Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings / edited by Costas Lambrinoudakis, Günther Pernul, A Min Tjoa.

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Lambrinoudakis, Costas (Editor), Pernul, Günther (Editor), Tjoa, A Min (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Edition:1st ed. 2007.
Series:Security and Cryptology ; 4657
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • Trustbus’07 Keynote Talk Privacy Enhanced Personalization
  • Trustbus’07 Keynote Talk Privacy Enhanced Personalization
  • Panel Discussion Managing Digital Identities – Challenges and Opportunities
  • Session 1: Secure and Trusted Virtual Organisations
  • Recognition of Authority in Virtual Organisations
  • Securing VO Management
  • Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship
  • Specification of the TrustMan System for Assisting Management of VBEs
  • Session 2: Privacy in Digital Business
  • A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third Party
  • Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures
  • Privacy Assurance: Bridging the Gap Between Preference and Practice
  • Session 3: Identity Management and Usage Control
  • Enhancing Optimistic Access Controls with Usage Control
  • Usage Control in Service-Oriented Architectures
  • On Device-Based Identity Management in Enterprises
  • Analysis-Level Classes from Secure Business Processes Through Model Transformations
  • Session 4: Authentication and Access Control
  • A Trust and Context Aware Access Control Model for Web Services Conversations
  • Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains
  • On Device Authentication in Wireless Networks: Present Issues and Future Challenges
  • Session 5: Compliance and User Privacy
  • The Meaning of Logs
  • Data Protection and Privacy Laws in the Light of RFID and Emerging Technologies
  • Consistency of User Attribute in Federated Systems
  • Session 6: Policy Management
  • Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes
  • Situation-Based Policy Enforcement
  • Using Purpose Lattices to Facilitate Customisation of Privacy Agreements
  • A Pattern-Driven Framework for Monitoring Security and Dependability
  • Session 7: Security System Management
  • Security Aspects for Secure Download of Regulated Software
  • Using the Lens of Circuits of Power in Information Systems Security Management
  • Fuzzy Service Selection and Interaction Review in Distributed Electronic Markets
  • Session 8: Security and Trust
  • X316 Security Toolbox for New Generation of Certificate
  • Detecting Malicious SQL
  • Trusted Code Execution in JavaCard
  • How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards.