top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings / / edited by Sokratis Katsikas, Costas Lambrinoudakis, Steven Furnell
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings / / edited by Sokratis Katsikas, Costas Lambrinoudakis, Steven Furnell
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (IX, 123 p. 30 illus.)
Disciplina 658.478
Collana Security and Cryptology
Soggetto topico Computer security
Software engineering
Data encryption (Computer science)
Application software
Management information systems
Computer science
Computer communication systems
Systems and Data Security
Software Engineering
Cryptology
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
Computer Communication Networks
ISBN 3-319-44341-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Security, Privacy and Trust in eServices -- A Framework for Systematic Analysis and Modeling of Trustworthiness Requirements Using i* and BPMN -- 1 Introduction -- 2 Background and Fundamentals -- 3 Framework for Systematic Analysis and Modeling of Trustworthiness Requirements -- 3.1 Conceptual Model -- 3.2 The Method for Systematic Analysis of Trustworthiness Requirements -- 4 Application Example -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Automatic Enforcement of Security Properties -- 1 Introduction -- 2 Motivating Case Study -- 3 Capturing the Security Variability -- 3.1 Resolving the Variability of the Application -- 4 Supporting the Composition Process -- 4.1 Automatically Identifying the Join Points -- 4.2 Verifying the Security Requirements -- 5 Evaluation Results and Discussion -- 6 Related Work -- 7 Conclusions and Future Work -- References -- Security and Privacy in Cloud Computing -- Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems -- Abstract -- 1 Introduction -- 2 A Process for Cloud-Forensic Investigation -- 2.1 The Process -- 3 Meta-Model -- 4 Running Example -- 5 Conclusions -- References -- Modelling Secure Cloud Computing Systems from a Security Requirements Perspective -- 1 Introduction -- 2 Health-Care Running Example -- 3 Cloud Modelling Language -- 3.1 Security Requirements Engineering Concepts -- 3.2 Cloud Computing Concepts -- 3.3 Cloud Environment Model -- 4 Related Work -- 5 Conclusion -- References -- Privacy Requirements -- Bottom-Up Cell Suppression that Preserves the Missing-at-random Condition -- 1 Introduction -- 2 Background -- 2.1 Preliminaries -- 2.2 k-Anonymity -- 2.3 Bottom-Up Cell Suppression -- 3 The Proposed Method -- 3.1 Naive Bayes Classification -- 3.2 The Missing-at-random Condition.
3.3 Cell-Suppression Cost for Preserving the MAR Condition -- 4 Experimental Results -- 5 Concluding Remarks -- References -- Understanding the Privacy Goal Intervenability -- 1 Introduction -- 2 Deriving and Structuring Requirements on Intervenability -- 2.1 Requirements Identification from Privacy Principles and Legislation -- 2.2 Setting up an Intervenability Requirements Taxonomy -- 3 Validation of the Taxonomy Using Related Literature -- 4 Conclusions -- References -- Information Audit and Trust -- Design of a Log Management Infrastructure Using Meta-Network Analysis -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Validating the Log Management Infrastructure Design Structure -- 3.1 Modeling a Log Management Infrastructure as a Social Network -- 3.2 Modeling the Log Management Infrastructure as a Meta-Network -- 3.3 Validating and Improving the Design Structure -- 4 An Example Case Study -- 5 Conclusions and Future Work -- References -- The Far Side of Mobile Application Integrated Development Environments -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Anatomy of iOS Application -- 4 Provisioning Profiles -- 5 Attack Types -- 5.1 Replication -- 5.2 Malicious Payload Injection -- 6 Conclusions -- References -- Author Index.
Record Nr. UNINA-9910483829403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings / / edited by Sokratis Katsikas, Costas Lambrinoudakis, Steven Furnell
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings / / edited by Sokratis Katsikas, Costas Lambrinoudakis, Steven Furnell
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (IX, 123 p. 30 illus.)
