000 04736nam a22006495i 4500
001 978-3-540-85735-8
003 DE-He213
005 20240730194442.0
007 cr nn 008mamaa
008 100301s2008 gw | s |||| 0|eng d
020 _a9783540857358
_9978-3-540-85735-8
024 7 _a10.1007/978-3-540-85735-8
_2doi
050 4 _aQA76.9.C66
072 7 _aUBJ
_2bicssc
072 7 _aCOM079000
_2bisacsh
072 7 _aUBJ
_2thema
082 0 4 _a303.4834
_223
245 1 0 _aTrust, Privacy and Security in Digital Business
_h[electronic resource] :
_b5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings /
_cedited by Steven M. Furnell, Sokratis Katsikas, Antonio Lioy.
250 _a1st ed. 2008.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2008.
300 _aX, 205 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v5185
505 0 _aInvited Lecture -- Biometrics - How to Put to Use and How Not at All? -- Trust -- A Map of Trust between Trading Partners -- Implementation of a TCG-Based Trusted Computing in Mobile Device -- A Model for Trust Metrics Analysis -- Authentication, Authorization and Access Control -- Patterns and Pattern Diagrams for Access Control -- A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications -- A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony -- Reputation Systems -- Multilateral Secure Cross-Community Reputation Systems for Internet Communities -- Fairness Emergence through Simple Reputation -- Combining Trust and Reputation Management for Web-Based Services -- Security Policies and Identity Management -- Controlling Usage in Business Process Workflows through Fine-Grained Security Policies -- Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy -- BusiROLE: A Model for Integrating Business Roles into Identity Management -- Intrusion Detection and Applications of Game Theory to IT Security Problems -- The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset -- A Generic Intrusion Detection Game Model in IT Security -- On the Design Dilemma in Dining Cryptographer Networks -- Privacy -- Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing -- A User-Centric Protocol for Conditional Anonymity Revocation -- Preservation of Privacy in Thwarting the Ballot Stuffing Scheme.
520 _aThis book constitutes the refereed proceedings of the 5th International Conference on Trust and Privacy in Digital Business, TrustBus 2008, held in Turin, Italy, in September 2008 in conjunction with DEXA 2008. The 18 revised full papers presented together with 1 invited keynote lecture were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on trust, authentication, authorization and access control, reputation systems, security policies and identity management, intrusion detection and applications of game theory to IT security problems, and privacy.
650 0 _aComputers and civilization.
_921733
650 0 _aElectronic data processing
_xManagement.
_9157125
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer networks .
_931572
650 0 _aData protection.
_97245
650 0 _aBusiness information services.
_928705
650 1 4 _aComputers and Society.
_931668
650 2 4 _aIT Operations.
_931703
650 2 4 _aCryptology.
_931769
650 2 4 _aComputer Communication Networks.
_9157126
650 2 4 _aData and Information Security.
_931990
650 2 4 _aIT in Business.
_933373
700 1 _aFurnell, Steven M.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9157127
700 1 _aKatsikas, Sokratis.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9157128
700 1 _aLioy, Antonio.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9157129
710 2 _aSpringerLink (Online service)
_9157130
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540857341
776 0 8 _iPrinted edition:
_z9783540858102
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v5185
_9157131
856 4 0 _uhttps://doi.org/10.1007/978-3-540-85735-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c95207
_d95207