04398nam 2200685 a 450 991048316630332120200520144314.03-540-37752-210.1007/11824633(CKB)1000000000284041(SSID)ssj0000320507(PQKBManifestationID)11937788(PQKBTitleCode)TC0000320507(PQKBWorkID)10248454(PQKB)10435313(DE-He213)978-3-540-37752-8(MiAaPQ)EBC3068131(PPN)123137616(EXLCZ)99100000000028404120060719d2006 uy 0engurnn#008mamaatxtccrTrust, privacy, and security in digital business third international conference, TrustBus 2006, Krakow, Poland, September 2006 : proceedings /Simone Fischer-Hubner, Steven Furnell, Costas Lambrinoudakis (eds.)1st ed. 2006.Berlin ;New York Springerc20061 online resource (XIV, 250 p.)Lecture notes in computer science,0302-9743 ;4083LNCS sublibrary. SL 4, Security and cryptologyBibliographic Level Mode of Issuance: Monograph3-540-37750-6 Includes bibliographical references and index.Privacy and identity management -- Security and risk management -- Security requirements and development -- Privacy enhancing technologies and privacy management -- Access control models -- Trust and reputation -- Security protocols -- Security and privacy in mobile environments.This book presents the proceedings of the Third International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2006), held in Kraków, Poland, September 5-7, 2006. The conference continues from previous events held in Zaragoza (2004) and Copenhagen (2005), and maintains the aim of bringing together academic researchers and industry developers to discuss the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Kraków to participate and debate the new emerging advances in this area. The conference programme included two keynote presentations, one panel session and eight technical papers sessions. The keynote speeches were delivered by Jeremy Ward from Symantec EMEA on the topic of “Building the Information Assurance Community of Purpose”, and by Günter Karjoth from IBM Research - Zurich, with a talk entitled “Privacy Practices and Economics –– From Privacy Policies to Privacy SLAs. ” The subject of the panel discussion was “Is Security Without Trust Feasible?” chaired by Leszek T. Lilien from Western Michigan University, USA. The reviewed paper sessions covered a broad range of topics, from access control models to security and risk management, and from privacy and identity management to security protocols. The conference attracted 70 submissions, each of which was assigned to four referees for review. The Programme Committee ultimately accepted 24 papers for inclusion, which were revised based upon comments from their reviews.Lecture notes in computer science ;4083.LNCS sublibrary.SL 4,Security and cryptology.TrustBus 2006Public key infrastructure (Computer security)CongressesData transmission systemsSecurity measuresCongressesElectronic commerceSecurity measuresCongressesBusiness enterprisesComputer networksSecurity measuresCongressesComputer securityCongressesPublic key infrastructure (Computer security)Data transmission systemsSecurity measuresElectronic commerceSecurity measuresBusiness enterprisesComputer networksSecurity measuresComputer security005.8Fischer-Hubner Simone552818Furnell Steven1970-846860Lambrinoudakis Costas1731902MiAaPQMiAaPQMiAaPQBOOK9910483166303321Trust, privacy, and security in digital business4190016UNINA