Trust, privacy and security in digital business : 6th International Conference, TrustBus 2009, Linz, Austria, September 3 - 4, 2009 : proceedings
Author(s)
Bibliographic Information
Trust, privacy and security in digital business : 6th International Conference, TrustBus 2009, Linz, Austria, September 3 - 4, 2009 : proceedings
(Lecture notes in computer science, 5695)
Springer, c2009
Available at / 1 libraries
-
No Libraries matched.
- Remove all filters.
Description and Table of Contents
Description
This book presents the proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2009), held in Linz, Austria d- ing September 3-4, 2009. The conference continues from previous events held in Zaragoza (2004), Copenhagen (2005), Krakow (2006), Regensburg (2007) and Turin (2008). The advances in the information and communication technologies (ICT) have raised new opportunities for the implementation of novel applications and the pro- sion of high-quality services over global networks. The aim is to utilize this 'infor- tion society era' for improving the quality of life for all citizens, disseminating knowledge, strengthening social cohesion, generating earnings and finally ensuring that organizations and public bodies remain competitive in the global electronic m- ketplace. Unfortunately, such a rapid technological evolution cannot be problem free. Concerns are raised regarding the 'lack of trust' in electronic procedures and the - tent to which 'information security' and 'user privacy' can be ensured. TrustBus 2009 brought together academic researchers and industry developers, who discussed the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Linz to participate and debate the new emerging advances in this area.
Table of Contents
User Profiling and Privacy in Digital Business.- User Profiling and Re-identification: Case of University-Wide Network Analysis.- Search Engines: Gateway to a New "Panopticon"?.- Privacy Enhancing Technologies and Identity Management.- Supporting Local Aliases as Usable Presentation of Secure Pseudonyms.- A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking.- An Anonymous Credit Card System.- Security and Privacy in Real Life Applications.- A Cluster-Based Framework for the Security of Medical Sensor Environments.- Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: An Action-Based Approach.- A Formalization of HIPAA for a Medical Messaging System.- Reputation and Security Measurements.- Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems.- Steering Security through Measurement.- Advanced Features in Bayesian Reputation Systems.- Access Control.- An MDA-Based Environment for Generating Access Control Policies.- An Extended Role-Based Access Control Model for Delegating Obligations.- The OPL Access Control Policy Language.- Authentication and Authorisation.- Operational Semantics for DKAL: Application and Analysis.- HB???MAC: Improving the Random???HB # Authentication Protocol.
by "Nielsen BookData"