This book presents the proceedings of the 7th International Conference on Trust, P- vacy and Security in Digital Business (TrustBus 2010), held in Bilbao, Spain during August 30–31, 2010. The conference continued from previous events held in Zaragoza (2004), Copenhagen (2005), Krakow (2006), Regensburg (2007), Turin (2008) and Linz (2009). The recent advances in information and communication technologies (ICT) have raised new opportunities for the implementation of novel applications and the provision of high-quality services over global networks. The aim is to utilize this ‘information society era’ for improving the quality of life for all citizens, disseminating knowledge, strengthening social cohesion, generating earnings and finally ensuring that organi- tions and public bodies remain competitive in the global electronic marketplace. - fortunately, such a rapid technological evolution cannot be problem-free. Concerns are raised regarding the ‘lack of trust’ in electronic procedures and the extent to which ‘information security’ and ‘user privacy’ can be ensured. TrustBus 2010 brought together academic researchers and industry developers, who discussed the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Bilbao to participate and debate the new emerging advances in this area.
Author(s): Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori (auth.), Sokratis Katsikas, Javier Lopez, Miguel Soriano (eds.)
Series: Lecture Notes in Computer Science 6264 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010
Language: English
Pages: 252
Tags: Computer Communication Networks; Management of Computing and Information Systems; Data Encryption; Computers and Society; Information Systems Applications (incl.Internet); Algorithm Analysis and Problem Complexity
Front Matter....Pages -
Usage Control, Risk and Trust....Pages 1-12
Attacking Image Recognition Captcha s....Pages 13-25
An Insider Threat Prediction Model....Pages 26-37
A Call Conference Room Interception Attack and Its Detection....Pages 38-44
Safe and Efficient Strategies for Updating Firewall Policies....Pages 45-57
A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression....Pages 58-68
Context-Aware Privacy Design Pattern Selection....Pages 69-80
Real-Time Remote Attestation with Privacy Protection....Pages 81-92
Private Searching on MapReduce....Pages 93-101
In Search of Search Privacy....Pages 102-116
Untraceability and Profiling Are Not Mutually Exclusive....Pages 117-128
Privacy Policy Referencing....Pages 129-140
Formal Proof of Cooperativeness in a Multi–Party P2P Content Authentication Protocol....Pages 141-152
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation....Pages 153-164
An Agent Based Back-End RFID Tag Management System....Pages 165-176
Assessing the Usability of End-User Security Software....Pages 177-189
Building ISMS through the Reuse of Knowledge....Pages 190-201
Mechanizing Social Trust-Aware Recommenders with T-Index Augmented Trustworthiness....Pages 202-213
Security for Dynamic Service-Oriented eCollaboration....Pages 214-226
Analyzing Information Security Awareness through Networks of Association....Pages 227-237
Efficiency Improvement of Homomorphic E-Auction....Pages 238-249
Back Matter....Pages -