Trust, Privacy and Security in Digital Business [[electronic resource] ] : 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings / / edited by Sokratis Katsikas, Costas Lambrinoudakis, Steven Furnell |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (IX, 123 p. 30 illus.) |
Disciplina | 658.478 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Software engineering Data encryption (Computer science) Application software Management information systems Computer science Computer communication systems Systems and Data Security Software Engineering Cryptology Information Systems Applications (incl. Internet) Management of Computing and Information Systems Computer Communication Networks |
ISBN | 3-319-44341-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Security, Privacy and Trust in eServices -- A Framework for Systematic Analysis and Modeling of Trustworthiness Requirements Using i* and BPMN -- 1 Introduction -- 2 Background and Fundamentals -- 3 Framework for Systematic Analysis and Modeling of Trustworthiness Requirements -- 3.1 Conceptual Model -- 3.2 The Method for Systematic Analysis of Trustworthiness Requirements -- 4 Application Example -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Automatic Enforcement of Security Properties -- 1 Introduction -- 2 Motivating Case Study -- 3 Capturing the Security Variability -- 3.1 Resolving the Variability of the Application -- 4 Supporting the Composition Process -- 4.1 Automatically Identifying the Join Points -- 4.2 Verifying the Security Requirements -- 5 Evaluation Results and Discussion -- 6 Related Work -- 7 Conclusions and Future Work -- References -- Security and Privacy in Cloud Computing -- Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems -- Abstract -- 1 Introduction -- 2 A Process for Cloud-Forensic Investigation -- 2.1 The Process -- 3 Meta-Model -- 4 Running Example -- 5 Conclusions -- References -- Modelling Secure Cloud Computing Systems from a Security Requirements Perspective -- 1 Introduction -- 2 Health-Care Running Example -- 3 Cloud Modelling Language -- 3.1 Security Requirements Engineering Concepts -- 3.2 Cloud Computing Concepts -- 3.3 Cloud Environment Model -- 4 Related Work -- 5 Conclusion -- References -- Privacy Requirements -- Bottom-Up Cell Suppression that Preserves the Missing-at-random Condition -- 1 Introduction -- 2 Background -- 2.1 Preliminaries -- 2.2 k-Anonymity -- 2.3 Bottom-Up Cell Suppression -- 3 The Proposed Method -- 3.1 Naive Bayes Classification -- 3.2 The Missing-at-random Condition.
3.3 Cell-Suppression Cost for Preserving the MAR Condition -- 4 Experimental Results -- 5 Concluding Remarks -- References -- Understanding the Privacy Goal Intervenability -- 1 Introduction -- 2 Deriving and Structuring Requirements on Intervenability -- 2.1 Requirements Identification from Privacy Principles and Legislation -- 2.2 Setting up an Intervenability Requirements Taxonomy -- 3 Validation of the Taxonomy Using Related Literature -- 4 Conclusions -- References -- Information Audit and Trust -- Design of a Log Management Infrastructure Using Meta-Network Analysis -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Validating the Log Management Infrastructure Design Structure -- 3.1 Modeling a Log Management Infrastructure as a Social Network -- 3.2 Modeling the Log Management Infrastructure as a Meta-Network -- 3.3 Validating and Improving the Design Structure -- 4 An Example Case Study -- 5 Conclusions and Future Work -- References -- The Far Side of Mobile Application Integrated Development Environments -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Anatomy of iOS Application -- 4 Provisioning Profiles -- 5 Attack Types -- 5.1 Replication -- 5.2 Malicious Payload Injection -- 6 Conclusions -- References -- Author Index. |
Record Nr. | UNINA-9910483829403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings / / edited by Sokratis Katsikas, Costas Lambrinoudakis, Steven Furnell |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (IX, 123 p. 30 illus.) |
Disciplina | 658.478 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Software engineering Data encryption (Computer science) Application software Management information systems Computer science Computer communication systems Systems and Data Security Software Engineering Cryptology Information Systems Applications (incl. Internet) Management of Computing and Information Systems Computer Communication Networks |
