Trust, privacy and security in digital business : 7th international conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, proceedings / Sokratis Katsikas, Javier Lopez, Miguel Soriano (eds.).

By: (7th : TrustBus (Conference) (7th : 2010 : Bilbao, Spain)
Contributor(s): Katsikas, Sokratis K | López, Javier | Soriano, Miguel
Material type: TextTextSeries: SerienbezeichnungLecture notes in computer science: 6264.; LNCS sublibrary: Publisher: Berlin : Springer, 2010Description: 1 online resource (xii, 249 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783642151521; 3642151523; 3642151515; 9783642151514Subject(s): Electronic commerce -- Security measures -- Congresses | Computer networks -- Security measures -- Congresses | Informatique | Computer networks -- Security measures | Electronic commerce -- Security measures | Electronic Commerce | Datensicherung | Bilbao <2010> | informatiesystemen | information systems | computers | samenleving | society | internet | algoritmen | algorithms | computeranalyse | computer analysis | computerwetenschappen | computer sciences | computernetwerken | computer networks | gegevensbeheer | data management | Information and Communication Technology (General) | Informatie- en communicatietechnologie (algemeen)Genre/Form: Electronic books. | Conference papers and proceedings. | Kongress. Additional physical formats: Print version:: Trust, privacy and security in digital business.DDC classification: 381.142 LOC classification: HF5548.32 | .T78 2010Online resources: Click here to access online
Contents:
Invited Talk -- Usage Control, Risk and Trust -- Prevention Systems -- Attacking Image Recognition Captchas -- An Insider Threat Prediction Model -- A Call Conference Room Interception Attack and Its Detection -- Safe and Efficient Strategies for Updating Firewall Policies -- Privacy I -- A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression -- Context-Aware Privacy Design Pattern Selection -- Real-Time Remote Attestation with Privacy Protection -- Private Searching on MapReduce -- Privacy II -- In Search of Search Privacy -- Untraceability and Profiling Are Not Mutually Exclusive -- Privacy Policy Referencing -- Access Control -- Formal Proof of Cooperativeness in a Multi-Party P2P Content Authentication Protocol -- Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation -- An Agent Based Back-End RFID Tag Management System -- Security and Trust Concepts -- Assessing the Usability of End-User Security Software -- Building ISMS through the Reuse of Knowledge -- Mechanizing Social Trust-Aware Recommenders with T-Index Augmented Trustworthiness -- Security for Dynamic Collaborations -- Security for Dynamic Service-Oriented eCollaboration -- Analyzing Information Security Awareness through Networks of Association -- Efficiency Improvement of Homomorphic E-Auction.
Summary: This book constitutes the refereed proceedings of the 7th International Conference on Trust, Privacy and Digital Business, TrustBus 2010, held in Bilbao, Spain, in August 2010. The papers are organized in topical sections on prevention systems; privacy; access control; security and trust concepts; and security for dynamic collaborations.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Includes bibliographical references and index.

This book constitutes the refereed proceedings of the 7th International Conference on Trust, Privacy and Digital Business, TrustBus 2010, held in Bilbao, Spain, in August 2010. The papers are organized in topical sections on prevention systems; privacy; access control; security and trust concepts; and security for dynamic collaborations.

Invited Talk -- Usage Control, Risk and Trust -- Prevention Systems -- Attacking Image Recognition Captchas -- An Insider Threat Prediction Model -- A Call Conference Room Interception Attack and Its Detection -- Safe and Efficient Strategies for Updating Firewall Policies -- Privacy I -- A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression -- Context-Aware Privacy Design Pattern Selection -- Real-Time Remote Attestation with Privacy Protection -- Private Searching on MapReduce -- Privacy II -- In Search of Search Privacy -- Untraceability and Profiling Are Not Mutually Exclusive -- Privacy Policy Referencing -- Access Control -- Formal Proof of Cooperativeness in a Multi-Party P2P Content Authentication Protocol -- Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation -- An Agent Based Back-End RFID Tag Management System -- Security and Trust Concepts -- Assessing the Usability of End-User Security Software -- Building ISMS through the Reuse of Knowledge -- Mechanizing Social Trust-Aware Recommenders with T-Index Augmented Trustworthiness -- Security for Dynamic Collaborations -- Security for Dynamic Service-Oriented eCollaboration -- Analyzing Information Security Awareness through Networks of Association -- Efficiency Improvement of Homomorphic E-Auction.

There are no comments for this item.

to post a comment.

Powered by Koha