Disciplina 658.478
Collana Security and Cryptology
Soggetto topico Computer security
Software engineering
Data encryption (Computer science)
Application software
Management information systems
Computer science
Computer communication systems
Systems and Data Security
Software Engineering
Cryptology
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
Computer Communication Networks
ISBN 3-319-44341-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Security, Privacy and Trust in eServices -- A Framework for Systematic Analysis and Modeling of Trustworthiness Requirements Using i* and BPMN -- 1 Introduction -- 2 Background and Fundamentals -- 3 Framework for Systematic Analysis and Modeling of Trustworthiness Requirements -- 3.1 Conceptual Model -- 3.2 The Method for Systematic Analysis of Trustworthiness Requirements -- 4 Application Example -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Automatic Enforcement of Security Properties -- 1 Introduction -- 2 Motivating Case Study -- 3 Capturing the Security Variability -- 3.1 Resolving the Variability of the Application -- 4 Supporting the Composition Process -- 4.1 Automatically Identifying the Join Points -- 4.2 Verifying the Security Requirements -- 5 Evaluation Results and Discussion -- 6 Related Work -- 7 Conclusions and Future Work -- References -- Security and Privacy in Cloud Computing -- Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems -- Abstract -- 1 Introduction -- 2 A Process for Cloud-Forensic Investigation -- 2.1 The Process -- 3 Meta-Model -- 4 Running Example -- 5 Conclusions -- References -- Modelling Secure Cloud Computing Systems from a Security Requirements Perspective -- 1 Introduction -- 2 Health-Care Running Example -- 3 Cloud Modelling Language -- 3.1 Security Requirements Engineering Concepts -- 3.2 Cloud Computing Concepts -- 3.3 Cloud Environment Model -- 4 Related Work -- 5 Conclusion -- References -- Privacy Requirements -- Bottom-Up Cell Suppression that Preserves the Missing-at-random Condition -- 1 Introduction -- 2 Background -- 2.1 Preliminaries -- 2.2 k-Anonymity -- 2.3 Bottom-Up Cell Suppression -- 3 The Proposed Method -- 3.1 Naive Bayes Classification -- 3.2 The Missing-at-random Condition.
3.3 Cell-Suppression Cost for Preserving the MAR Condition -- 4 Experimental Results -- 5 Concluding Remarks -- References -- Understanding the Privacy Goal Intervenability -- 1 Introduction -- 2 Deriving and Structuring Requirements on Intervenability -- 2.1 Requirements Identification from Privacy Principles and Legislation -- 2.2 Setting up an Intervenability Requirements Taxonomy -- 3 Validation of the Taxonomy Using Related Literature -- 4 Conclusions -- References -- Information Audit and Trust -- Design of a Log Management Infrastructure Using Meta-Network Analysis -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Validating the Log Management Infrastructure Design Structure -- 3.1 Modeling a Log Management Infrastructure as a Social Network -- 3.2 Modeling the Log Management Infrastructure as a Meta-Network -- 3.3 Validating and Improving the Design Structure -- 4 An Example Case Study -- 5 Conclusions and Future Work -- References -- The Far Side of Mobile Application Integrated Development Environments -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Anatomy of iOS Application -- 4 Provisioning Profiles -- 5 Attack Types -- 5.1 Replication -- 5.2 Malicious Payload Injection -- 6 Conclusions -- References -- Author Index.
Record Nr. UNISA-996465313003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings / / edited by Simone Fischer-Hübner, Costas Lambrinoudakis, Javier López
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings / / edited by Simone Fischer-Hübner, Costas Lambrinoudakis, Javier López
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XII, 235 p. 68 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
Computer communication systems
Systems and Data Security
Management of Computing and Information Systems
Computer Communication Networks
ISBN 3-319-22906-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attributes Enhanced Role-Based Access Control -- Ontology-Based Delegation of Access Control: An Enhancement to the XACML Delegation Profile -- VISIO: a Visual Approach for Singularity Detection in Recommendation Systems -- Hidden in Plain Sight: SDP-based Covert Channel for Botnet Communication -- The Design of a Configurable Reputation Service -- Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software -- On the Efficacy of Static Features to Detect Malicious Applications in Android -- Protecting Android Apps against Reverse Engineering by the Use of the Native Code -- Designing Privacy-Aware Systems in the Cloud -- Accountability-Preserving Anonymous Delivery of Cloud Services -- Till All Are One: Towards a Unified Cloud IDS -- Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes -- Identifying Factors that Influence Employees' Security Behavior for Enhancing ISP Compliance -- Dynamic Deployment and Monitoring of Security Policies -- A Taxonomy of Requirements for the Privacy Goal Transparency -- A Privacy Preserving Framework for Big Data in e-Government Environments -- Privacy Principles: Towards a Common Privacy Audit Methodology.
