↓ Skip to main content

Security and Trust Management

Overview of attention for book
Cover of 'Security and Trust Management'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Uncertainty, Subjectivity, Trust and Risk: How It All Fits together
  3. Altmetric Badge
    Chapter 2 Trust Extortion on the Internet
  4. Altmetric Badge
    Chapter 3 Trust Areas: A Security Paradigm for the Future Internet
  5. Altmetric Badge
    Chapter 4 Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security
  6. Altmetric Badge
    Chapter 5 A Proof-Carrying File System with Revocable and Use-Once Certificates
  7. Altmetric Badge
    Chapter 6 New Modalities for Access Control Logics: Permission, Control and Ratification
  8. Altmetric Badge
    Chapter 7 Security Notions of Biometric Remote Authentication Revisited
  9. Altmetric Badge
    Chapter 8 Hiding the Policy in Cryptographic Access Control
  10. Altmetric Badge
    Chapter 9 Location Privacy in Relation to Trusted Peers
  11. Altmetric Badge
    Chapter 10 Fairness in Non-Repudiation Protocols
  12. Altmetric Badge
    Chapter 11 Security and Trust Management
  13. Altmetric Badge
    Chapter 12 Automated Analysis of Infinite State Workflows with Access Control Policies
  14. Altmetric Badge
    Chapter 13 The Role of Data Integrity in EU Digital Signature Legislation — Achieving Statutory Trust for Sanitizable Signature Schemes
  15. Altmetric Badge
    Chapter 14 Mutual Remote Attestation: Enabling System Cloning for TPM Based Platforms
  16. Altmetric Badge
    Chapter 15 Secure Architecure for the Integration of RFID and Sensors in Personal Networks
  17. Altmetric Badge
    Chapter 16 Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources
Attention for Chapter 2: Trust Extortion on the Internet
Altmetric Badge

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
11 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Trust Extortion on the Internet
Chapter number 2
Book title
Security and Trust Management
Published by
Springer, Berlin, Heidelberg, June 2011
DOI 10.1007/978-3-642-29963-6_2
Book ISBNs
978-3-64-229962-9, 978-3-64-229963-6
Authors

Audun Jøsang

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 11 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 11 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 5 45%
Student > Bachelor 2 18%
Other 1 9%
Researcher 1 9%
Professor > Associate Professor 1 9%
Other 0 0%
Unknown 1 9%
Readers by discipline Count As %
Computer Science 8 73%
Philosophy 1 9%
Psychology 1 9%
Unknown 1 9%