Trust, Privacy and Security in Digital Business 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings /

This book presents the proceedings of the 7th International Conference on Trust, P- vacy and Security in Digital Business (TrustBus 2010), held in Bilbao, Spain during August 30–31, 2010. The conference continued from previous events held in Zaragoza (2004), Copenhagen (2005), Krakow (2006), Regensb...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Katsikas, Sokratis (Επιμελητής έκδοσης), Lopez, Javier (Επιμελητής έκδοσης), Soriano, Miguel (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Σειρά:Lecture Notes in Computer Science, 6264
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04907nam a22005775i 4500
001 978-3-642-15152-1
003 DE-He213
005 20151204151202.0
007 cr nn 008mamaa
008 100830s2010 gw | s |||| 0|eng d
020 |a 9783642151521  |9 978-3-642-15152-1 
024 7 |a 10.1007/978-3-642-15152-1  |2 doi 
040 |d GrThAP 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
245 1 0 |a Trust, Privacy and Security in Digital Business  |h [electronic resource] :  |b 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings /  |c edited by Sokratis Katsikas, Javier Lopez, Miguel Soriano. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg,  |c 2010. 
300 |a XII, 252 p. 67 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 6264 
505 0 |a Invited Talk -- Usage Control, Risk and Trust -- Prevention Systems -- Attacking Image Recognition Captchas -- An Insider Threat Prediction Model -- A Call Conference Room Interception Attack and Its Detection -- Safe and Efficient Strategies for Updating Firewall Policies -- Privacy I -- A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression -- Context-Aware Privacy Design Pattern Selection -- Real-Time Remote Attestation with Privacy Protection -- Private Searching on MapReduce -- Privacy II -- In Search of Search Privacy -- Untraceability and Profiling Are Not Mutually Exclusive -- Privacy Policy Referencing -- Access Control -- Formal Proof of Cooperativeness in a Multi–Party P2P Content Authentication Protocol -- Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation -- An Agent Based Back-End RFID Tag Management System -- Security and Trust Concepts -- Assessing the Usability of End-User Security Software -- Building ISMS through the Reuse of Knowledge -- Mechanizing Social Trust-Aware Recommenders with T-Index Augmented Trustworthiness -- Security for Dynamic Collaborations -- Security for Dynamic Service-Oriented eCollaboration -- Analyzing Information Security Awareness through Networks of Association -- Efficiency Improvement of Homomorphic E-Auction. 
520 |a This book presents the proceedings of the 7th International Conference on Trust, P- vacy and Security in Digital Business (TrustBus 2010), held in Bilbao, Spain during August 30–31, 2010. The conference continued from previous events held in Zaragoza (2004), Copenhagen (2005), Krakow (2006), Regensburg (2007), Turin (2008) and Linz (2009). The recent advances in information and communication technologies (ICT) have raised new opportunities for the implementation of novel applications and the provision of high-quality services over global networks. The aim is to utilize this ‘information society era’ for improving the quality of life for all citizens, disseminating knowledge, strengthening social cohesion, generating earnings and finally ensuring that organi- tions and public bodies remain competitive in the global electronic marketplace. - fortunately, such a rapid technological evolution cannot be problem-free. Concerns are raised regarding the ‘lack of trust’ in electronic procedures and the extent to which ‘information security’ and ‘user privacy’ can be ensured. TrustBus 2010 brought together academic researchers and industry developers, who discussed the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Bilbao to participate and debate the new emerging advances in this area. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Computer programming. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computers and civilization. 
650 0 |a Management information systems. 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Data Encryption. 
650 2 4 |a Programming Techniques. 
650 2 4 |a Management of Computing and Information Systems. 
650 2 4 |a Computers and Society. 
650 2 4 |a Information Systems Applications (incl. Internet). 
700 1 |a Katsikas, Sokratis.  |e editor. 
700 1 |a Lopez, Javier.  |e editor. 
700 1 |a Soriano, Miguel.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642151514 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 6264 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-15152-1  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645)