Trust and Privacy in Digital Business (Record no. 92818)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06213nam a22006495i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-540-37752-8 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730185427.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 100301s2006 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783540377528 |
-- | 978-3-540-37752-8 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/11824633 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.C66 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UBJ |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM079000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UBJ |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 303.4834 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Trust and Privacy in Digital Business |
Medium | [electronic resource] : |
Remainder of title | Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings / |
Statement of responsibility, etc. | edited by Simone Fischer-Hübner, Steven Furnell, Costas Lambrinoudakis. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2006. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Berlin, Heidelberg : |
Name of producer, publisher, distributor, manufacturer | Springer Berlin Heidelberg : |
-- | Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice | 2006. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XIV, 250 p. |
Other physical details | online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS | |
File type | text file |
Encoding format | |
Source | rda |
490 1# - SERIES STATEMENT | |
Series statement | Security and Cryptology, |
International Standard Serial Number | 2946-1863 ; |
Volume/sequential designation | 4083 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Session 1: Privacy and Identity Management -- Towards Scalable Management of Privacy Obligations in Enterprises -- A New User-Centric Identity Management Infrastructure for Federated Systems -- Session 2: Security and Risk Management -- Information Security Risk Assessment Model for Risk Management -- On the Limits of Cyber-Insurance -- Towards a Risk Management Perspective on AAIs -- Session 3: Security Requirements and Development -- Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes -- A Framework for Exploiting Security Expertise in Application Development -- On Diffusion and Confusion - Why Electronic Signatures Have Failed -- Session 4: Privacy Enhancing Technologies and Privacy Management -- Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy -- A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises -- A Generic Privacy Enhancing Technology for Pervasive Computing Environments -- Bringing the User Back into Control: A New Paradigm for Usability in Highly Dynamic Systems -- Session 5: Access Control Models -- Extending SQL to Allow the Active Usage of Purposes -- FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy -- A Framework for Modeling Restricted Delegation in Service Oriented Architecture -- Session 6: Trust and Reputation -- Reputation-Based Trust Systems for P2P Applications: Design Issues and Comparison Framework -- Towards Trust in Digital Rights Management Systems -- Cluster-Based Analysis and Recommendation of Sellers in Online Auctions -- Trust Model Architecture: Defining Prejudice by Learning -- Session 7: Security Protocols -- How to Protect a Signature from Being Shown to a Third Party -- Security Analysis and Improvement for Key IssuingSchemes in ID-Based Cryptography -- A Secure E-Tender Submission Protocol -- Session 8: Security and Privacy in Mobile Environments -- A Sophisticated Solution for Revealing Attacks on Wireless LAN -- Information Leakage in Ubiquitous Voice-over-IP Communications. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This book presents the proceedings of the Third International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2006), held in Kraków, Poland, September 5-7, 2006. The conference continues from previous events held in Zaragoza (2004) and Copenhagen (2005), and maintains the aim of bringing together academic researchers and industry developers to discuss the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Kraków to participate and debate the new emerging advances in this area. The conference programme included two keynote presentations, one panel session and eight technical papers sessions. The keynote speeches were delivered by Jeremy Ward from Symantec EMEA on the topic of "Building the Information Assurance Community of Purpose", and by Günter Karjoth from IBM Research - Zurich, with a talk entitled "Privacy Practices and Economics -- From Privacy Policies to Privacy SLAs. " The subject of the panel discussion was "Is Security Without Trust Feasible?" chaired by Leszek T. Lilien from Western Michigan University, USA. The reviewed paper sessions covered a broad range of topics, from access control models to security and risk management, and from privacy and identity management to security protocols. The conference attracted 70 submissions, each of which was assigned to four referees for review. The Programme Committee ultimately accepted 24 papers for inclusion, which were revised based upon comments from their reviews. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers and civilization. |
9 (RLIN) | 21733 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Electronic data processing |
General subdivision | Management. |
9 (RLIN) | 139264 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptography. |
9 (RLIN) | 1973 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data encryption (Computer science). |
9 (RLIN) | 9168 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks . |
9 (RLIN) | 31572 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Operating systems (Computers). |
9 (RLIN) | 5329 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Business information services. |
9 (RLIN) | 28705 |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers and Society. |
9 (RLIN) | 31668 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | IT Operations. |
9 (RLIN) | 31703 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptology. |
9 (RLIN) | 31769 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer Communication Networks. |
9 (RLIN) | 139265 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Operating Systems. |
9 (RLIN) | 37074 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | IT in Business. |
9 (RLIN) | 33373 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Fischer-Hübner, Simone. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 139266 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Furnell, Steven. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 139267 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Lambrinoudakis, Costas. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 139268 |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
9 (RLIN) | 139269 |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783540377504 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783540828150 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Security and Cryptology, |
International Standard Serial Number | 2946-1863 ; |
Volume/sequential designation | 4083 |
9 (RLIN) | 139270 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/11824633">https://doi.org/10.1007/11824633</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-Lecture Notes in CS |
No items available.