Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2007.
|
Edición: | 1st ed. 2007. |
Colección: | Security and Cryptology ;
4657 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Trustbus'07 Keynote Talk Privacy Enhanced Personalization
- Trustbus'07 Keynote Talk Privacy Enhanced Personalization
- Panel Discussion Managing Digital Identities - Challenges and Opportunities
- Session 1: Secure and Trusted Virtual Organisations
- Recognition of Authority in Virtual Organisations
- Securing VO Management
- Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship
- Specification of the TrustMan System for Assisting Management of VBEs
- Session 2: Privacy in Digital Business
- A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third Party
- Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures
- Privacy Assurance: Bridging the Gap Between Preference and Practice
- Session 3: Identity Management and Usage Control
- Enhancing Optimistic Access Controls with Usage Control
- Usage Control in Service-Oriented Architectures
- On Device-Based Identity Management in Enterprises
- Analysis-Level Classes from Secure Business Processes Through Model Transformations
- Session 4: Authentication and Access Control
- A Trust and Context Aware Access Control Model for Web Services Conversations
- Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains
- On Device Authentication in Wireless Networks: Present Issues and Future Challenges
- Session 5: Compliance and User Privacy
- The Meaning of Logs
- Data Protection and Privacy Laws in the Light of RFID and Emerging Technologies
- Consistency of User Attribute in Federated Systems
- Session 6: Policy Management
- Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes
- Situation-Based Policy Enforcement
- Using Purpose Lattices to Facilitate Customisation of Privacy Agreements
- A Pattern-Driven Framework for Monitoring Security and Dependability
- Session 7: Security System Management
- Security Aspects for Secure Download of Regulated Software
- Using the Lens of Circuits of Power in Information Systems Security Management
- Fuzzy Service Selection and Interaction Review in Distributed Electronic Markets
- Session 8: Security and Trust
- X316 Security Toolbox for New Generation of Certificate
- Detecting Malicious SQL
- Trusted Code Execution in JavaCard
- How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards.