Title and Table of Contents
Introduction to Security
Introduction to Privacy in Computing
Privacy Enhancing Technologies
Introduction to Trust in Computing
Security Paradigms and Pervasive Trust
Trust Negotiations and Trading Privacy for Trust
Using Trust for Role-Based Access Control
Trust in P2P Systems
Role-Based Access Control(RBAC)
P2D2: A Mechanism for Privacy Preserving Data Dissemination
Private and Trusted Interactions
Detecting Service Violations in Internet & Mobile Ad Hoc Networks
Vulnerabilities and Threats in Distributed Systems
Proposal of Prof. Leszek Lilien (WMU)
Others: Secure Communication in Cellular and Ad Hoc Environments
Others: Intruder Identification in Ad Hoc Networks