ISBN | 3-319-44341-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Security, Privacy and Trust in eServices -- A Framework for Systematic Analysis and Modeling of Trustworthiness Requirements Using i* and BPMN -- 1 Introduction -- 2 Background and Fundamentals -- 3 Framework for Systematic Analysis and Modeling of Trustworthiness Requirements -- 3.1 Conceptual Model -- 3.2 The Method for Systematic Analysis of Trustworthiness Requirements -- 4 Application Example -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Automatic Enforcement of Security Properties -- 1 Introduction -- 2 Motivating Case Study -- 3 Capturing the Security Variability -- 3.1 Resolving the Variability of the Application -- 4 Supporting the Composition Process -- 4.1 Automatically Identifying the Join Points -- 4.2 Verifying the Security Requirements -- 5 Evaluation Results and Discussion -- 6 Related Work -- 7 Conclusions and Future Work -- References -- Security and Privacy in Cloud Computing -- Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems -- Abstract -- 1 Introduction -- 2 A Process for Cloud-Forensic Investigation -- 2.1 The Process -- 3 Meta-Model -- 4 Running Example -- 5 Conclusions -- References -- Modelling Secure Cloud Computing Systems from a Security Requirements Perspective -- 1 Introduction -- 2 Health-Care Running Example -- 3 Cloud Modelling Language -- 3.1 Security Requirements Engineering Concepts -- 3.2 Cloud Computing Concepts -- 3.3 Cloud Environment Model -- 4 Related Work -- 5 Conclusion -- References -- Privacy Requirements -- Bottom-Up Cell Suppression that Preserves the Missing-at-random Condition -- 1 Introduction -- 2 Background -- 2.1 Preliminaries -- 2.2 k-Anonymity -- 2.3 Bottom-Up Cell Suppression -- 3 The Proposed Method -- 3.1 Naive Bayes Classification -- 3.2 The Missing-at-random Condition.
3.3 Cell-Suppression Cost for Preserving the MAR Condition -- 4 Experimental Results -- 5 Concluding Remarks -- References -- Understanding the Privacy Goal Intervenability -- 1 Introduction -- 2 Deriving and Structuring Requirements on Intervenability -- 2.1 Requirements Identification from Privacy Principles and Legislation -- 2.2 Setting up an Intervenability Requirements Taxonomy -- 3 Validation of the Taxonomy Using Related Literature -- 4 Conclusions -- References -- Information Audit and Trust -- Design of a Log Management Infrastructure Using Meta-Network Analysis -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Validating the Log Management Infrastructure Design Structure -- 3.1 Modeling a Log Management Infrastructure as a Social Network -- 3.2 Modeling the Log Management Infrastructure as a Meta-Network -- 3.3 Validating and Improving the Design Structure -- 4 An Example Case Study -- 5 Conclusions and Future Work -- References -- The Far Side of Mobile Application Integrated Development Environments -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Anatomy of iOS Application -- 4 Provisioning Profiles -- 5 Attack Types -- 5.1 Replication -- 5.2 Malicious Payload Injection -- 6 Conclusions -- References -- Author Index. |
Record Nr. | UNISA-996465313003316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings / / edited by Simone Fischer-Hübner, Costas Lambrinoudakis, Javier López |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XII, 235 p. 68 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Management information systems Computer science Computer communication systems Systems and Data Security Management of Computing and Information Systems Computer Communication Networks |
ISBN | 3-319-22906-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Attributes Enhanced Role-Based Access Control -- Ontology-Based Delegation of Access Control: An Enhancement to the XACML Delegation Profile -- VISIO: a Visual Approach for Singularity Detection in Recommendation Systems -- Hidden in Plain Sight: SDP-based Covert Channel for Botnet Communication -- The Design of a Configurable Reputation Service -- Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software -- On the Efficacy of Static Features to Detect Malicious Applications in Android -- Protecting Android Apps against Reverse Engineering by the Use of the Native Code -- Designing Privacy-Aware Systems in the Cloud -- Accountability-Preserving Anonymous Delivery of Cloud Services -- Till All Are One: Towards a Unified Cloud IDS -- Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes -- Identifying Factors that Influence Employees' Security Behavior for Enhancing ISP Compliance -- Dynamic Deployment and Monitoring of Security Policies -- A Taxonomy of Requirements for the Privacy Goal Transparency -- A Privacy Preserving Framework for Big Data in e-Government Environments -- Privacy Principles: Towards a Common Privacy Audit Methodology. |
Record Nr. | UNISA-996200367403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings / / edited by Simone Fischer-Hübner, Costas Lambrinoudakis, Javier López |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XII, 235 p. 68 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Management information systems Computer science Computer communication systems Systems and Data Security Management of Computing and Information Systems Computer Communication Networks |
