As part of a series of conferences held by the IFIP working group (11.11) on Trust Management and events hosted by Hasso Plattner Institute, we are organizing a symposium that brings industry to meet academia. The aim is to bring both communities together to establish connections, discuss research, and to present problems in the industry that may have solutions in the academic world. Trust Management includes topics such as:
- semantics and models for security and trust
- trust management architectures and mechanisms
- policy-based approach to trust management
- reputation and recommendation systems
- identity management
- privacy and trust
- trust in e-commerce, e-service, e-government
- trust in Semantic Web
- social and legal aspect of trust
Opening Remarks | 00:35:17 | |
---|---|---|
The Idea | 00:04:45 | |
Welcome at HPI | 00:15:33 | |
Research Projects in Security & Trust Engineering | 00:14:59 |
Social Media Reputation System Design Challenges: The Practitioner's View | 00:44:53 | |
---|---|---|
Definitions | 00:15:16 | |
Reputation is a Community | 00:15:20 | |
Reputation is an Industry | 00:14:17 |
Don't Ask Too Much: Rewarding Privacy on the Web | 00:24:58 | |
---|---|---|
Normative Security and Privacy | 00:08:26 | |
State of the Art | 00:08:35 | |
Preliminary Results | 00:07:57 |
Realizing the Potential of Trust Management | 00:23:14 | |
---|---|---|
Brief Intro | 00:11:16 | |
Additional Concern | 00:07:26 | |
Impacting the Corporation | 00:04:32 |
Ensuring Trust in Service Consumption Through Security Certification | 00:25:03 | |
---|---|---|
Consuming Services Off the Cloud | 00:13:12 | |
Assert Structure and Language | 00:07:25 | |
Conclusion | 00:04:26 |
Trust Challenges of 50 Billion Connected Devices | 00:24:41 | |
---|---|---|
50 Billion Devices | 00:10:15 | |
Trust Mechanisms | 00:09:05 | |
Threat Sources | 00:05:21 |
Trusted Publish/Subscribe | 00:25:38 | |
---|---|---|
Publish/Subscribe | 00:11:20 | |
Social Choice and Welfare | 00:08:21 | |
The Problem | 00:05:57 |
Going Cognitive: A Cognitive Approach to Computational Trust and Reputation | 00:28:27 | |
---|---|---|
Image | 00:11:04 | |
Talking About Reputation | 00:10:56 | |
AdapTrust | 00:06:27 |
Enabling Reputation Interoperability Through Semantic Technologies | 00:28:21 | |
---|---|---|
Approaches? | 00:12:43 | |
ChocStore | 00:07:32 | |
Which Technology? | 00:08:06 |
On the Effects of Reputation in the Internet of Services | 00:25:58 | |
---|---|---|
The Internet of Services aka Cloud Computing | 00:14:25 | |
Reputation as a Special Solution to Trusting IoS | 00:08:01 | |
Summary | 00:03:32 |
Filter Bubble and Trust Metrics: Balancing Between Echo Chamber and Tyranny of the Majority | 00:31:49 | |
---|---|---|
Trust = Human Relationship | 00:15:45 | |
Local Trust Metrics | 00:08:49 | |
Essembly.com | 00:05:01 |
Robustness of Trust and Reputation Systems: Does it Matter? | 00:50:23 | |
---|---|---|
Decisions | 00:14:21 | |
Reputation System Challenges | 00:15:25 | |
Trust Transitivity | 00:15:15 | |
Yhprum's Law | 00:05:22 |
Privacy Protected Attribute Aggregation | 00:32:07 | |
---|---|---|
Shibboleth/SAMLv2 Protocol Flow | 00:17:14 | |
Live Demo of TAAS | 00:06:03 | |
TAAS Protocol Flow | 00:08:50 |
Identity Assurance in Open Identity Management Models | 00:29:30 | |
---|---|---|
Identity Management in SOA | 00:08:54 | |
Identity Assurance | 00:08:38 | |
The Vision | 00:11:58 |
How User Ratings Could Affect Trust in Open Data Resources | 00:19:28 | |
---|---|---|
Open Data - The Idea | 00:09:11 | |
The Debian Analogy | 00:10:17 |
Content Reputation and the Small Screen | 00:34:26 | |
---|---|---|
Chapter 5 | 00:12:19 | |
1st Designs | 00:07:29 | |
The Evolution of Cool | 00:14:38 |