LEADER 04378nam 2200649 450 001 996465658603316 005 20211008144420.0 010 $a3-540-85735-4 024 7 $a10.1007/978-3-540-85735-8 035 $a(CKB)1000000000491052 035 $a(SSID)ssj0000727458 035 $a(PQKBManifestationID)11426950 035 $a(PQKBTitleCode)TC0000727458 035 $a(PQKBWorkID)10688504 035 $a(PQKB)11387363 035 $a(DE-He213)978-3-540-85735-8 035 $a(MiAaPQ)EBC3063515 035 $a(MiAaPQ)EBC6511655 035 $a(Au-PeEL)EBL6511655 035 $a(OCoLC)1166298640 035 $a(PPN)128126345 035 $a(EXLCZ)991000000000491052 100 $a20211008d2008 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aTrust, privacy and security in digital business $e4th international conference, TrustBus 2007, Regensburg, Germany, September 4-6, 2007 : proceedings /$fSteven M. Furnell, Sokratis Katsikas and Antonio Lioy (eds.) 205 $a1st ed. 2008. 210 1$aBerlin, Germany ;$aNew York, New York :$cSpringer,$d[2008] 210 4$dİ2008 215 $a1 online resource (X, 205 p.) 225 1 $aSecurity and Cryptology ;$v5185 300 $aIncludes index. 311 $a3-540-85734-6 320 $aIncludes bibliographical references and index. 327 $aInvited Lecture -- Biometrics ? How to Put to Use and How Not at All? -- Trust -- A Map of Trust between Trading Partners -- Implementation of a TCG-Based Trusted Computing in Mobile Device -- A Model for Trust Metrics Analysis -- Authentication, Authorization and Access Control -- Patterns and Pattern Diagrams for Access Control -- A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications -- A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony -- Reputation Systems -- Multilateral Secure Cross-Community Reputation Systems for Internet Communities -- Fairness Emergence through Simple Reputation -- Combining Trust and Reputation Management for Web-Based Services -- Security Policies and Identity Management -- Controlling Usage in Business Process Workflows through Fine-Grained Security Policies -- Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy -- BusiROLE: A Model for Integrating Business Roles into Identity Management -- Intrusion Detection and Applications of Game Theory to IT Security Problems -- The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset -- A Generic Intrusion Detection Game Model in IT Security -- On the Design Dilemma in Dining Cryptographer Networks -- Privacy -- Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing -- A User-Centric Protocol for Conditional Anonymity Revocation -- Preservation of Privacy in Thwarting the Ballot Stuffing Scheme. 330 $aThis book constitutes the refereed proceedings of the 5th International Conference on Trust and Privacy in Digital Business, TrustBus 2008, held in Turin, Italy, in September 2008 in conjunction with DEXA 2008. The 18 revised full papers presented together with 1 invited keynote lecture were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on trust, authentication, authorization and access control, reputation systems, security policies and identity management, intrusion detection and applications of game theory to IT security problems, and privacy. 410 0$aSecurity and Cryptology ;$v5185 606 $aPublic key infrastructure (Computer security)$vCongresses 606 $aData transmission systems$xSecurity measures$vCongresses 606 $aElectronic commerce$xSecurity measures$vCongresses 615 0$aPublic key infrastructure (Computer security) 615 0$aData transmission systems$xSecurity measures 615 0$aElectronic commerce$xSecurity measures 676 $a005.8 702 $aKatsikas$b Sokratis 702 $aLioy$b Antonio$f1958- 702 $aFurnell$b Steven$f1970- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465658603316 996 $aTrust, Privacy and Security in Digital Business$9772437 997 $aUNISA