ISBN | 3-319-22906-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Attributes Enhanced Role-Based Access Control -- Ontology-Based Delegation of Access Control: An Enhancement to the XACML Delegation Profile -- VISIO: a Visual Approach for Singularity Detection in Recommendation Systems -- Hidden in Plain Sight: SDP-based Covert Channel for Botnet Communication -- The Design of a Configurable Reputation Service -- Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software -- On the Efficacy of Static Features to Detect Malicious Applications in Android -- Protecting Android Apps against Reverse Engineering by the Use of the Native Code -- Designing Privacy-Aware Systems in the Cloud -- Accountability-Preserving Anonymous Delivery of Cloud Services -- Till All Are One: Towards a Unified Cloud IDS -- Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes -- Identifying Factors that Influence Employees' Security Behavior for Enhancing ISP Compliance -- Dynamic Deployment and Monitoring of Security Policies -- A Taxonomy of Requirements for the Privacy Goal Transparency -- A Privacy Preserving Framework for Big Data in e-Government Environments -- Privacy Principles: Towards a Common Privacy Audit Methodology. |
Record Nr. | UNINA-9910485027503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012, Proceedings / / edited by Simone Fischer-Hübner, Sokratis Katsikas, Gerald Quirchmayr |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XI, 242 p. 82 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Management information systems Computer science Data encryption (Computer science) Computer communication systems Application software Systems and Data Security Management of Computing and Information Systems Cryptology Computer Communication Networks Information Systems Applications (incl. Internet) Computer Appl. in Administrative Data Processing |
Soggetto genere / forma | Conference papers and proceedings. |
ISBN | 3-642-32287-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | How Much Network Security Must Be Visible in Web Browsers.-A User-Level Authentication Scheme to Mitigate Web Session-Based Vulnerabilities -- Access Control Configuration for J2EE Web Applications: A Formal Perspective -- Cloud Separation: Stuck Inside the Cloud -- Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process -- An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control -- A Prototype for Enforcing Usage Control Policies Based on XACML -- A Conceptual Framework for Trust Models -- Advances and Challenges in Standalone Host-Based Intrusion Detection Systems -- Encrypted Adaptive Storage Model – Analysis and Performance Tests -- Efficient Comparison of Encrypted Biometric Templates.-Short and Efficient Identity-Based Undeniable Signature Scheme -- Damage Sharing May Not Be Enough: An Analysis of an Ex-ante Regulation Policy for Data Breaches -- Flexible Regulation with Privacy Points -- On the Security of the Non-Repudiation of Forwarding Service -- Profitability and Cost Management of Trustworthy Composite Services -- Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases -- Verification of Security Coherence in Data Warehouse Designs -- Towards the Secure Provision and Consumption in the Internet of Services -- WebSand: Server-Driven Outbound Web-Application Sandboxing -- Attribute-Based Credentials for Trust (ABC4Trust) -- uTRUSTit – Usable Trust in the Internet of Things -- Challenges for Advanced Security Monitoring – The MASSIF Project.- Decentralized, Cooperative, Secure and Privacy – Aware Monitoring for Trustworthiness.- PASSIVE: Policy-Assessed System-Level Security of Sensitive Information rocessing in Virtualised Environments -- Policy and Security Configuration Management -- Challenges and Current Results of the TWISNet FP7 Project -- Aniketos: Challenges and Results -- Ubiquitous Participation Platform for POLicy Making (UbiPOL): Security and Identity Management Considerations -- Secure Embedded Platform with Advanced Process Isolation and Anonymity Capabilities. A User-Level Authentication Scheme to Mitigate Web Session-Based Vulnerabilities -- Access Control Configuration for J2EE Web Applications: A Formal Perspective -- Cloud Separation: Stuck Inside the Cloud -- Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process -- An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control -- A Prototype for Enforcing Usage Control Policies Based on XACML -- A Conceptual Framework for Trust Models -- Advances and Challenges in Standalone Host-Based Intrusion Detection Systems -- Encrypted Adaptive Storage Model – Analysis and Performance Tests -- Efficient Comparison of Encrypted Biometric Templates.