000 06213nam a22006495i 4500
001 978-3-540-37752-8
003 DE-He213
005 20240730185427.0
007 cr nn 008mamaa
008 100301s2006 gw | s |||| 0|eng d
020 _a9783540377528
_9978-3-540-37752-8
024 7 _a10.1007/11824633
_2doi
050 4 _aQA76.9.C66
072 7 _aUBJ
_2bicssc
072 7 _aCOM079000
_2bisacsh
072 7 _aUBJ
_2thema
082 0 4 _a303.4834
_223
245 1 0 _aTrust and Privacy in Digital Business
_h[electronic resource] :
_bThird International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings /
_cedited by Simone Fischer-Hübner, Steven Furnell, Costas Lambrinoudakis.
250 _a1st ed. 2006.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2006.
300 _aXIV, 250 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v4083
505 0 _aSession 1: Privacy and Identity Management -- Towards Scalable Management of Privacy Obligations in Enterprises -- A New User-Centric Identity Management Infrastructure for Federated Systems -- Session 2: Security and Risk Management -- Information Security Risk Assessment Model for Risk Management -- On the Limits of Cyber-Insurance -- Towards a Risk Management Perspective on AAIs -- Session 3: Security Requirements and Development -- Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes -- A Framework for Exploiting Security Expertise in Application Development -- On Diffusion and Confusion - Why Electronic Signatures Have Failed -- Session 4: Privacy Enhancing Technologies and Privacy Management -- Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy -- A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises -- A Generic Privacy Enhancing Technology for Pervasive Computing Environments -- Bringing the User Back into Control: A New Paradigm for Usability in Highly Dynamic Systems -- Session 5: Access Control Models -- Extending SQL to Allow the Active Usage of Purposes -- FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy -- A Framework for Modeling Restricted Delegation in Service Oriented Architecture -- Session 6: Trust and Reputation -- Reputation-Based Trust Systems for P2P Applications: Design Issues and Comparison Framework -- Towards Trust in Digital Rights Management Systems -- Cluster-Based Analysis and Recommendation of Sellers in Online Auctions -- Trust Model Architecture: Defining Prejudice by Learning -- Session 7: Security Protocols -- How to Protect a Signature from Being Shown to a Third Party -- Security Analysis and Improvement for Key IssuingSchemes in ID-Based Cryptography -- A Secure E-Tender Submission Protocol -- Session 8: Security and Privacy in Mobile Environments -- A Sophisticated Solution for Revealing Attacks on Wireless LAN -- Information Leakage in Ubiquitous Voice-over-IP Communications.
520 _aThis book presents the proceedings of the Third International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2006), held in Kraków, Poland, September 5-7, 2006. The conference continues from previous events held in Zaragoza (2004) and Copenhagen (2005), and maintains the aim of bringing together academic researchers and industry developers to discuss the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Kraków to participate and debate the new emerging advances in this area. The conference programme included two keynote presentations, one panel session and eight technical papers sessions. The keynote speeches were delivered by Jeremy Ward from Symantec EMEA on the topic of "Building the Information Assurance Community of Purpose", and by Günter Karjoth from IBM Research - Zurich, with a talk entitled "Privacy Practices and Economics -- From Privacy Policies to Privacy SLAs. " The subject of the panel discussion was "Is Security Without Trust Feasible?" chaired by Leszek T. Lilien from Western Michigan University, USA. The reviewed paper sessions covered a broad range of topics, from access control models to security and risk management, and from privacy and identity management to security protocols. The conference attracted 70 submissions, each of which was assigned to four referees for review. The Programme Committee ultimately accepted 24 papers for inclusion, which were revised based upon comments from their reviews.
650 0 _aComputers and civilization.
_921733
650 0 _aElectronic data processing
_xManagement.
_9139264
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer networks .
_931572
650 0 _aOperating systems (Computers).
_95329
650 0 _aBusiness information services.
_928705
650 1 4 _aComputers and Society.
_931668
650 2 4 _aIT Operations.
_931703
650 2 4 _aCryptology.
_931769
650 2 4 _aComputer Communication Networks.
_9139265
650 2 4 _aOperating Systems.
_937074
650 2 4 _aIT in Business.
_933373
700 1 _aFischer-Hübner, Simone.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9139266
700 1 _aFurnell, Steven.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9139267
700 1 _aLambrinoudakis, Costas.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9139268
710 2 _aSpringerLink (Online service)
_9139269
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540377504
776 0 8 _iPrinted edition:
_z9783540828150
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v4083
_9139270
856 4 0 _uhttps://doi.org/10.1007/11824633
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c92818
_d92818