You are previewing Collaborative Computer Security and Trust Management.
O'Reilly logo
Collaborative Computer Security and Trust Management

Book Description

Collaborative Computer Security and Trust Management combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field. Practitioners, researchers, and academicians are presented with lessons learned by international experts to meet the new challenges of security in the global information age.

Table of Contents

  1. Copyright
  2. Foreword
  3. Preface
  4. Acknowledgment
  5. Knowledge Assets, E – Networks and Trust
    1. ABSTRACT
    2. BACKGROUND: KNOWLEDGE ASSETS AND E-NETWORKS
    3. BACKGROUND: KNOWLEDGE MANAGEMENT & TRUST
    4. CONCLUSION
  6. REFERENCES
  7. Teamworking for Security: The Collaborative Approach
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. THE CIMD APPROACH
    5. VULNERABILITY ANALYSIS
    6. SCENARIOS
    7. SIMULATION
    8. CONCLUSION AND FUTURE WORK
  8. REFERENCES
  9. Tensions in Collaborative Cyber Security and how They Affect Incident Detection and Response
    1. ABSTRACT
    2. BACKGROUND
    3. THE HISTORY AND PROBLEMS OF COLLABORATIVE CYBER SECURITY
    4. INTRODUCTION
    5. CASE STUDIES IN SECURITY COLLABORATION
    6. CHALLENGES TO SUCCESSFUL COLLABORATION
    7. COLLABORATION SOLUTIONS
    8. TECHNICAL COLLABORATION SOLUTIONS
    9. FUTURE COLLABORATIVE TECHNOLOGIES
    10. LESSONS LEARNED
    11. CONCLUSION
  10. REFERENCES
    1. ENDNOTES
  11. Challenges in Sharing Computer and Network Logs
    1. ABSTRACT
    2. INTRODUCTION
    3. CONCLUSION
  12. REFERENCES
    1. ENDNOTE
  13. Data Protection in Collaborative Business Applications
    1. ABSTRACT
    2. INTRODUCTION
    3. PRIVACY-PRESERVING FRAUD DETECTION
    4. CONCLUSION
  14. REFERENCES
  15. An Approach to Unified Trust Management Framework
    1. ABSTRACT
    2. INTRODUCTION
    3. CHALLENGES FOR TRUST MANAGEMENT
    4. TAXONOMY FRAMEWORK OF TRUST
    5. TRUST MANAGEMENT ARCHITECTURE
    6. SYSTEM COMPONENTS OF TRUSTENGINE
    7. SYSTEM SETTING UP AND OPERATIONS
    8. AN APPLICATION EXAMPLE
    9. RELATED WORK
    10. CONCLUDING REMARKS
  16. REFERENCES
  17. Trust-Aware Recommender Systems for Open and Mobile Virtual Communities
    1. ABSTRACT
    2. VIRTUAL COMMUNITIES
    3. TRUST ASPECT IN OPEN VIRTUAL COMMUNITIES
    4. AN ARCHITECTURE FOR TRUST-BASED RECOMMENDER SYSTEM FOR OPEN AND MOBILE COMMUNITIES
    5. CONCLUSION
  18. REFERENCES
    1. ENDNOTES
  19. Securing Mobile-Agent Systems through Collaboration
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. MAS SECURITY WITHOUT COLLABORATION
    5. MAS SECURITY THROUGH PARTIAL COLLABORATION
    6. MAS SECURITY THROUGH COLLABORATION
    7. DISCUSSION
    8. CONCLUSION
  20. REFERENCES
  21. How Trust and Reputation-Based Collaboration Impact Wireless Sensor Network Security
    1. ABSTRACT
    2. INTRODUCTION
    3. DESCRIPTION OF A TYPICAL WIRELESS SENSOR NETWORK INFRASTRUCTURE
    4. COLLABORATION, TRUST AND REPUTATION FOR SECURITY
    5. PRIVACY
    6. CONCLUSION
  22. REFERENCES
    1. ENDNOTES
  23. Trusted Computing for Collaboration
    1. ABSTRACT
    2. INTRODUCTION
    3. CONCLUSION
  24. REFERENCES
    1. ENDNOTES
  25. Trust-Privacy Tradeoffs in Distributed Computing
    1. ABSTRACT
    2. INTRODUCTION
    3. PREVIOUS WORK
    4. TRUST-PRIVACY TRADEOFF SYSTEM
    5. THE SYSTEM SIMULATION
    6. CONCLUSION
    7. ACKNOWLEDGMENT
  26. REFERENCES
  27. Selected Readings
    1. A Proposition for Developing Trust and Relational Synergy in International e-Collaborative Groups
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAIN FOCUS OF THE CHAPTER
      5. SOLUTIONS AND RECOMMENDATIONS
      6. FUTURE DIRECTIONS
      7. CONCLUSION
    2. REFERENCES
      1. KEY TERMS
    3. Trust-Based Usage Control in Collaborative Environment
      1. ABSTRACT
      2. INTRODUCTION
      3. A FRAMEWORK TO INTEGRATION TRUST INTO USAGE CONTROL
      4. ARCHITECTURE OF TRUST-BASED USAGE CONTROL IN FILE SHARING
      5. PROTOTYPE SIMULATION
      6. CONCLUSION
    4. REFERENCES
  28. Compilation of References
  29. About the Contributors
  30. Index