, which uses only 1s and 0s, lies at the heart of computational algorithms. Every number, every bit of data, every voice communication, and every video can, in essence, be expressed as a string of 1s and 0s. In physical terms, deep within the innards of the computer, silicon chips create those 1s and 0s through a series of switches whose structure is etched onto wafer-thin silicon integrated circuits. The beauty of cyberspace and its genius lies in recognizing the universal power of these simple 1s and 0s. The rapidity with which they can be manipulated has, over the past decades, increased exponentially. And that explosion in computing power has fostered a wild explosion of new technology. Hardly a day goes by without th...
The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Service requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes - Cloud security fundamentals and related technologies to-date, with a comprehensive coverage of evolution, current landscape, and future roadmap. - A smooth organization with introductory, advanced and specialist content, i.e. from basics of security, privacy and trust in cloud systems, to advanced cartographic techniques, case studies covering both social and technological asp...
2007 - 2021 © eBooks-IT.org