-Short and Efficient Identity-Based Undeniable Signature Scheme -- Damage Sharing May Not Be Enough: An Analysis of an Ex-ante Regulation Policy for Data Breaches -- Flexible Regulation with Privacy Points -- On the Security of the Non-Repudiation of Forwarding Service -- Profitability and Cost Management of Trustworthy Composite Services -- Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases -- Verification of Security Coherence in Data Warehouse Designs -- Towards the Secure Provision and Consumption in the Internet of Services -- WebSand: Server-Driven Outbound Web-Application Sandboxing -- Attribute-Based Credentials for Trust (ABC4Trust) -- uTRUSTit – Usable Trust in the Internet of Things -- Challenges for Advanced Security Monitoring – The MASSIF Project.- Decentralized, Cooperative, Secure and Privacy – Aware Monitoring for Trustworthiness.- PASSIVE: Policy-Assessed System-Level Security of Sensitive Information rocessing in Virtualised Environments -- Policy and Security Configuration Management -- Challenges and Current Results of the TWISNet FP7 Project -- Aniketos: Challenges and Results -- Ubiquitous Participation Platform for POLicy Making (UbiPOL): Security and Identity Management Considerations -- Secure Embedded Platform with Advanced Process Isolation and Anonymity Capabilities. |
Record Nr. | UNISA-996465759503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011, Proceedings / / edited by Steven Furnell, Costas Lambrinoudakis, Günther Pernul |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (XII, 223 p.) |
Disciplina | 004.6 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Management information systems Computer science Data encryption (Computer science) Computers and civilization Application software Algorithms Computer Communication Networks Management of Computing and Information Systems Cryptology Computers and Society Information Systems Applications (incl. Internet) Algorithm Analysis and Problem Complexity |
ISBN | 3-642-22890-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465904603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, Proceedings / / edited by Sokratis Katsikas, Miguel Soriano |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XII, 252 p. 67 illus.) |
Disciplina | 381.142 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Computer programming Management information systems Computer science Computers and civilization Application software Computer Communication Networks Cryptology Programming Techniques Management of Computing and Information Systems Computers and Society Information Systems Applications (incl. Internet) |
Soggetto genere / forma | Kongress |
ISBN |
1-280-38834-X
9786613566263 3-642-15152-3 |
Classificazione | 380650004 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talk -- Usage Control, Risk and Trust -- Prevention Systems -- Attacking Image Recognition Captchas -- An Insider Threat Prediction Model -- A Call Conference Room Interception Attack and Its Detection -- Safe and Efficient Strategies for Updating Firewall Policies -- Privacy I -- A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression -- Context-Aware Privacy Design Pattern Selection -- Real-Time Remote Attestation with Privacy Protection -- Private Searching on MapReduce -- Privacy II -- In Search of Search Privacy -- Untraceability and Profiling Are Not Mutually Exclusive -- Privacy Policy Referencing -- Access Control -- Formal Proof of Cooperativeness in a Multi–Party P2P Content Authentication Protocol -- Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation -- An Agent Based Back-End RFID Tag Management System -- Security and Trust Concepts -- Assessing the Usability of End-User Security Software -- Building ISMS through the Reuse of Knowledge -- Mechanizing Social Trust-Aware Recommenders with T-Index Augmented Trustworthiness -- Security for Dynamic Collaborations -- Security for Dynamic Service-Oriented eCollaboration -- Analyzing Information Security Awareness through Networks of Association -- Efficiency Improvement of Homomorphic E-Auction. |
Record Nr. | UNISA-996465939603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, Proceedings / / edited by Sokratis Katsikas, Miguel Soriano |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XII, 252 p. 67 illus.) |
Disciplina | 381.142 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Computer programming Management information systems Computer science Computers and civilization Application software Computer Communication Networks Cryptology Programming Techniques Management of Computing and Information Systems Computers and Society Information Systems Applications (incl. Internet) |
Soggetto genere / forma | Kongress |
ISBN |
1-280-38834-X
9786613566263 3-642-15152-3 |
