LEADER 04329nam 2200673Ia 450 001 9910484369403321 005 20200520144314.0 010 $a3-642-03748-8 024 7 $a10.1007/978-3-642-03748-1 035 $a(CKB)1000000000784764 035 $a(SSID)ssj0000320515 035 $a(PQKBManifestationID)11256855 035 $a(PQKBTitleCode)TC0000320515 035 $a(PQKBWorkID)10249337 035 $a(PQKB)11715054 035 $a(DE-He213)978-3-642-03748-1 035 $a(MiAaPQ)EBC3064502 035 $a(PPN)139951067 035 $a(EXLCZ)991000000000784764 100 $a20091023d2009 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTrust, privacy and security in digital business $e6th international conference; TrustBus 2009, Linz, Austria, September 3 - 4, 2009, proceedings /$fSimone Fischer-Hubner, Costas Lambrinoudakis, Gunther Pernul (Eds.) 205 $a1st ed. 2009. 210 $aBerlin ;$aHeidelberg ;$aNew York $cSpringer$dc2009 215 $a1 online resource (XII, 169 p.) 225 1 $aLecture notes in computer science ;$v5695 300 $aInternational conference proceedings. 311 $a3-642-03747-X 320 $aIncludes bibliographical references and index. 327 $aUser Profiling and Privacy in Digital Business -- User Profiling and Re-identification: Case of University-Wide Network Analysis -- Search Engines: Gateway to a New ?Panopticon?? -- Privacy Enhancing Technologies and Identity Management -- Supporting Local Aliases as Usable Presentation of Secure Pseudonyms -- A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking -- An Anonymous Credit Card System -- Security and Privacy in Real Life Applications -- A Cluster-Based Framework for the Security of Medical Sensor Environments -- Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: An Action-Based Approach -- A Formalization of HIPAA for a Medical Messaging System -- Reputation and Security Measurements -- Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems -- Steering Security through Measurement -- Advanced Features in Bayesian Reputation Systems -- Access Control -- An MDA-Based Environment for Generating Access Control Policies -- An Extended Role-Based Access Control Model for Delegating Obligations -- The OPL Access Control Policy Language -- Authentication and Authorisation -- Operational Semantics for DKAL: Application and Analysis -- HB???MAC: Improving the Random???HB # Authentication Protocol. 330 $aThis book constitutes the refereed proceedings of the 6th International Conference on Trust and Privacy in Digital Business, TrustBus 2009, held in Linz, Austria, in September 2009 in conjunction with DEXA 2009. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on user profiling and privacy in digital business; privacy enhancing technologies and identity management; security and privacy in real life applications; reputation and security measurements; access control; and authentication and authorisation. 410 0$aLecture notes in computer science ;$v5695. 517 3 $aTrustBus 2009 606 $aComputer security$vCongresses 606 $aElectronic commerce$xSecurity measures$vCongresses 606 $aBusiness enterprises$xComputer networks$xSecurity measures$vCongresses 606 $aComputer networks$xSecurity measures$vCongresses 606 $aComputer networks$xAccess control$vCongresses 615 0$aComputer security 615 0$aElectronic commerce$xSecurity measures 615 0$aBusiness enterprises$xComputer networks$xSecurity measures 615 0$aComputer networks$xSecurity measures 615 0$aComputer networks$xAccess control 676 $a005.8 701 $aFischer-Hubner$b Simone$0552818 701 $aLambrinoudakis$b Costas$01731902 701 $aPernul$b G$g(Gunther),$f1961-$01220848 712 12$aTrustBus 2009 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484369403321 996 $aTrust, privacy and security in digital business$94201998 997 $aUNINA