Record Nr. UNISA-996200367403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings / / edited by Simone Fischer-Hübner, Costas Lambrinoudakis, Javier López
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings / / edited by Simone Fischer-Hübner, Costas Lambrinoudakis, Javier López
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XII, 235 p. 68 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
Computer communication systems
Systems and Data Security
Management of Computing and Information Systems
Computer Communication Networks
ISBN 3-319-22906-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attributes Enhanced Role-Based Access Control -- Ontology-Based Delegation of Access Control: An Enhancement to the XACML Delegation Profile -- VISIO: a Visual Approach for Singularity Detection in Recommendation Systems -- Hidden in Plain Sight: SDP-based Covert Channel for Botnet Communication -- The Design of a Configurable Reputation Service -- Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software -- On the Efficacy of Static Features to Detect Malicious Applications in Android -- Protecting Android Apps against Reverse Engineering by the Use of the Native Code -- Designing Privacy-Aware Systems in the Cloud -- Accountability-Preserving Anonymous Delivery of Cloud Services -- Till All Are One: Towards a Unified Cloud IDS -- Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes -- Identifying Factors that Influence Employees' Security Behavior for Enhancing ISP Compliance -- Dynamic Deployment and Monitoring of Security Policies -- A Taxonomy of Requirements for the Privacy Goal Transparency -- A Privacy Preserving Framework for Big Data in e-Government Environments -- Privacy Principles: Towards a Common Privacy Audit Methodology.
Record Nr. UNINA-9910485027503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012, Proceedings / / edited by Simone Fischer-Hübner, Sokratis Katsikas, Gerald Quirchmayr
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012, Proceedings / / edited by Simone Fischer-Hübner, Sokratis Katsikas, Gerald Quirchmayr
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XI, 242 p. 82 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
Data encryption (Computer science)
Computer communication systems
Application software
Systems and Data Security
Management of Computing and Information Systems
Cryptology
Computer Communication Networks
Information Systems Applications (incl. Internet)
Computer Appl. in Administrative Data Processing
Soggetto genere / forma Conference papers and proceedings.
ISBN 3-642-32287-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto How Much Network Security Must Be Visible in Web Browsers.-A User-Level Authentication Scheme to Mitigate Web Session-Based Vulnerabilities -- Access Control Configuration for J2EE Web Applications: A Formal Perspective -- Cloud Separation: Stuck Inside the Cloud -- Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process -- An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control -- A Prototype for Enforcing Usage Control Policies Based on XACML -- A Conceptual Framework for Trust Models -- Advances and Challenges in Standalone Host-Based Intrusion Detection Systems -- Encrypted Adaptive Storage Model – Analysis and Performance Tests -- Efficient Comparison of Encrypted Biometric Templates.-Short and Efficient Identity-Based Undeniable Signature Scheme -- Damage Sharing May Not Be Enough: An Analysis of an Ex-ante Regulation Policy for Data Breaches -- Flexible Regulation with Privacy Points -- On the Security of the Non-Repudiation of Forwarding Service -- Profitability and Cost Management of Trustworthy Composite Services -- Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases -- Verification of Security Coherence in Data Warehouse Designs -- Towards the Secure Provision and Consumption in the Internet of Services -- WebSand: Server-Driven Outbound Web-Application Sandboxing -- Attribute-Based Credentials for Trust (ABC4Trust) -- uTRUSTit – Usable Trust in the Internet of Things -- Challenges for Advanced Security Monitoring – The MASSIF Project.-  Decentralized, Cooperative, Secure and Privacy – Aware Monitoring for Trustworthiness.-  PASSIVE: Policy-Assessed System-Level Security of Sensitive Information rocessing in Virtualised Environments -- Policy and Security Configuration Management -- Challenges and Current Results of the TWISNet FP7 Project -- Aniketos: Challenges and Results -- Ubiquitous Participation Platform for POLicy Making (UbiPOL): Security and Identity Management Considerations -- Secure Embedded Platform with Advanced Process Isolation and Anonymity Capabilities. A User-Level Authentication Scheme to Mitigate Web Session-Based Vulnerabilities -- Access Control Configuration for J2EE Web Applications: A Formal Perspective -- Cloud Separation: Stuck Inside the Cloud -- Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process -- An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control -- A Prototype for Enforcing Usage Control Policies Based on XACML -- A Conceptual Framework for Trust Models -- Advances and Challenges in Standalone Host-Based Intrusion Detection Systems -- Encrypted Adaptive Storage Model – Analysis and Performance Tests -- Efficient Comparison of Encrypted Biometric Templates.-Short and Efficient Identity-Based Undeniable Signature Scheme -- Damage Sharing May Not Be Enough: An Analysis of an Ex-ante Regulation Policy for Data Breaches -- Flexible Regulation with Privacy Points -- On the Security of the Non-Repudiation of Forwarding Service -- Profitability and Cost Management of Trustworthy Composite Services -- Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases -- Verification of Security Coherence in Data Warehouse Designs -- Towards the Secure Provision and Consumption in the Internet of Services -- WebSand: Server-Driven Outbound Web-Application Sandboxing -- Attribute-Based Credentials for Trust (ABC4Trust) -- uTRUSTit – Usable Trust in the Internet of Things -- Challenges for Advanced Security Monitoring – The MASSIF Project.-  Decentralized, Cooperative, Secure and Privacy – Aware Monitoring for Trustworthiness.-  PASSIVE: Policy-Assessed System-Level Security of Sensitive Information rocessing in Virtualised Environments -- Policy and Security Configuration Management -- Challenges and Current Results of the TWISNet FP7 Project -- Aniketos: Challenges and Results -- Ubiquitous Participation Platform for POLicy Making (UbiPOL): Security and Identity Management Considerations -- Secure Embedded Platform with Advanced Process Isolation and Anonymity Capabilities.
