LEADER 06983nam 22008055 450 001 996465313003316 005 20201019142045.0 010 $a3-319-44341-0 024 7 $a10.1007/978-3-319-44341-6 035 $a(CKB)3710000000837722 035 $a(DE-He213)978-3-319-44341-6 035 $a(MiAaPQ)EBC6302914 035 $a(MiAaPQ)EBC5591415 035 $a(Au-PeEL)EBL5591415 035 $a(OCoLC)956426384 035 $a(PPN)194804089 035 $a(EXLCZ)993710000000837722 100 $a20160805d2016 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTrust, Privacy and Security in Digital Business$b[electronic resource] $e13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings /$fedited by Sokratis Katsikas, Costas Lambrinoudakis, Steven Furnell 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (IX, 123 p. 30 illus.) 225 1 $aSecurity and Cryptology ;$v9830 311 $a3-319-44340-2 327 $aIntro -- Preface -- Organization -- Contents -- Security, Privacy and Trust in eServices -- A Framework for Systematic Analysis and Modeling of Trustworthiness Requirements Using i* and BPMN -- 1 Introduction -- 2 Background and Fundamentals -- 3 Framework for Systematic Analysis and Modeling of Trustworthiness Requirements -- 3.1 Conceptual Model -- 3.2 The Method for Systematic Analysis of Trustworthiness Requirements -- 4 Application Example -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Automatic Enforcement of Security Properties -- 1 Introduction -- 2 Motivating Case Study -- 3 Capturing the Security Variability -- 3.1 Resolving the Variability of the Application -- 4 Supporting the Composition Process -- 4.1 Automatically Identifying the Join Points -- 4.2 Verifying the Security Requirements -- 5 Evaluation Results and Discussion -- 6 Related Work -- 7 Conclusions and Future Work -- References -- Security and Privacy in Cloud Computing -- Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems -- Abstract -- 1 Introduction -- 2 A Process for Cloud-Forensic Investigation -- 2.1 The Process -- 3 Meta-Model -- 4 Running Example -- 5 Conclusions -- References -- Modelling Secure Cloud Computing Systems from a Security Requirements Perspective -- 1 Introduction -- 2 Health-Care Running Example -- 3 Cloud Modelling Language -- 3.1 Security Requirements Engineering Concepts -- 3.2 Cloud Computing Concepts -- 3.3 Cloud Environment Model -- 4 Related Work -- 5 Conclusion -- References -- Privacy Requirements -- Bottom-Up Cell Suppression that Preserves the Missing-at-random Condition -- 1 Introduction -- 2 Background -- 2.1 Preliminaries -- 2.2 k-Anonymity -- 2.3 Bottom-Up Cell Suppression -- 3 The Proposed Method -- 3.1 Naive Bayes Classification -- 3.2 The Missing-at-random Condition. 327 $a3.3 Cell-Suppression Cost for Preserving the MAR Condition -- 4 Experimental Results -- 5 Concluding Remarks -- References -- Understanding the Privacy Goal Intervenability -- 1 Introduction -- 2 Deriving and Structuring Requirements on Intervenability -- 2.1 Requirements Identification from Privacy Principles and Legislation -- 2.2 Setting up an Intervenability Requirements Taxonomy -- 3 Validation of the Taxonomy Using Related Literature -- 4 Conclusions -- References -- Information Audit and Trust -- Design of a Log Management Infrastructure Using Meta-Network Analysis -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Validating the Log Management Infrastructure Design Structure -- 3.1 Modeling a Log Management Infrastructure as a Social Network -- 3.2 Modeling the Log Management Infrastructure as a Meta-Network -- 3.3 Validating and Improving the Design Structure -- 4 An Example Case Study -- 5 Conclusions and Future Work -- References -- The Far Side of Mobile Application Integrated Development Environments -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Anatomy of iOS Application -- 4 Provisioning Profiles -- 5 Attack Types -- 5.1 Replication -- 5.2 Malicious Payload Injection -- 6 Conclusions -- References -- Author Index. 330 $aThis book constitutes the refereed proceedings of the 13th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2016, held in Porto, Portugal, in September 2016 in conjunction with DEXA 2016. The 8 revised full papers presented were carefully reviewed and selected from 18 submissions. The papers are organized in the following topical sections: security, privacy and trust in eServices; security and privacy in cloud computing; privacy requirements; and information audit and trust. 410 0$aSecurity and Cryptology ;$v9830 606 $aComputer security 606 $aSoftware engineering 606 $aData encryption (Computer science) 606 $aApplication software 606 $aManagement information systems 606 $aComputer science 606 $aComputer communication systems 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aComputer security. 615 0$aSoftware engineering. 615 0$aData encryption (Computer science). 615 0$aApplication software. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer communication systems. 615 14$aSystems and Data Security. 615 24$aSoftware Engineering. 615 24$aCryptology. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aManagement of Computing and Information Systems. 615 24$aComputer Communication Networks. 676 $a658.478 702 $aKatsikas$b Sokratis$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLambrinoudakis$b Costas$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFurnell$b Steven$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465313003316 996 $aTrust, Privacy and Security in Digital Business$9772437 997 $aUNISA