Trust, Privacy and Security in Digital Business: 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 6th International Conference on Trust and Privacy in Digital Business, TrustBus 2009, held in Linz, Austria, in September 2009 in conjunction with DEXA 2009.

The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on user profiling and privacy in digital business; privacy enhancing technologies and identity management; security and privacy in real life applications; reputation and security measurements; access control; and authentication and authorisation.

Author(s): Marek Kumpošt, Vašek Matyáš (auth.), Simone Fischer-Hübner, Costas Lambrinoudakis, Günther Pernul (eds.)
Series: Lecture Notes in Computer Science 5695 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009

Language: English
Pages: 169
Tags: e-Commerce/e-business; Data Encryption; Systems and Data Security; Management of Computing and Information Systems; Computer Communication Networks; Business Information Systems

Front Matter....Pages -
User Profiling and Re-identification: Case of University-Wide Network Analysis....Pages 1-10
Search Engines: Gateway to a New “Panopticon”?....Pages 11-21
Supporting Local Aliases as Usable Presentation of Secure Pseudonyms....Pages 22-31
A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking....Pages 32-41
An Anonymous Credit Card System....Pages 42-51
A Cluster-Based Framework for the Security of Medical Sensor Environments....Pages 52-62
Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: An Action-Based Approach....Pages 63-72
A Formalization of HIPAA for a Medical Messaging System....Pages 73-85
Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems....Pages 86-94
Steering Security through Measurement....Pages 95-104
Advanced Features in Bayesian Reputation Systems....Pages 105-114
An MDA-Based Environment for Generating Access Control Policies....Pages 115-126
An Extended Role-Based Access Control Model for Delegating Obligations....Pages 127-137
The OPL Access Control Policy Language....Pages 138-148
Operational Semantics for DKAL: Application and Analysis....Pages 149-158
HB  −  MAC : Improving the Random  −  HB # Authentication Protocol....Pages 159-168
Back Matter....Pages -