000 06104nam a22006735i 4500
001 978-3-540-30079-3
003 DE-He213
005 20240423125915.0
007 cr nn 008mamaa
008 121227s2004 gw | s |||| 0|eng d
020 _a9783540300793
_9978-3-540-30079-3
024 7 _a10.1007/b99832
_2doi
050 4 _aHF4999.2-6182
050 4 _aHD28-70
072 7 _aKJ
_2bicssc
072 7 _aBUS042000
_2bisacsh
072 7 _aKJ
_2thema
082 0 4 _a650
_223
245 1 0 _aTrust and Privacy in Digital Business
_h[electronic resource] :
_bFirst International Conference, TrustBus 2004, Zaragoza, Spain, August 30-September 1, 2004, Proceedings /
_cedited by Sokratis Katsikas, Günther Pernul.
250 _a1st ed. 2004.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2004.
300 _aXI, 301 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v3184
505 0 _aInvited Talk -- Developing Secure, Trusted and Auditable Services for e-Business: An Autonomic Computing Approach -- Trust -- A Mechanism for Trust Sustainability Among Trusted Computing Platforms -- Enabling Trust-Awareness in Naming Services -- Virtual Trust in Distributed Systems -- Modelling Trust Relationships in Distributed Environments -- Access Control -- Dynamically Changing Trust Structure in Capability Based Access Control Systems -- On the Design of a New Trust Model for Mobile Agent Security -- e-Business Issues -- Balancing Privacy and Trust in Electronic Marketplaces -- Reducing Server Trust in Private Proxy Auctions -- Secure Ad-Hoc mBusiness: Enhancing WindowsCE Security -- Role-Based Privilege Management Using Attribute Certificates and Delegation -- Privacy -- Consent as a Threat. A Critical Approach to Privacy Negotiation in e-Commerce Practices -- Dealing with Privacy Obligations: Important Aspects and Technical Approaches -- Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures -- Privacy Preserving Data Generation for Database Application Performance Testing -- e-Voting -- An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness -- Trust in Public Administration e-Transactions: e-Voting in the UK -- Protocols -- An Unbalanced Protocol for Group Key Exchange -- Certified E-Mail with Temporal Authentication: An Improved Optimistic Protocol -- Efficient Password-Based Group Key Exchange -- Optimality in Asynchronous Contract Signing Protocols -- Copyright Protection -- Development of Visible Anti-copy Patterns -- Holographic Image Watermarking for Secure Content -- Hybrid Fingerprint Matching on Programmable Smart Cards -- Protecting ASF Movie on VOD -- Multicast -- DiffSig: Differentiated Digital Signature for Real-Time Multicast Packet Flows -- Large-Scale Pay-As-You-Watch for Unicast and Multicast Communications -- PKI, Signature Schemes -- Reducing the Communication Overhead of an Offline Revocation Dictionary -- Breaking Down Architectural Gaps in Smart-Card Middleware Design -- On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes.
520 _aSincerely welcome to proceedings of the 1st International Conference on Trust and Privacy in Digital Business, Zaragoza, Spain, held from August 30th to September 1st, 2004. This conference was an outgrowth of the two successful TrustBus inter- tional workshops, held in 2002 and 2003 in conjunction with the DEXA conferences in Aix-en-Provence and in Prague. Being the first of a planned series of successful conferences it was our goal that this event would initiate a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust and privacy in digital business. We thank you all the attendees for coming to Zaragoza to participate and debate the new emerging advances in this area. The conference program consisted of one invited talk and nine regular technical papers sessions. The invited talk and keynote speech was delivered by Ahmed Patel from the Computer Networks and Distributed Systems Research Group, University College Dublin, Ireland on “Developing Secure, Trusted and Auditable Services for E-Business: An Autonomic Computing Approach”. A paper covering his talk is also contained in this book. The regular paper sessions covered a broad range of topics, from access control - sues to electronic voting, from trust and protocols to digital rights management. The conference attracted close to 100 submissions of which the program committee - cepted 29 papers for presentation and inclusion in the conference proceedings.
650 0 _aBusiness.
650 0 _aManagement science.
650 0 _aComputers and civilization.
650 0 _aComputer networks .
650 0 _aOperating systems (Computers).
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aElectronic data processing
_xManagement.
650 1 4 _aBusiness and Management.
650 2 4 _aComputers and Society.
650 2 4 _aComputer Communication Networks.
650 2 4 _aOperating Systems.
650 2 4 _aCryptology.
650 2 4 _aIT Operations.
700 1 _aKatsikas, Sokratis.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aPernul, Günther.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540229193
776 0 8 _iPrinted edition:
_z9783662210901
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v3184
856 4 0 _uhttps://doi.org/10.1007/b99832
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
912 _aZDB-2-BAE
942 _cSPRINGER
999 _c182969
_d182969