Trust and Privacy in Digital Business (Record no. 183670)

MARC details
000 -LEADER
fixed length control field 06108nam a22006495i 4500
001 - CONTROL NUMBER
control field 978-3-540-37752-8
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240423125955.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100301s2006 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783540377528
-- 978-3-540-37752-8
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/11824633
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.C66
072 #7 - SUBJECT CATEGORY CODE
Subject category code UBJ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM079000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UBJ
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 303.4834
Edition number 23
245 10 - TITLE STATEMENT
Title Trust and Privacy in Digital Business
Medium [electronic resource] :
Remainder of title Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings /
Statement of responsibility, etc edited by Simone Fischer-Hübner, Steven Furnell, Costas Lambrinoudakis.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2006.
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg :
-- Imprint: Springer,
-- 2006.
300 ## - PHYSICAL DESCRIPTION
Extent XIV, 250 p.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Security and Cryptology,
International Standard Serial Number 2946-1863 ;
Volume number/sequential designation 4083
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Session 1: Privacy and Identity Management -- Towards Scalable Management of Privacy Obligations in Enterprises -- A New User-Centric Identity Management Infrastructure for Federated Systems -- Session 2: Security and Risk Management -- Information Security Risk Assessment Model for Risk Management -- On the Limits of Cyber-Insurance -- Towards a Risk Management Perspective on AAIs -- Session 3: Security Requirements and Development -- Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes -- A Framework for Exploiting Security Expertise in Application Development -- On Diffusion and Confusion – Why Electronic Signatures Have Failed -- Session 4: Privacy Enhancing Technologies and Privacy Management -- Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy -- A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises -- A Generic Privacy Enhancing Technology for Pervasive Computing Environments -- Bringing the User Back into Control: A New Paradigm for Usability in Highly Dynamic Systems -- Session 5: Access Control Models -- Extending SQL to Allow the Active Usage of Purposes -- FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy -- A Framework for Modeling Restricted Delegation in Service Oriented Architecture -- Session 6: Trust and Reputation -- Reputation-Based Trust Systems for P2P Applications: Design Issues and Comparison Framework -- Towards Trust in Digital Rights Management Systems -- Cluster-Based Analysis and Recommendation of Sellers in Online Auctions -- Trust Model Architecture: Defining Prejudice by Learning -- Session 7: Security Protocols -- How to Protect a Signature from Being Shown to a Third Party -- Security Analysis and Improvement for Key IssuingSchemes in ID-Based Cryptography -- A Secure E-Tender Submission Protocol -- Session 8: Security and Privacy in Mobile Environments -- A Sophisticated Solution for Revealing Attacks on Wireless LAN -- Information Leakage in Ubiquitous Voice-over-IP Communications.
520 ## - SUMMARY, ETC.
Summary, etc This book presents the proceedings of the Third International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2006), held in Kraków, Poland, September 5-7, 2006. The conference continues from previous events held in Zaragoza (2004) and Copenhagen (2005), and maintains the aim of bringing together academic researchers and industry developers to discuss the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Kraków to participate and debate the new emerging advances in this area. The conference programme included two keynote presentations, one panel session and eight technical papers sessions. The keynote speeches were delivered by Jeremy Ward from Symantec EMEA on the topic of “Building the Information Assurance Community of Purpose”, and by Günter Karjoth from IBM Research - Zurich, with a talk entitled “Privacy Practices and Economics –– From Privacy Policies to Privacy SLAs. ” The subject of the panel discussion was “Is Security Without Trust Feasible?” chaired by Leszek T. Lilien from Western Michigan University, USA. The reviewed paper sessions covered a broad range of topics, from access control models to security and risk management, and from privacy and identity management to security protocols. The conference attracted 70 submissions, each of which was assigned to four referees for review. The Programme Committee ultimately accepted 24 papers for inclusion, which were revised based upon comments from their reviews.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers and civilization.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic data processing
General subdivision Management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks .
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Operating systems (Computers).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Business information services.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers and Society.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element IT Operations.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptology.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Operating Systems.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element IT in Business.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Fischer-Hübner, Simone.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Furnell, Steven.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Lambrinoudakis, Costas.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783540377504
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783540828150
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Security and Cryptology,
-- 2946-1863 ;
Volume number/sequential designation 4083
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/11824633">https://doi.org/10.1007/11824633</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-CSE-Springer

No items available.

© 2024 IIIT-Delhi, library@iiitd.ac.in