In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooper

chapter 1|12 pages

Analyzing Trust and Security in Computing and Communications Systems

ByAl-Sakib Khan Pathan

chapter 2|28 pages

Cloud Computing: Trust Issues, Challenges, and Solutions

BySanchika Gupta, Padam Kumar, Ajith Abraham

chapter 3|30 pages

A Survey of Trust and Trust Management in Cloud Computing

ByVimal Kumar, Brijesh Chejerla, Sanjay Madria, Mukesh Mohania

chapter 4|22 pages

Trust Models for Data Integrity and Data Shredding in Cloud

ByAshutosh Saxena, Nitin Singh Chauhan, Sravan Rondla

chapter 5|20 pages

Key Management Solutions for Database as a Service: A Selective Survey

BySumitra Binu, Pethuru Raj Chelliah

chapter 6|18 pages

Trustworthy Coordination in Ad Hoc Networks

ByAakanksha and Punam Bedi

chapter 7|38 pages

Toward a Computational Trust Model for Secure Peer-to-Peer Communication

ByShyam P. Joy, Priya Chandran

chapter 8|28 pages

Trust in Autonomic and Self- Organized Networks

ByKaruppanan Komathy

chapter 9|22 pages

Security and Quality Issues in Trusting E-Government Service Delivery

ByMaslin Masrom, Edith AiLing Lim, and Sabariyah Din

chapter 10|20 pages

Context-Aware E-Commerce Applications: Trust Issues and Their Solutions

ByFarag Azzedin, Sajjad Mahmood, Muhammad Akhlaq

chapter 11|24 pages

A Walk-Through of Online Identity Management

ByRavi Sankar Veerubhotla, Richa Garg

chapter 12|20 pages

Trust in Digital Rights Management Systems

ByTony Thomas

chapter 13|32 pages

Privacy and Trust Management in Safety-Related C2X Communication

ByAxel Sikora

chapter 14|24 pages

Using Trust and Argumentation in Multiagent Recommender Systems

ByPunam Bedi, Pooja Vashisth

chapter 15|22 pages

A Multiagent Framework for Selection of Trustworthy Service Providers

ByPunam Bedi, Bhavna Gupta, Harmeet Kaur

chapter 16|10 pages

Trust Issues in Modern Embedded Computing

ByAlex Pappachen James, Sugathan Sherin

chapter 17|16 pages

A Framework of Content- and Context- Based Network Monitoring

ByEliot Foye, Shivani Prasad, Steven Sivan, Stephen Faatamai, Wei Q. Yan, and William Liu

chapter 18|18 pages

A Comparison of Three Sophisticated Cyber Weapons

ByMakkuva Shyam Vinay, Manoj Balakrishnan

chapter 19|14 pages

Trust in Cyberspace: New Information Security Paradigm

ByRoberto Uzal, Narayan C. Debnath, Daniel Riesco, German Montejano

chapter 20|30 pages

A Comprehensive Survey of Antiforensics for Network Security

ByRahul Chandran, Wei Q. Yan

chapter 21|22 pages

Password Security and Protection

ByEmery Moodley, Gary Huo, Mindy Hsieh, Stephen Cai, Wei Q. Yan