Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2007.
|
Σειρά: | Lecture Notes in Computer Science,
4657 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Trustbus’07 Keynote Talk Privacy Enhanced Personalization
- Trustbus’07 Keynote Talk Privacy Enhanced Personalization
- Panel Discussion Managing Digital Identities – Challenges and Opportunities
- Session 1: Secure and Trusted Virtual Organisations
- Recognition of Authority in Virtual Organisations
- Securing VO Management
- Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship
- Specification of the TrustMan System for Assisting Management of VBEs
- Session 2: Privacy in Digital Business
- A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third Party
- Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures
- Privacy Assurance: Bridging the Gap Between Preference and Practice
- Session 3: Identity Management and Usage Control
- Enhancing Optimistic Access Controls with Usage Control
- Usage Control in Service-Oriented Architectures
- On Device-Based Identity Management in Enterprises
- Analysis-Level Classes from Secure Business Processes Through Model Transformations
- Session 4: Authentication and Access Control
- A Trust and Context Aware Access Control Model for Web Services Conversations
- Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains
- On Device Authentication in Wireless Networks: Present Issues and Future Challenges
- Session 5: Compliance and User Privacy
- The Meaning of Logs
- Data Protection and Privacy Laws in the Light of RFID and Emerging Technologies
- Consistency of User Attribute in Federated Systems
- Session 6: Policy Management
- Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes
- Situation-Based Policy Enforcement
- Using Purpose Lattices to Facilitate Customisation of Privacy Agreements
- A Pattern-Driven Framework for Monitoring Security and Dependability
- Session 7: Security System Management
- Security Aspects for Secure Download of Regulated Software
- Using the Lens of Circuits of Power in Information Systems Security Management
- Fuzzy Service Selection and Interaction Review in Distributed Electronic Markets
- Session 8: Security and Trust
- X316 Security Toolbox for New Generation of Certificate
- Detecting Malicious SQL
- Trusted Code Execution in JavaCard
- How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards.