Trust, Privacy and Security in Digital Business 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009, Proceedings / edited by Simone Fischer-Hübner, Costas Lambrinoudakis, Günther Pernul.

This book constitutes the refereed proceedings of the 6th International Conference on Trust and Privacy in Digital Business, TrustBus 2009, held in Linz, Austria, in September 2009 in conjunction with DEXA 2009. The 16 revised full papers presented were carefully reviewed and selected from numerous...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Fischer-Hübner, Simone (Editor), Lambrinoudakis, Costas (Editor), Pernul, Günther (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edition:1st ed. 2009.
Series:Security and Cryptology ; 5695
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • User Profiling and Privacy in Digital Business
  • User Profiling and Re-identification: Case of University-Wide Network Analysis
  • Search Engines: Gateway to a New “Panopticon”?
  • Privacy Enhancing Technologies and Identity Management
  • Supporting Local Aliases as Usable Presentation of Secure Pseudonyms
  • A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking
  • An Anonymous Credit Card System
  • Security and Privacy in Real Life Applications
  • A Cluster-Based Framework for the Security of Medical Sensor Environments
  • Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: An Action-Based Approach
  • A Formalization of HIPAA for a Medical Messaging System
  • Reputation and Security Measurements
  • Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems
  • Steering Security through Measurement
  • Advanced Features in Bayesian Reputation Systems
  • Access Control
  • An MDA-Based Environment for Generating Access Control Policies
  • An Extended Role-Based Access Control Model for Delegating Obligations
  • The OPL Access Control Policy Language
  • Authentication and Authorisation
  • Operational Semantics for DKAL: Application and Analysis
  • HB???MAC: Improving the Random???HB # Authentication Protocol.