Trust, Privacy and Security in Digital Business (Record no. 95207)

000 -LEADER
fixed length control field 04736nam a22006495i 4500
001 - CONTROL NUMBER
control field 978-3-540-85735-8
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730194442.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100301s2008 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783540857358
-- 978-3-540-85735-8
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-540-85735-8
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.C66
072 #7 - SUBJECT CATEGORY CODE
Subject category code UBJ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM079000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UBJ
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 303.4834
Edition number 23
245 10 - TITLE STATEMENT
Title Trust, Privacy and Security in Digital Business
Medium [electronic resource] :
Remainder of title 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings /
Statement of responsibility, etc. edited by Steven M. Furnell, Sokratis Katsikas, Antonio Lioy.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2008.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Berlin, Heidelberg :
Name of producer, publisher, distributor, manufacturer Springer Berlin Heidelberg :
-- Imprint: Springer,
Date of production, publication, distribution, manufacture, or copyright notice 2008.
300 ## - PHYSICAL DESCRIPTION
Extent X, 205 p.
Other physical details online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
490 1# - SERIES STATEMENT
Series statement Security and Cryptology,
International Standard Serial Number 2946-1863 ;
Volume/sequential designation 5185
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Invited Lecture -- Biometrics - How to Put to Use and How Not at All? -- Trust -- A Map of Trust between Trading Partners -- Implementation of a TCG-Based Trusted Computing in Mobile Device -- A Model for Trust Metrics Analysis -- Authentication, Authorization and Access Control -- Patterns and Pattern Diagrams for Access Control -- A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications -- A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony -- Reputation Systems -- Multilateral Secure Cross-Community Reputation Systems for Internet Communities -- Fairness Emergence through Simple Reputation -- Combining Trust and Reputation Management for Web-Based Services -- Security Policies and Identity Management -- Controlling Usage in Business Process Workflows through Fine-Grained Security Policies -- Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy -- BusiROLE: A Model for Integrating Business Roles into Identity Management -- Intrusion Detection and Applications of Game Theory to IT Security Problems -- The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset -- A Generic Intrusion Detection Game Model in IT Security -- On the Design Dilemma in Dining Cryptographer Networks -- Privacy -- Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing -- A User-Centric Protocol for Conditional Anonymity Revocation -- Preservation of Privacy in Thwarting the Ballot Stuffing Scheme.
520 ## - SUMMARY, ETC.
Summary, etc. This book constitutes the refereed proceedings of the 5th International Conference on Trust and Privacy in Digital Business, TrustBus 2008, held in Turin, Italy, in September 2008 in conjunction with DEXA 2008. The 18 revised full papers presented together with 1 invited keynote lecture were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on trust, authentication, authorization and access control, reputation systems, security policies and identity management, intrusion detection and applications of game theory to IT security problems, and privacy.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers and civilization.
9 (RLIN) 21733
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electronic data processing
General subdivision Management.
9 (RLIN) 157125
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
9 (RLIN) 1973
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science).
9 (RLIN) 9168
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks .
9 (RLIN) 31572
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
9 (RLIN) 7245
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Business information services.
9 (RLIN) 28705
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers and Society.
9 (RLIN) 31668
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element IT Operations.
9 (RLIN) 31703
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptology.
9 (RLIN) 31769
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer Communication Networks.
9 (RLIN) 157126
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data and Information Security.
9 (RLIN) 31990
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element IT in Business.
9 (RLIN) 33373
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Furnell, Steven M.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 157127
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Katsikas, Sokratis.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 157128
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Lioy, Antonio.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 157129
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
9 (RLIN) 157130
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783540857341
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783540858102
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Security and Cryptology,
International Standard Serial Number 2946-1863 ;
Volume/sequential designation 5185
9 (RLIN) 157131
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-540-85735-8">https://doi.org/10.1007/978-3-540-85735-8</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-Lecture Notes in CS

No items available.