Vai al contenuto principale della pagina
| Titolo: |
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings / / edited by Sokratis Katsikas, Costas Lambrinoudakis, Steven Furnell
|
| Pubblicazione: | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
| Edizione: | 1st ed. 2016. |
| Descrizione fisica: | 1 online resource (IX, 123 p. 30 illus.) |
| Disciplina: | 658.478 |
| Soggetto topico: | Computer security |
| Software engineering | |
| Data encryption (Computer science) | |
| Application software | |
| Management information systems | |
| Computer science | |
| Computer communication systems | |
| Systems and Data Security | |
| Software Engineering | |
| Cryptology | |
| Information Systems Applications (incl. Internet) | |
| Management of Computing and Information Systems | |
| Computer Communication Networks | |
| Persona (resp. second.): | KatsikasSokratis |
| LambrinoudakisCostas | |
| FurnellSteven | |
| Nota di contenuto: | Intro -- Preface -- Organization -- Contents -- Security, Privacy and Trust in eServices -- A Framework for Systematic Analysis and Modeling of Trustworthiness Requirements Using i* and BPMN -- 1 Introduction -- 2 Background and Fundamentals -- 3 Framework for Systematic Analysis and Modeling of Trustworthiness Requirements -- 3.1 Conceptual Model -- 3.2 The Method for Systematic Analysis of Trustworthiness Requirements -- 4 Application Example -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Automatic Enforcement of Security Properties -- 1 Introduction -- 2 Motivating Case Study -- 3 Capturing the Security Variability -- 3.1 Resolving the Variability of the Application -- 4 Supporting the Composition Process -- 4.1 Automatically Identifying the Join Points -- 4.2 Verifying the Security Requirements -- 5 Evaluation Results and Discussion -- 6 Related Work -- 7 Conclusions and Future Work -- References -- Security and Privacy in Cloud Computing -- Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems -- Abstract -- 1 Introduction -- 2 A Process for Cloud-Forensic Investigation -- 2.1 The Process -- 3 Meta-Model -- 4 Running Example -- 5 Conclusions -- References -- Modelling Secure Cloud Computing Systems from a Security Requirements Perspective -- 1 Introduction -- 2 Health-Care Running Example -- 3 Cloud Modelling Language -- 3.1 Security Requirements Engineering Concepts -- 3.2 Cloud Computing Concepts -- 3.3 Cloud Environment Model -- 4 Related Work -- 5 Conclusion -- References -- Privacy Requirements -- Bottom-Up Cell Suppression that Preserves the Missing-at-random Condition -- 1 Introduction -- 2 Background -- 2.1 Preliminaries -- 2.2 k-Anonymity -- 2.3 Bottom-Up Cell Suppression -- 3 The Proposed Method -- 3.1 Naive Bayes Classification -- 3.2 The Missing-at-random Condition. |
| 3.3 Cell-Suppression Cost for Preserving the MAR Condition -- 4 Experimental Results -- 5 Concluding Remarks -- References -- Understanding the Privacy Goal Intervenability -- 1 Introduction -- 2 Deriving and Structuring Requirements on Intervenability -- 2.1 Requirements Identification from Privacy Principles and Legislation -- 2.2 Setting up an Intervenability Requirements Taxonomy -- 3 Validation of the Taxonomy Using Related Literature -- 4 Conclusions -- References -- Information Audit and Trust -- Design of a Log Management Infrastructure Using Meta-Network Analysis -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Validating the Log Management Infrastructure Design Structure -- 3.1 Modeling a Log Management Infrastructure as a Social Network -- 3.2 Modeling the Log Management Infrastructure as a Meta-Network -- 3.3 Validating and Improving the Design Structure -- 4 An Example Case Study -- 5 Conclusions and Future Work -- References -- The Far Side of Mobile Application Integrated Development Environments -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Anatomy of iOS Application -- 4 Provisioning Profiles -- 5 Attack Types -- 5.1 Replication -- 5.2 Malicious Payload Injection -- 6 Conclusions -- References -- Author Index. | |
| Sommario/riassunto: | This book constitutes the refereed proceedings of the 13th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2016, held in Porto, Portugal, in September 2016 in conjunction with DEXA 2016. The 8 revised full papers presented were carefully reviewed and selected from 18 submissions. The papers are organized in the following topical sections: security, privacy and trust in eServices; security and privacy in cloud computing; privacy requirements; and information audit and trust. |
| Titolo autorizzato: | Trust, Privacy and Security in Digital Business ![]() |
| ISBN: | 3-319-44341-0 |
| Formato: | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione: | Inglese |
| Record Nr.: | 996465313003316 |
| Lo trovi qui: | Univ. di Salerno |
| Opac: | Controlla la disponibilità qui |