Trust, Privacy and Security in Digital Business [[electronic resource] ] : 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, Proceedings / / edited by Sokratis Katsikas, Miguel Soriano
| Trust, Privacy and Security in Digital Business [[electronic resource] ] : 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, Proceedings / / edited by Sokratis Katsikas, Miguel Soriano |
| Edizione | [1st ed. 2010.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
| Descrizione fisica | 1 online resource (XII, 252 p. 67 illus.) |
| Disciplina | 381.142 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer communication systems
Data encryption (Computer science) Computer programming Management information systems Computer science Computers and civilization Application software Computer Communication Networks Cryptology Programming Techniques Management of Computing and Information Systems Computers and Society Information Systems Applications (incl. Internet) |
| Soggetto genere / forma | Kongress |
| ISBN |
1-280-38834-X
9786613566263 3-642-15152-3 |
| Classificazione | 380650004 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Invited Talk -- Usage Control, Risk and Trust -- Prevention Systems -- Attacking Image Recognition Captchas -- An Insider Threat Prediction Model -- A Call Conference Room Interception Attack and Its Detection -- Safe and Efficient Strategies for Updating Firewall Policies -- Privacy I -- A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression -- Context-Aware Privacy Design Pattern Selection -- Real-Time Remote Attestation with Privacy Protection -- Private Searching on MapReduce -- Privacy II -- In Search of Search Privacy -- Untraceability and Profiling Are Not Mutually Exclusive -- Privacy Policy Referencing -- Access Control -- Formal Proof of Cooperativeness in a Multi–Party P2P Content Authentication Protocol -- Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation -- An Agent Based Back-End RFID Tag Management System -- Security and Trust Concepts -- Assessing the Usability of End-User Security Software -- Building ISMS through the Reuse of Knowledge -- Mechanizing Social Trust-Aware Recommenders with T-Index Augmented Trustworthiness -- Security for Dynamic Collaborations -- Security for Dynamic Service-Oriented eCollaboration -- Analyzing Information Security Awareness through Networks of Association -- Efficiency Improvement of Homomorphic E-Auction. |
| Record Nr. | UNISA-996465939603316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Trust, Privacy and Security in Digital Business : 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, Proceedings / / edited by Sokratis Katsikas, Miguel Soriano
| Trust, Privacy and Security in Digital Business : 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, Proceedings / / edited by Sokratis Katsikas, Miguel Soriano |
| Edizione | [1st ed. 2010.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
| Descrizione fisica | 1 online resource (XII, 252 p. 67 illus.) |
| Disciplina | 381.142 |
| Altri autori (Persone) |
KatsikasSokratis K
LopezJavier SorianoMiguel |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer networks
Cryptography Data encryption (Computer science) Computer programming Electronic data processing - Management Computers and civilization Application software Computer Communication Networks Cryptology Programming Techniques IT Operations Computers and Society Computer and Information Systems Applications |
| ISBN |
1-280-38834-X
9786613566263 3-642-15152-3 |
| Classificazione | 380650004 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Invited Talk -- Usage Control, Risk and Trust -- Prevention Systems -- Attacking Image Recognition Captchas -- An Insider Threat Prediction Model -- A Call Conference Room Interception Attack and Its Detection -- Safe and Efficient Strategies for Updating Firewall Policies -- Privacy I -- A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression -- Context-Aware Privacy Design Pattern Selection -- Real-Time Remote Attestation with Privacy Protection -- Private Searching on MapReduce -- Privacy II -- In Search of Search Privacy -- Untraceability and Profiling Are Not Mutually Exclusive -- Privacy Policy Referencing -- Access Control -- Formal Proof of Cooperativeness in a Multi–Party P2P Content Authentication Protocol -- Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation -- An Agent Based Back-End RFID Tag Management System -- Security and Trust Concepts -- Assessing the Usability of End-User Security Software -- Building ISMS through the Reuse of Knowledge -- Mechanizing Social Trust-Aware Recommenders with T-Index Augmented Trustworthiness -- Security for Dynamic Collaborations -- Security for Dynamic Service-Oriented eCollaboration -- Analyzing Information Security Awareness through Networks of Association -- Efficiency Improvement of Homomorphic E-Auction. |
| Record Nr. | UNINA-9910484756803321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||