Khulna University of Engineering & Technology
Central Library

Managing trust in cyberspace / (Record no. 14716)

000 -LEADER
fixed length control field 05540cam a2200409Ii 4500
001 - CONTROL NUMBER
control field CAH0KE21211PDF
003 - CONTROL NUMBER IDENTIFIER
control field FlBoTFG
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20171224123327.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m|||||o||d||||||||
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 131227t20142014fluad ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781466568457 (ebook : PDF)
040 ## - CATALOGING SOURCE
Original cataloging agency FlBoTFG
Language of cataloging eng
Transcribing agency FlBoTFG
Description conventions rda
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) TK5105.59
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) .M3683 2014
092 ## - LOCALLY ASSIGNED DEWEY CALL NUMBER (OCLC)
Classification number 005.8
Item number M266
245 00 - TITLE STATEMENT
Title Managing trust in cyberspace /
Statement of responsibility, etc edited by Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey.
264 #1 -
-- Boca Raton :
-- Taylor & Francis,
-- [2014]
264 #4 -
-- �201
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource :
Other physical details text file, PD
336 ## -
-- text
-- rdaconten
337 ## -
-- computer
-- rdamedi
338 ## -
-- online resource
-- rdacarrie
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note 1. Analyzing trust and security in computing and communications systems / Al-Sakib Khan Pathan -- 2. Cloud computing : trust issues, challenges, and solutions / Sanchika Gupta, Padam Kumar, and Ajith Abraham -- 3. A survey of trust and trust management in cloud computing / Vimal Kumar, Brijesh Chejerla, Sanjay Madria, and Mukesh Mohania -- 4. Trust models for data integrity and data shredding in cloud / Ashutosh Saxena, Nitin Singh Chauhan, and Sravan Rondla -- 5. Key management solutions for database as a service : a selective survey / Sumitra Binu and Pethuru Raj Chelliah -- 6. Trustworthy coordination in ad hoc networks / Aakanksha and Punam Bedi -- 7. Toward a computational trust model for secure peer-to-peer communication / Shyam P. Joy and Priya Chandran -- 8. Trust in autonomic and self-organized networks / Karuppanan Komathy -- 9. Security and quality issues in trusting e-government service delivery / Maslin Masrom, Edith AiLing Lim, and Sabariyah Din -- 10. Context-aware e-commerce applications : trust issues and their solutions / Farag Azzedin, Sajjad Mahmood, and Muhammad Akhlaq -- 11. A walk-through of online identity management / Ravi Sankar Veerubhotla and Richa Garg -- 12. Trust in digital rights management systems / Tony Thomas -- 13. Privacy and trust management in safety-related C2X communication / Axel Sikora -- 14. Using trust and argumentation in multiagent recommender systems / Punam Bedi and Pooja Vashisth -- 15. A multiagent framework for selection of trustworthy service providers / Punam Bedi, Bhavna Gupta, and Harmeet Kaur -- 16. Trust issues in modern embedded computing / Alex Pappachen James and Sugathan Sherin -- 17. A framework of content- and context-based network monitoring / Eliot Foye, Shivani Prasad, Steven Sivan, Stephen Faatamai, Wei Q. Yan, and William Liu -- 18. A comparison of three sophisticated cyber weapons / Makkuva Shyam Vinay and Manoj Balakrishnan -- 19. Trust in cyberspace : new information security paradigm / Roberto Uzal, Narayan C. Debnath, Daniel Riesco, and German Montejano -- 20. A comprehensive survey of antiforensics for network security / Rahul Chandran and Wei Q. Yan -- 21. Password security and protection / Emery Moodley, Gary Huo, Mindy Hsieh, Stephen Cai, and Wei Q. Yan
520 ## - SUMMARY, ETC.
Summary, etc "Preface Traditional security mechanisms restrict access to authorized users only, in order to protect resources from malicious users. However, in many contexts, we must protect ourselves from those who offer resources, so that the problem is in fact reversed. This improper usage cannot be addressed by traditional security mechanisms, and the issues relate more to trustworthiness than security. Trust is a vital factor in our daily coexistence with other people, who can be unpredictable. Trust helps to reduce the uncertainty caused by this unpredictability to an acceptable level. The notion of trust includes trust management systems. These systems gather information required for creating a trust relationship and dynamically monitor and fine-tune present relationships. Thus, trust management provides a basis for cooperation to develop. The schemes include both centralized and distributed approaches. The main aim of this book is to provide relevant theoretical frameworks and the latest research findings in the area of trust management. This includes cross-disciplinary examination of fundamental issues underpinning computational trust models. The book thoroughly discusses various trust management processes for dynamic open systems and their applications. Moreover, most of the chapters are written in a tutorial style so that even readers without a specialized knowledge of the subject can easily grasp some of the ideas in this area. There are 21 chapters in this book which discuss trust and security in cloud computing, peer-to-peer (P2P) networks, autonomic networks, multiagent systems, vehicular ad hoc networks, digital rights management, e-commerce, e-governance, embedded computing, and a number of other topics"--
-- Provided by publisher
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print format
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberspace
General subdivision Security measures
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information technology
General subdivision Management
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Trust
General subdivision Economic aspects
655 ## - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term lcs
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Thampi, Sabu M.,
Relator term editor of compilation
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Bhargava, Bharat K.,
Dates associated with a name 1948-
Relator term editor of compilation
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Atrey, Pradeep,
Relator term editor of compilation
776 ## - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
International Standard Book Number 9781466568440 (hardback
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://marc.crcnetbase.com/isbn/9781466568457
Electronic format type application/PDF
Public note Distributed by publisher. Purchase or institutional license may be required for access

No items available.



Khulna University of Engineering & Technology
Funded by: HEQEP, UGC, Bangladesh