000 05213nam a22006375i 4500
001 978-3-642-15152-1
003 DE-He213
005 20240730181709.0
007 cr nn 008mamaa
008 100830s2010 gw | s |||| 0|eng d
020 _a9783642151521
_9978-3-642-15152-1
024 7 _a10.1007/978-3-642-15152-1
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aTrust, Privacy and Security in Digital Business
_h[electronic resource] :
_b7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, Proceedings /
_cedited by Sokratis Katsikas, Miguel Soriano.
250 _a1st ed. 2010.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2010.
300 _aXII, 252 p. 67 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v6264
505 0 _aInvited Talk -- Usage Control, Risk and Trust -- Prevention Systems -- Attacking Image Recognition Captchas -- An Insider Threat Prediction Model -- A Call Conference Room Interception Attack and Its Detection -- Safe and Efficient Strategies for Updating Firewall Policies -- Privacy I -- A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression -- Context-Aware Privacy Design Pattern Selection -- Real-Time Remote Attestation with Privacy Protection -- Private Searching on MapReduce -- Privacy II -- In Search of Search Privacy -- Untraceability and Profiling Are Not Mutually Exclusive -- Privacy Policy Referencing -- Access Control -- Formal Proof of Cooperativeness in a Multi-Party P2P Content Authentication Protocol -- Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation -- An Agent Based Back-End RFID Tag Management System -- Security and Trust Concepts -- Assessing the Usability of End-User Security Software -- Building ISMS through the Reuse of Knowledge -- Mechanizing Social Trust-Aware Recommenders with T-Index Augmented Trustworthiness -- Security for Dynamic Collaborations -- Security for Dynamic Service-Oriented eCollaboration -- Analyzing Information Security Awareness through Networks of Association -- Efficiency Improvement of Homomorphic E-Auction.
520 _aThis book presents the proceedings of the 7th International Conference on Trust, P- vacy and Security in Digital Business (TrustBus 2010), held in Bilbao, Spain during August 30-31, 2010. The conference continued from previous events held in Zaragoza (2004), Copenhagen (2005), Krakow (2006), Regensburg (2007), Turin (2008) and Linz (2009). The recent advances in information and communication technologies (ICT) have raised new opportunities for the implementation of novel applications and the provision of high-quality services over global networks. The aim is to utilize this 'information society era' for improving the quality of life for all citizens, disseminating knowledge, strengthening social cohesion, generating earnings and finally ensuring that organi- tions and public bodies remain competitive in the global electronic marketplace. - fortunately, such a rapid technological evolution cannot be problem-free. Concerns are raised regarding the 'lack of trust' in electronic procedures and the extent to which 'information security' and 'user privacy' can be ensured. TrustBus 2010 brought together academic researchers and industry developers, who discussed the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Bilbao to participate and debate the new emerging advances in this area.
650 0 _aComputer networks .
_931572
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer programming.
_94169
650 0 _aElectronic data processing
_xManagement.
_9125837
650 0 _aComputers and civilization.
_921733
650 0 _aApplication software.
_9125838
650 1 4 _aComputer Communication Networks.
_9125839
650 2 4 _aCryptology.
_931769
650 2 4 _aProgramming Techniques.
_9125840
650 2 4 _aIT Operations.
_931703
650 2 4 _aComputers and Society.
_931668
650 2 4 _aComputer and Information Systems Applications.
_9125841
700 1 _aKatsikas, Sokratis.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9125842
700 1 _aSoriano, Miguel.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9125843
710 2 _aSpringerLink (Online service)
_9125844
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642151514
776 0 8 _iPrinted edition:
_z9783642151538
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v6264
_9125845
856 4 0 _uhttps://doi.org/10.1007/978-3-642-15152-1
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c91032
_d91032