Record Nr. UNISA-996465759503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011, Proceedings / / edited by Steven Furnell, Costas Lambrinoudakis, Günther Pernul
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011, Proceedings / / edited by Steven Furnell, Costas Lambrinoudakis, Günther Pernul
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XII, 223 p.)
Disciplina 004.6
Collana Security and Cryptology
Soggetto topico Computer communication systems
Management information systems
Computer science
Data encryption (Computer science)
Computers and civilization
Application software
Algorithms
Computer Communication Networks
Management of Computing and Information Systems
Cryptology
Computers and Society
Information Systems Applications (incl. Internet)
Algorithm Analysis and Problem Complexity
ISBN 3-642-22890-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465904603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, Proceedings / / edited by Sokratis Katsikas, Miguel Soriano
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, Proceedings / / edited by Sokratis Katsikas, Miguel Soriano
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XII, 252 p. 67 illus.)
Disciplina 381.142
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Computer programming
Management information systems
Computer science
Computers and civilization
Application software
Computer Communication Networks
Cryptology
Programming Techniques
Management of Computing and Information Systems
Computers and Society
Information Systems Applications (incl. Internet)
Soggetto genere / forma Kongress
ISBN 1-280-38834-X
9786613566263
3-642-15152-3
Classificazione 380650004
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- Usage Control, Risk and Trust -- Prevention Systems -- Attacking Image Recognition Captchas -- An Insider Threat Prediction Model -- A Call Conference Room Interception Attack and Its Detection -- Safe and Efficient Strategies for Updating Firewall Policies -- Privacy I -- A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression -- Context-Aware Privacy Design Pattern Selection -- Real-Time Remote Attestation with Privacy Protection -- Private Searching on MapReduce -- Privacy II -- In Search of Search Privacy -- Untraceability and Profiling Are Not Mutually Exclusive -- Privacy Policy Referencing -- Access Control -- Formal Proof of Cooperativeness in a Multi–Party P2P Content Authentication Protocol -- Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation -- An Agent Based Back-End RFID Tag Management System -- Security and Trust Concepts -- Assessing the Usability of End-User Security Software -- Building ISMS through the Reuse of Knowledge -- Mechanizing Social Trust-Aware Recommenders with T-Index Augmented Trustworthiness -- Security for Dynamic Collaborations -- Security for Dynamic Service-Oriented eCollaboration -- Analyzing Information Security Awareness through Networks of Association -- Efficiency Improvement of Homomorphic E-Auction.
Record Nr. UNISA-996465939603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, Proceedings / / edited by Sokratis Katsikas, Miguel Soriano
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, Proceedings / / edited by Sokratis Katsikas, Miguel Soriano
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XII, 252 p. 67 illus.)
