LEADER 07129nam 22008295 450 001 996466165403316 005 20200630011944.0 010 $a3-540-37752-2 024 7 $a10.1007/11824633 035 $a(CKB)1000000000284041 035 $a(SSID)ssj0000320507 035 $a(PQKBManifestationID)11937788 035 $a(PQKBTitleCode)TC0000320507 035 $a(PQKBWorkID)10248454 035 $a(PQKB)10435313 035 $a(DE-He213)978-3-540-37752-8 035 $a(MiAaPQ)EBC3068131 035 $a(PPN)123137616 035 $a(EXLCZ)991000000000284041 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTrust and Privacy in Digital Business$b[electronic resource] $eThird International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings /$fedited by Simone Fischer-Hübner, Steven Furnell, Costas Lambrinoudakis 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (XIV, 250 p.) 225 1 $aSecurity and Cryptology ;$v4083 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-37750-6 320 $aIncludes bibliographical references and index. 327 $aSession 1: Privacy and Identity Management -- Towards Scalable Management of Privacy Obligations in Enterprises -- A New User-Centric Identity Management Infrastructure for Federated Systems -- Session 2: Security and Risk Management -- Information Security Risk Assessment Model for Risk Management -- On the Limits of Cyber-Insurance -- Towards a Risk Management Perspective on AAIs -- Session 3: Security Requirements and Development -- Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes -- A Framework for Exploiting Security Expertise in Application Development -- On Diffusion and Confusion ? Why Electronic Signatures Have Failed -- Session 4: Privacy Enhancing Technologies and Privacy Management -- Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy -- A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises -- A Generic Privacy Enhancing Technology for Pervasive Computing Environments -- Bringing the User Back into Control: A New Paradigm for Usability in Highly Dynamic Systems -- Session 5: Access Control Models -- Extending SQL to Allow the Active Usage of Purposes -- FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy -- A Framework for Modeling Restricted Delegation in Service Oriented Architecture -- Session 6: Trust and Reputation -- Reputation-Based Trust Systems for P2P Applications: Design Issues and Comparison Framework -- Towards Trust in Digital Rights Management Systems -- Cluster-Based Analysis and Recommendation of Sellers in Online Auctions -- Trust Model Architecture: Defining Prejudice by Learning -- Session 7: Security Protocols -- How to Protect a Signature from Being Shown to a Third Party -- Security Analysis and Improvement for Key Issuing Schemes in ID-Based Cryptography -- A Secure E-Tender Submission Protocol -- Session 8: Security and Privacy in Mobile Environments -- A Sophisticated Solution for Revealing Attacks on Wireless LAN -- Information Leakage in Ubiquitous Voice-over-IP Communications. 330 $aThis book presents the proceedings of the Third International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2006), held in Kraków, Poland, September 5-7, 2006. The conference continues from previous events held in Zaragoza (2004) and Copenhagen (2005), and maintains the aim of bringing together academic researchers and industry developers to discuss the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Kraków to participate and debate the new emerging advances in this area. The conference programme included two keynote presentations, one panel session and eight technical papers sessions. The keynote speeches were delivered by Jeremy Ward from Symantec EMEA on the topic of ?Building the Information Assurance Community of Purpose?, and by Günter Karjoth from IBM Research - Zurich, with a talk entitled ?Privacy Practices and Economics ?? From Privacy Policies to Privacy SLAs. ? The subject of the panel discussion was ?Is Security Without Trust Feasible?? chaired by Leszek T. Lilien from Western Michigan University, USA. The reviewed paper sessions covered a broad range of topics, from access control models to security and risk management, and from privacy and identity management to security protocols. The conference attracted 70 submissions, each of which was assigned to four referees for review. The Programme Committee ultimately accepted 24 papers for inclusion, which were revised based upon comments from their reviews. 410 0$aSecurity and Cryptology ;$v4083 606 $aComputers and civilization 606 $aManagement information systems 606 $aComputer science 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aOperating systems (Computers) 606 $aInformation technology 606 $aBusiness?Data processing 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aIT in Business$3https://scigraph.springernature.com/ontologies/product-market-codes/522000 615 0$aComputers and civilization. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aOperating systems (Computers). 615 0$aInformation technology. 615 0$aBusiness?Data processing. 615 14$aComputers and Society. 615 24$aManagement of Computing and Information Systems. 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aIT in Business. 676 $a005.8 702 $aFischer-Hübner$b Simone$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFurnell$b Steven$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLambrinoudakis$b Costas$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996466165403316 996 $aTrust and Privacy in Digital Business$9774260 997 $aUNISA