Classificazione | 380650004 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talk -- Usage Control, Risk and Trust -- Prevention Systems -- Attacking Image Recognition Captchas -- An Insider Threat Prediction Model -- A Call Conference Room Interception Attack and Its Detection -- Safe and Efficient Strategies for Updating Firewall Policies -- Privacy I -- A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression -- Context-Aware Privacy Design Pattern Selection -- Real-Time Remote Attestation with Privacy Protection -- Private Searching on MapReduce -- Privacy II -- In Search of Search Privacy -- Untraceability and Profiling Are Not Mutually Exclusive -- Privacy Policy Referencing -- Access Control -- Formal Proof of Cooperativeness in a Multi–Party P2P Content Authentication Protocol -- Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation -- An Agent Based Back-End RFID Tag Management System -- Security and Trust Concepts -- Assessing the Usability of End-User Security Software -- Building ISMS through the Reuse of Knowledge -- Mechanizing Social Trust-Aware Recommenders with T-Index Augmented Trustworthiness -- Security for Dynamic Collaborations -- Security for Dynamic Service-Oriented eCollaboration -- Analyzing Information Security Awareness through Networks of Association -- Efficiency Improvement of Homomorphic E-Auction. |
Record Nr. | UNINA-9910484756803321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009, Proceedings / / edited by Simone Fischer-Hübner, Costas Lambrinoudakis, Günther Pernul |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XII, 169 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
E-commerce Data encryption (Computer science) Management information systems Computer science Computer communication systems Information technology Business—Data processing Systems and Data Security e-Commerce/e-business Cryptology Management of Computing and Information Systems Computer Communication Networks IT in Business |
ISBN | 3-642-03748-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | User Profiling and Privacy in Digital Business -- User Profiling and Re-identification: Case of University-Wide Network Analysis -- Search Engines: Gateway to a New “Panopticon”? -- Privacy Enhancing Technologies and Identity Management -- Supporting Local Aliases as Usable Presentation of Secure Pseudonyms -- A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking -- An Anonymous Credit Card System -- Security and Privacy in Real Life Applications -- A Cluster-Based Framework for the Security of Medical Sensor Environments -- Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: An Action-Based Approach -- A Formalization of HIPAA for a Medical Messaging System -- Reputation and Security Measurements -- Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems -- Steering Security through Measurement -- Advanced Features in Bayesian Reputation Systems -- Access Control -- An MDA-Based Environment for Generating Access Control Policies -- An Extended Role-Based Access Control Model for Delegating Obligations -- The OPL Access Control Policy Language -- Authentication and Authorisation -- Operational Semantics for DKAL: Application and Analysis -- HB???MAC: Improving the Random???HB # Authentication Protocol. |
Record Nr. | UNISA-996465307803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009, Proceedings / / edited by Simone Fischer-Hübner, Costas Lambrinoudakis, Günther Pernul |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XII, 169 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
E-commerce Data encryption (Computer science) Management information systems Computer science Computer communication systems Information technology Business—Data processing Systems and Data Security e-Commerce/e-business Cryptology Management of Computing and Information Systems Computer Communication Networks IT in Business |
ISBN | 3-642-03748-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | User Profiling and Privacy in Digital Business -- User Profiling and Re-identification: Case of University-Wide Network Analysis -- Search Engines: Gateway to a New “Panopticon”? -- Privacy Enhancing Technologies and Identity Management -- Supporting Local Aliases as Usable Presentation of Secure Pseudonyms -- A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking -- An Anonymous Credit Card System -- Security and Privacy in Real Life Applications -- A Cluster-Based Framework for the Security of Medical Sensor Environments -- Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: An Action-Based Approach -- A Formalization of HIPAA for a Medical Messaging System -- Reputation and Security Measurements -- Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems -- Steering Security through Measurement -- Advanced Features in Bayesian Reputation Systems -- Access Control -- An MDA-Based Environment for Generating Access Control Policies -- An Extended Role-Based Access Control Model for Delegating Obligations -- The OPL Access Control Policy Language -- Authentication and Authorisation -- Operational Semantics for DKAL: Application and Analysis -- HB???MAC: Improving the Random???HB # Authentication Protocol. |
Record Nr. | UNINA-9910484369403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|