Disciplina 381.142
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Computer programming
Management information systems
Computer science
Computers and civilization
Application software
Computer Communication Networks
Cryptology
Programming Techniques
Management of Computing and Information Systems
Computers and Society
Information Systems Applications (incl. Internet)
Soggetto genere / forma Kongress
ISBN 1-280-38834-X
9786613566263
3-642-15152-3
Classificazione 380650004
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- Usage Control, Risk and Trust -- Prevention Systems -- Attacking Image Recognition Captchas -- An Insider Threat Prediction Model -- A Call Conference Room Interception Attack and Its Detection -- Safe and Efficient Strategies for Updating Firewall Policies -- Privacy I -- A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression -- Context-Aware Privacy Design Pattern Selection -- Real-Time Remote Attestation with Privacy Protection -- Private Searching on MapReduce -- Privacy II -- In Search of Search Privacy -- Untraceability and Profiling Are Not Mutually Exclusive -- Privacy Policy Referencing -- Access Control -- Formal Proof of Cooperativeness in a Multi–Party P2P Content Authentication Protocol -- Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation -- An Agent Based Back-End RFID Tag Management System -- Security and Trust Concepts -- Assessing the Usability of End-User Security Software -- Building ISMS through the Reuse of Knowledge -- Mechanizing Social Trust-Aware Recommenders with T-Index Augmented Trustworthiness -- Security for Dynamic Collaborations -- Security for Dynamic Service-Oriented eCollaboration -- Analyzing Information Security Awareness through Networks of Association -- Efficiency Improvement of Homomorphic E-Auction.
Record Nr. UNINA-9910484756803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009, Proceedings / / edited by Simone Fischer-Hübner, Costas Lambrinoudakis, Günther Pernul
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009, Proceedings / / edited by Simone Fischer-Hübner, Costas Lambrinoudakis, Günther Pernul
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XII, 169 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
E-commerce
Data encryption (Computer science)
Management information systems
Computer science
Computer communication systems
Information technology
Business—Data processing
Systems and Data Security
e-Commerce/e-business
Cryptology
Management of Computing and Information Systems
Computer Communication Networks
IT in Business
ISBN 3-642-03748-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto User Profiling and Privacy in Digital Business -- User Profiling and Re-identification: Case of University-Wide Network Analysis -- Search Engines: Gateway to a New “Panopticon”? -- Privacy Enhancing Technologies and Identity Management -- Supporting Local Aliases as Usable Presentation of Secure Pseudonyms -- A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking -- An Anonymous Credit Card System -- Security and Privacy in Real Life Applications -- A Cluster-Based Framework for the Security of Medical Sensor Environments -- Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: An Action-Based Approach -- A Formalization of HIPAA for a Medical Messaging System -- Reputation and Security Measurements -- Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems -- Steering Security through Measurement -- Advanced Features in Bayesian Reputation Systems -- Access Control -- An MDA-Based Environment for Generating Access Control Policies -- An Extended Role-Based Access Control Model for Delegating Obligations -- The OPL Access Control Policy Language -- Authentication and Authorisation -- Operational Semantics for DKAL: Application and Analysis -- HB???MAC: Improving the Random???HB # Authentication Protocol.
Record Nr. UNISA-996465307803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009, Proceedings / / edited by Simone Fischer-Hübner, Costas Lambrinoudakis, Günther Pernul
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009, Proceedings / / edited by Simone Fischer-Hübner, Costas Lambrinoudakis, Günther Pernul
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XII, 169 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
E-commerce
Data encryption (Computer science)
Management information systems
Computer science
Computer communication systems
Information technology
Business—Data processing
Systems and Data Security
e-Commerce/e-business
Cryptology
Management of Computing and Information Systems
Computer Communication Networks
IT in Business
ISBN 3-642-03748-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto User Profiling and Privacy in Digital Business -- User Profiling and Re-identification: Case of University-Wide Network Analysis -- Search Engines: Gateway to a New “Panopticon”? -- Privacy Enhancing Technologies and Identity Management -- Supporting Local Aliases as Usable Presentation of Secure Pseudonyms -- A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking -- An Anonymous Credit Card System -- Security and Privacy in Real Life Applications -- A Cluster-Based Framework for the Security of Medical Sensor Environments -- Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: An Action-Based Approach -- A Formalization of HIPAA for a Medical Messaging System -- Reputation and Security Measurements -- Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems -- Steering Security through Measurement -- Advanced Features in Bayesian Reputation Systems -- Access Control -- An MDA-Based Environment for Generating Access Control Policies -- An Extended Role-Based Access Control Model for Delegating Obligations -- The OPL Access Control Policy Language -- Authentication and Authorisation -- Operational Semantics for DKAL: Application and Analysis -- HB???MAC: Improving the Random???HB # Authentication Protocol.
Record Nr. UNINA-9910484369403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...