Vai al contenuto principale della pagina

Trust, Privacy and Security in Digital Business [[electronic resource] ] : 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings / / edited by Sokratis Katsikas, Costas Lambrinoudakis, Steven Furnell



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Trust, Privacy and Security in Digital Business [[electronic resource] ] : 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings / / edited by Sokratis Katsikas, Costas Lambrinoudakis, Steven Furnell Visualizza cluster
Pubblicazione: Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Edizione: 1st ed. 2016.
Descrizione fisica: 1 online resource (IX, 123 p. 30 illus.)
Disciplina: 658.478
Soggetto topico: Computer security
Software engineering
Data encryption (Computer science)
Application software
Management information systems
Computer science
Computer communication systems
Systems and Data Security
Software Engineering
Cryptology
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
Computer Communication Networks
Persona (resp. second.): KatsikasSokratis
LambrinoudakisCostas
FurnellSteven
Nota di contenuto: Intro -- Preface -- Organization -- Contents -- Security, Privacy and Trust in eServices -- A Framework for Systematic Analysis and Modeling of Trustworthiness Requirements Using i* and BPMN -- 1 Introduction -- 2 Background and Fundamentals -- 3 Framework for Systematic Analysis and Modeling of Trustworthiness Requirements -- 3.1 Conceptual Model -- 3.2 The Method for Systematic Analysis of Trustworthiness Requirements -- 4 Application Example -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Automatic Enforcement of Security Properties -- 1 Introduction -- 2 Motivating Case Study -- 3 Capturing the Security Variability -- 3.1 Resolving the Variability of the Application -- 4 Supporting the Composition Process -- 4.1 Automatically Identifying the Join Points -- 4.2 Verifying the Security Requirements -- 5 Evaluation Results and Discussion -- 6 Related Work -- 7 Conclusions and Future Work -- References -- Security and Privacy in Cloud Computing -- Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems -- Abstract -- 1 Introduction -- 2 A Process for Cloud-Forensic Investigation -- 2.1 The Process -- 3 Meta-Model -- 4 Running Example -- 5 Conclusions -- References -- Modelling Secure Cloud Computing Systems from a Security Requirements Perspective -- 1 Introduction -- 2 Health-Care Running Example -- 3 Cloud Modelling Language -- 3.1 Security Requirements Engineering Concepts -- 3.2 Cloud Computing Concepts -- 3.3 Cloud Environment Model -- 4 Related Work -- 5 Conclusion -- References -- Privacy Requirements -- Bottom-Up Cell Suppression that Preserves the Missing-at-random Condition -- 1 Introduction -- 2 Background -- 2.1 Preliminaries -- 2.2 k-Anonymity -- 2.3 Bottom-Up Cell Suppression -- 3 The Proposed Method -- 3.1 Naive Bayes Classification -- 3.2 The Missing-at-random Condition.
3.3 Cell-Suppression Cost for Preserving the MAR Condition -- 4 Experimental Results -- 5 Concluding Remarks -- References -- Understanding the Privacy Goal Intervenability -- 1 Introduction -- 2 Deriving and Structuring Requirements on Intervenability -- 2.1 Requirements Identification from Privacy Principles and Legislation -- 2.2 Setting up an Intervenability Requirements Taxonomy -- 3 Validation of the Taxonomy Using Related Literature -- 4 Conclusions -- References -- Information Audit and Trust -- Design of a Log Management Infrastructure Using Meta-Network Analysis -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Validating the Log Management Infrastructure Design Structure -- 3.1 Modeling a Log Management Infrastructure as a Social Network -- 3.2 Modeling the Log Management Infrastructure as a Meta-Network -- 3.3 Validating and Improving the Design Structure -- 4 An Example Case Study -- 5 Conclusions and Future Work -- References -- The Far Side of Mobile Application Integrated Development Environments -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Anatomy of iOS Application -- 4 Provisioning Profiles -- 5 Attack Types -- 5.1 Replication -- 5.2 Malicious Payload Injection -- 6 Conclusions -- References -- Author Index.
Sommario/riassunto: This book constitutes the refereed proceedings of the 13th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2016, held in Porto, Portugal, in September 2016 in conjunction with DEXA 2016. The 8 revised full papers presented were carefully reviewed and selected from 18 submissions. The papers are organized in the following topical sections: security, privacy and trust in eServices; security and privacy in cloud computing; privacy requirements; and information audit and trust.
Titolo autorizzato: Trust, Privacy and Security in Digital Business  Visualizza cluster
ISBN: 3-319-44341-0
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 996465313003316
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Serie: Security and Cryptology ; ; 9830