Sincerely welcome to proceedings of the 1st International Conference on Trust and Privacy in Digital Business, Zaragoza, Spain, held from August 30th to September 1st, 2004. This conference was an outgrowth of the two successful TrustBus inter- tional workshops, held in 2002 and 2003 in conjunction with the DEXA conferences in Aix-en-Provence and in Prague. Being the first of a planned series of successful conferences it was our goal that this event would initiate a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust and privacy in digital business. We thank you all the attendees for coming to Zaragoza to participate and debate the new emerging advances in this area. The conference program consisted of one invited talk and nine regular technical papers sessions. The invited talk and keynote speech was delivered by Ahmed Patel from the Computer Networks and Distributed Systems Research Group, University College Dublin, Ireland on “Developing Secure, Trusted and Auditable Services for E-Business: An Autonomic Computing Approach”. A paper covering his talk is also contained in this book. The regular paper sessions covered a broad range of topics, from access control - sues to electronic voting, from trust and protocols to digital rights management. The conference attracted close to 100 submissions of which the program committee - cepted 29 papers for presentation and inclusion in the conference proceedings.
Author(s): Ahmed Patel (auth.), Sokratis Katsikas, Javier Lopez, Günther Pernul (eds.)
Series: Lecture Notes in Computer Science 3184
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2004
Language: English
Pages: 301
Tags: Computers and Society; Computer Communication Networks; Operating Systems; Data Encryption; Management of Computing and Information Systems; Business Information Systems
Front Matter....Pages -
Developing Secure, Trusted and Auditable Services for e-Business: An Autonomic Computing Approach....Pages 1-10
A Mechanism for Trust Sustainability Among Trusted Computing Platforms....Pages 11-19
Enabling Trust-Awareness in Naming Services....Pages 20-29
Virtual Trust in Distributed Systems....Pages 30-39
Modelling Trust Relationships in Distributed Environments....Pages 40-49
Dynamically Changing Trust Structure in Capability Based Access Control Systems....Pages 50-59
On the Design of a New Trust Model for Mobile Agent Security....Pages 60-69
Balancing Privacy and Trust in Electronic Marketplaces....Pages 70-79
Reducing Server Trust in Private Proxy Auctions....Pages 80-89
Secure Ad-Hoc mBusiness: Enhancing WindowsCE Security....Pages 90-99
Role-Based Privilege Management Using Attribute Certificates and Delegation....Pages 100-109
Consent as a Threat. A Critical Approach to Privacy Negotiation in e-Commerce Practices....Pages 110-119
Dealing with Privacy Obligations: Important Aspects and Technical Approaches....Pages 120-131
Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures....Pages 132-141
Privacy Preserving Data Generation for Database Application Performance Testing....Pages 142-151
An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness....Pages 152-161
Trust in Public Administration e-Transactions: e-Voting in the UK....Pages 162-171
An Unbalanced Protocol for Group Key Exchange....Pages 172-180
Certified E-Mail with Temporal Authentication: An Improved Optimistic Protocol....Pages 181-190
Efficient Password-Based Group Key Exchange....Pages 191-199
Optimality in Asynchronous Contract Signing Protocols....Pages 200-208
Development of Visible Anti-copy Patterns....Pages 209-218
Holographic Image Watermarking for Secure Content....Pages 219-231
Hybrid Fingerprint Matching on Programmable Smart Cards....Pages 232-241
Protecting ASF Movie on VOD....Pages 242-250
DiffSig: Differentiated Digital Signature for Real-Time Multicast Packet Flows....Pages 251-260
Large-Scale Pay-As-You-Watch for Unicast and Multicast Communications....Pages 261-268
Reducing the Communication Overhead of an Offline Revocation Dictionary....Pages 269-278
Breaking Down Architectural Gaps in Smart-Card Middleware Design....Pages 279-288
On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes....Pages 289-298
Back Matter....Pages -