Costas Lambrinoudakis / Günther Pernul / A Min Tjoa (eds.)4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings
Trust, Privacy and Security in Digital Business
4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings
Herausgegeben:Lambrinoudakis, Costas; Pernul, Günther; Tjoa, A Min
Costas Lambrinoudakis / Günther Pernul / A Min Tjoa (eds.)4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings
Trust, Privacy and Security in Digital Business
4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings
Herausgegeben:Lambrinoudakis, Costas; Pernul, Günther; Tjoa, A Min
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This volume features the refereed proceedings of the 4th International Conference on Trust and Privacy in Digital Business. The 28 papers were all carefully reviewed. They cover privacy and identity management, security and risk management, security requirements and development, privacy enhancing technologies and privacy management, access control models, trust and reputation, security protocols, and security and privacy in mobile environments.
Andere Kunden interessierten sich auch für
- Eberhard von FaberSecure ICT Service Provisioning for Cloud, Mobile and Beyond34,99 €
- Principles of Security and Trust41,99 €
- Radio Frequency Identification and IoT Security41,99 €
- Ludger Fiege / Gero Mühl / Uwe Wilhelm (eds.)Electronic Commerce42,99 €
- BauknechtE-Commerce and Web Technologies42,99 €
- Financial Cryptography and Data Security37,99 €
- Trust Management XI41,99 €
-
-
-
This volume features the refereed proceedings of the 4th International Conference on Trust and Privacy in Digital Business. The 28 papers were all carefully reviewed. They cover privacy and identity management, security and risk management, security requirements and development, privacy enhancing technologies and privacy management, access control models, trust and reputation, security protocols, and security and privacy in mobile environments.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 4657
- Verlag: Springer, Berlin
- Artikelnr. des Verlages: 12112197
- 2007
- Seitenzahl: 308
- Erscheinungstermin: 22. August 2007
- Englisch
- Abmessung: 235mm x 155mm x 17mm
- Gewicht: 476g
- ISBN-13: 9783540744085
- ISBN-10: 3540744088
- Artikelnr.: 23039629
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes in Computer Science 4657
- Verlag: Springer, Berlin
- Artikelnr. des Verlages: 12112197
- 2007
- Seitenzahl: 308
- Erscheinungstermin: 22. August 2007
- Englisch
- Abmessung: 235mm x 155mm x 17mm
- Gewicht: 476g
- ISBN-13: 9783540744085
- ISBN-10: 3540744088
- Artikelnr.: 23039629
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Trustbus'07 Keynote Talk Privacy Enhanced Personalization.- Trustbus'07 Keynote Talk Privacy Enhanced Personalization.- Panel Discussion Managing Digital Identities - Challenges and Opportunities.- Session 1: Secure and Trusted Virtual Organisations.- Recognition of Authority in Virtual Organisations.- Securing VO Management.- Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship.- Specification of the TrustMan System for Assisting Management of VBEs.- Session 2: Privacy in Digital Business.- A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third Party.- Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures.- Privacy Assurance: Bridging the Gap Between Preference and Practice.- Session 3: Identity Management and Usage Control.- Enhancing Optimistic Access Controls with Usage Control.- Usage Control in Service-Oriented Architectures.- On Device-Based Identity Management in Enterprises.- Analysis-Level Classes from Secure Business Processes Through Model Transformations.- Session 4: Authentication and Access Control.- A Trust and Context Aware Access Control Model for Web Services Conversations.- Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains.- On Device Authentication in Wireless Networks: Present Issues and Future Challenges.- Session 5: Compliance and User Privacy.- The Meaning of Logs.- Data Protection and Privacy Laws in the Light of RFID and Emerging Technologies.- Consistency of User Attribute in Federated Systems.- Session 6: Policy Management.- Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes.- Situation-Based Policy Enforcement.- Using Purpose Lattices to FacilitateCustomisation of Privacy Agreements.- A Pattern-Driven Framework for Monitoring Security and Dependability.- Session 7: Security System Management.- Security Aspects for Secure Download of Regulated Software.- Using the Lens of Circuits of Power in Information Systems Security Management.- Fuzzy Service Selection and Interaction Review in Distributed Electronic Markets.- Session 8: Security and Trust.- X316 Security Toolbox for New Generation of Certificate.- Detecting Malicious SQL.- Trusted Code Execution in JavaCard.- How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards.
Trustbus'07 Keynote Talk Privacy Enhanced Personalization.- Trustbus'07 Keynote Talk Privacy Enhanced Personalization.- Panel Discussion Managing Digital Identities - Challenges and Opportunities.- Session 1: Secure and Trusted Virtual Organisations.- Recognition of Authority in Virtual Organisations.- Securing VO Management.- Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship.- Specification of the TrustMan System for Assisting Management of VBEs.- Session 2: Privacy in Digital Business.- A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third Party.- Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures.- Privacy Assurance: Bridging the Gap Between Preference and Practice.- Session 3: Identity Management and Usage Control.- Enhancing Optimistic Access Controls with Usage Control.- Usage Control in Service-Oriented Architectures.- On Device-Based Identity Management in Enterprises.- Analysis-Level Classes from Secure Business Processes Through Model Transformations.- Session 4: Authentication and Access Control.- A Trust and Context Aware Access Control Model for Web Services Conversations.- Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains.- On Device Authentication in Wireless Networks: Present Issues and Future Challenges.- Session 5: Compliance and User Privacy.- The Meaning of Logs.- Data Protection and Privacy Laws in the Light of RFID and Emerging Technologies.- Consistency of User Attribute in Federated Systems.- Session 6: Policy Management.- Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes.- Situation-Based Policy Enforcement.- Using Purpose Lattices to FacilitateCustomisation of Privacy Agreements.- A Pattern-Driven Framework for Monitoring Security and Dependability.- Session 7: Security System Management.- Security Aspects for Secure Download of Regulated Software.- Using the Lens of Circuits of Power in Information Systems Security Management.- Fuzzy Service Selection and Interaction Review in Distributed Electronic Markets.- Session 8: Security and Trust.- X316 Security Toolbox for New Generation of Certificate.- Detecting Malicious SQL.- Trusted Code Execution in JavaCard.- How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards.