Sincerely welcome to the proceedings of the 2nd International Conference on Trust, Privacy, would be and Security in Digital Business, held in Copenhagen, Denmark, from August 22nd till 26th, 2005. This conference was the successor to the successful TrustBus 2004 conference, held in 2004 in conjunction with the DEXA conferences in Zaragoza. It was our goal that this event would be a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust, privacy, and security in digital business. We thank the attendees for coming to Copenhagen to participate and debate the new emerging advances in this area. The workshop program consisted of one invited talk and 11 regular technical paper sessions. The invited talk and keynote speech was delivered by Hannes Federrath from the Chair for Management of Information Security at the University of Regensburg, Germany, on “Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. The regular paper sessions covered a broad range of topics, from access control issues to electronic auctioning, from trust and protocols to smart cards. The conference attracted over 100 submissions of which the Program Committee accepted 32 papers for presentation and inclusion in the conference proceedings. The authors of the accepted papers come from 16 different countries. The proceedings contain the revised versions of all accepted papers.
Author(s): Hannes Federrath (auth.), Sokratis Katsikas, Javier López, Günther Pernul (eds.)
Series: Lecture Notes in Computer Science 3592 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005
Language: English
Pages: 332
Tags: Computers and Society; Management of Computing and Information Systems; Computer Communication Networks; Operating Systems; Data Encryption; Business Information Systems
Front Matter....Pages -
Privacy Enhanced Technologies: Methods – Markets – Misuse....Pages 1-9
Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains....Pages 10-19
Protection Mechanisms Against Phishing Attacks....Pages 20-29
Dropout-Tolerant TTP-Free Mental Poker....Pages 30-40
A Self-healing Mechanism for an Intrusion Tolerance System....Pages 41-49
Protecting Online Rating Systems from Unfair Ratings....Pages 50-59
Anonymous Payment in a Fair E-Commerce Protocol with Verifiable TTP....Pages 60-69
Designing Secure E-Tendering Systems....Pages 70-79
A Multilateral Secure Payment System for Wireless LAN Hotspots....Pages 80-89
Secure Group Communications over Combined Wired and Wireless Networks....Pages 90-99
A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms....Pages 100-109
Making Money with Mobile Qualified Electronic Signatures....Pages 110-118
Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT)....Pages 119-127
Secure Index Search for Groups....Pages 128-140
Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations....Pages 141-150
Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security....Pages 151-160
The Fuzzy and Dynamic Nature of Trust....Pages 161-174
Towards an Ontology of Trust....Pages 175-184
An Improved Group Signature Scheme....Pages 185-194
Efficient Member Revocation in Group Signature Schemes....Pages 195-205
Conditional Digital Signatures....Pages 206-215
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions....Pages 216-225
Privacy Enforcement for IT Governance in Enterprises: Doing It for Real....Pages 226-235
An Adaptive Privacy Management System for Data Repositories....Pages 236-245
Privacy Preserving Data Mining Services on the Web....Pages 246-255
Reading Your Keystroke: Whose Mail Is It?....Pages 256-265
A Novel Construction of Two-Party Private Bidding Protocols from Yao’s Millionaires Problem....Pages 266-273
An Improved Double Auction Protocol Against False Bids....Pages 274-287
An Investigation of Dispute Resolution Mechanisms on Power and Trust: A Domain Study of Online Trust in e-Auctions....Pages 288-298
A Secure Fingerprint Authentication System on an Untrusted Computing Environment....Pages 299-310
Security Enhancement for Password Authentication Schemes with Smart Cards....Pages 311-320
Securing Operating System Services Based on Smart Cards....Pages 321-330
Back Matter....Pages -