| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996465704503316 |
|
|
Titolo |
Trust, Privacy, and Security in Digital Business [[electronic resource] ] : 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings / / edited by Steven Furnell, Costas Lambrinoudakis, Javier López |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2013.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (X, 199 p. 54 illus.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 8058 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data mining |
Database management |
Artificial intelligence |
Data Mining and Knowledge Discovery |
Database Management |
Artificial Intelligence |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di contenuto |
|
Access control and authentication -- Identity and trust management -- privacy and confidentiality management -- Information systems security -- Security policies/legal issues.- Trust and privacy in mobile and pervasive environments. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 10th International Conference on Trust and Privacy in Digital Business, TrustBus 2013, held in Prague, Czech Republic, in August 2013 in conjunction with DEXA 2013. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: access control and authentication; identity and trust management; privacy and confidentiality management; information systems security; security policies/legal issues; and trust and privacy in mobile and pervasive environments. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996465904603316 |
|
|
Titolo |
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011, Proceedings / / edited by Steven Furnell, Costas Lambrinoudakis, Günther Pernul |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2011.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XII, 223 p.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 6863 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer communication systems |
Management information systems |
Computer science |
Data encryption (Computer science) |
Computers and civilization |
Application software |
Algorithms |
Computer Communication Networks |
Management of Computing and Information Systems |
Cryptology |
Computers and Society |
Information Systems Applications (incl. Internet) |
Algorithm Analysis and Problem Complexity |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2011, held in Toulouse, France, in August/September 2011 in conjunction with DEXA 2011. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: identity and trust |
|
|
|
|
|
|
|
|
|
|
management; security and privacy models for pervasive information systems; reliability and security of content and data; authentication and authorization in digital business; intrusion detection and information filtering; management of privacy and confidentiality; and cryptographic protocols/usability of security. |
|
|
|
|
|
| |