Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Lambrinoudakis, Costas (Επιμελητής έκδοσης), Pernul, Günther (Επιμελητής έκδοσης), Tjoa, A Min (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007.
Σειρά:Lecture Notes in Computer Science, 4657
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Trustbus’07 Keynote Talk Privacy Enhanced Personalization
  • Trustbus’07 Keynote Talk Privacy Enhanced Personalization
  • Panel Discussion Managing Digital Identities – Challenges and Opportunities
  • Session 1: Secure and Trusted Virtual Organisations
  • Recognition of Authority in Virtual Organisations
  • Securing VO Management
  • Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship
  • Specification of the TrustMan System for Assisting Management of VBEs
  • Session 2: Privacy in Digital Business
  • A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third Party
  • Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures
  • Privacy Assurance: Bridging the Gap Between Preference and Practice
  • Session 3: Identity Management and Usage Control
  • Enhancing Optimistic Access Controls with Usage Control
  • Usage Control in Service-Oriented Architectures
  • On Device-Based Identity Management in Enterprises
  • Analysis-Level Classes from Secure Business Processes Through Model Transformations
  • Session 4: Authentication and Access Control
  • A Trust and Context Aware Access Control Model for Web Services Conversations
  • Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains
  • On Device Authentication in Wireless Networks: Present Issues and Future Challenges
  • Session 5: Compliance and User Privacy
  • The Meaning of Logs
  • Data Protection and Privacy Laws in the Light of RFID and Emerging Technologies
  • Consistency of User Attribute in Federated Systems
  • Session 6: Policy Management
  • Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes
  • Situation-Based Policy Enforcement
  • Using Purpose Lattices to Facilitate Customisation of Privacy Agreements
  • A Pattern-Driven Framework for Monitoring Security and Dependability
  • Session 7: Security System Management
  • Security Aspects for Secure Download of Regulated Software
  • Using the Lens of Circuits of Power in Information Systems Security Management
  • Fuzzy Service Selection and Interaction Review in Distributed Electronic Markets
  • Session 8: Security and Trust
  • X316 Security Toolbox for New Generation of Certificate
  • Detecting Malicious SQL
  • Trusted Code Execution in JavaCard
  • How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards.