LEADER 05388nam 22008415 450 001 996465307803316 005 20200703013511.0 010 $a3-642-03748-8 024 7 $a10.1007/978-3-642-03748-1 035 $a(CKB)1000000000784764 035 $a(SSID)ssj0000320515 035 $a(PQKBManifestationID)11256855 035 $a(PQKBTitleCode)TC0000320515 035 $a(PQKBWorkID)10249337 035 $a(PQKB)11715054 035 $a(DE-He213)978-3-642-03748-1 035 $a(MiAaPQ)EBC3064502 035 $a(PPN)139951067 035 $a(EXLCZ)991000000000784764 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTrust, Privacy and Security in Digital Business$b[electronic resource] $e6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009, Proceedings /$fedited by Simone Fischer-Hübner, Costas Lambrinoudakis, Günther Pernul 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XII, 169 p.) 225 1 $aSecurity and Cryptology ;$v5695 300 $aInternational conference proceedings. 311 $a3-642-03747-X 320 $aIncludes bibliographical references and index. 327 $aUser Profiling and Privacy in Digital Business -- User Profiling and Re-identification: Case of University-Wide Network Analysis -- Search Engines: Gateway to a New ?Panopticon?? -- Privacy Enhancing Technologies and Identity Management -- Supporting Local Aliases as Usable Presentation of Secure Pseudonyms -- A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking -- An Anonymous Credit Card System -- Security and Privacy in Real Life Applications -- A Cluster-Based Framework for the Security of Medical Sensor Environments -- Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: An Action-Based Approach -- A Formalization of HIPAA for a Medical Messaging System -- Reputation and Security Measurements -- Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems -- Steering Security through Measurement -- Advanced Features in Bayesian Reputation Systems -- Access Control -- An MDA-Based Environment for Generating Access Control Policies -- An Extended Role-Based Access Control Model for Delegating Obligations -- The OPL Access Control Policy Language -- Authentication and Authorisation -- Operational Semantics for DKAL: Application and Analysis -- HB???MAC: Improving the Random???HB # Authentication Protocol. 330 $aThis book constitutes the refereed proceedings of the 6th International Conference on Trust and Privacy in Digital Business, TrustBus 2009, held in Linz, Austria, in September 2009 in conjunction with DEXA 2009. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on user profiling and privacy in digital business; privacy enhancing technologies and identity management; security and privacy in real life applications; reputation and security measurements; access control; and authentication and authorisation. 410 0$aSecurity and Cryptology ;$v5695 606 $aComputer security 606 $aE-commerce 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aComputer communication systems 606 $aInformation technology 606 $aBusiness?Data processing 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aIT in Business$3https://scigraph.springernature.com/ontologies/product-market-codes/522000 615 0$aComputer security. 615 0$aE-commerce. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer communication systems. 615 0$aInformation technology. 615 0$aBusiness?Data processing. 615 14$aSystems and Data Security. 615 24$ae-Commerce/e-business. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aComputer Communication Networks. 615 24$aIT in Business. 676 $a005.8 702 $aFischer-Hübner$b Simone$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLambrinoudakis$b Costas$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPernul$b Günther$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aTrustBus 2009 906 $aBOOK 912 $a996465307803316 996 $aTrust, Privacy and Security in Digital Business$9772437 997 $aUNISA