Atjaunināt sīkdatņu piekrišanu

E-grāmata: Trust, Privacy, and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings

Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 3592
  • Izdošanas datums: 31-Aug-2005
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783540317968
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 3592
  • Izdošanas datums: 31-Aug-2005
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783540317968
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Sincerely welcome to the proceedings of the 2nd International Conference on Trust, Privacy, would be and Security in Digital Business, held in Copenhagen, Denmark, from August 22nd till 26th, 2005. This conference was the successor to the successful TrustBus 2004 conference, held in 2004 in conjunction with the DEXA conferences in Zaragoza. It was our goal that this event would be a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust, privacy, and security in digital business. We thank the attendees for coming to Copenhagen to participate and debate the new emerging advances in this area. The workshop program consisted of one invited talk and 11 regular technical paper sessions. The invited talk and keynote speech was delivered by Hannes Federrath from the Chair for Management of Information Security at the University of Regensburg, Germany, on Privacy Enhanced Technology, Methods Markets Misuse. A paper covering his talk is also contained in this book. The regular paper sessions covered a broad range of topics, from access control issues to electronic auctioning, from trust and protocols to smart cards. The conference attracted over 100 submissions of which the Program Committee accepted 32 papers for presentation and inclusion in the conference proceedings. The authors of the accepted papers come from 16 different countries. The proceedings contain the revised versions of all accepted papers.
Invited Talk
Privacy Enhanced Technologies: Methods -- Markets -- Misuse
1(9)
Hannes Federrath
Digital Business
Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains
10(10)
Petros Belsis
Stefanos Gritzalis
Apostolos Malatras
Christos Skourlas
Ioannis Chalaris
Protection Mechanisms Against Phishing Attacks
20(10)
Klaus Plossl
Hannes Federrath
Thomas Nowey
Dropout-Tolerant TTP-Free Mental Poker
30(11)
Jordi Castella-Roca
Francesc Sebe
Josep Domingo-Ferrer
A Self-healing Mechanism for an Intrusion Tolerance System
41(9)
Bumjoo Park
Kiejin Park
Sungsoo Kim
Protecting Online Rating Systems from Unfair Ratings
50(10)
Jianshu Weng
Chunyan Miao
Angela Goh
Anonymous Payment in a Fair E-Commerce Protocol with Verifiable TTP
60(10)
M. Magdalena Payeras-Capella
Josep Lluis Ferrer-Gomila
Llorenc Huguet-Rotger
Designing Secure E-Tendering Systems
70(10)
Rong Du
Ernest Foo
Juan Gonzalez Nieto
Colin Boyd
Mobile/Wireless Services
A Multilateral Secure Payment System for Wireless LAN Hotspots
80(10)
Stephan Groß
Sabine Lein
Sandra Steinbrecher
Secure Group Communications over Combined Wired and Wireless Networks
90(10)
Junghyun Nam
Seungjoo Kim
Dongho Won
A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms
100(10)
Oliver Jorns
Oliver Jung
Julia Gross
Sandford Bessler
Making Money with Mobile Qualified Electronic Signatures
110(9)
Heiko Rossnagel
Denis Royer
Certificate Revocation/Index Search
Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT)
119(9)
Jose L. Munoz
Jordi Forne
Oscar Esparza
Manel Rey
Secure Index Search for Groups
128(13)
Hyun- A Park
Jin Wook Byun
Dong Hoon Lee
Trust
Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations
141(10)
Nikolaos Oikonomidis
Sergiu Tcaciuc
Christoph Ruland
Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security
151(10)
Ching Lin
Vijay Varadharajan
Yan Wang
The Fuzzy and Dynamic Nature of Trust
161(14)
Elizabeth Chang
Patricia Thomson
Tharam Dillon
Farookh Hussain
Towards an Ontology of Trust
175(10)
Lea Viljanen
Digital Signature
An Improved Group Signature Scheme
185(10)
Jianhong Zhang
Jiancheng Zou
Yumin Wang
Efficient Member Revocation in Group Signature Schemes
195(11)
Eun Young Choi
Hyun-Jeong Kim
Dong Hoon Lee
Conditional Digital Signatures
206(10)
Marek Klonowski
Miroslaw Kutylowski
Anna Lauks
Filip Zagorski
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions
216(10)
Seung-Hyun Seo
Kyung-Ah Shim
Sang-Ho Lee
Privacy
Privacy Enforcement for IT Governance in Enterprises: Doing It for Real
226(10)
Marco Casassa Mont
Robert Thyne
Pete Bramhall
An Adaptive Privacy Management System for Data Repositories
236(10)
Marco Casassa Mont
Siani Pearson
Privacy Preserving Data Mining Services on the Web
246(10)
Ayca Azgin Hintoglu
Yucel Saygin
Salima Benbernou
Mohand Said Hacid
Reading Your Keystroke: Whose Mail Is It?
256(10)
Sylvia Mercado Kierkegaard
E-Auctions
A Novel Construction of Two-Party Private Bidding Protocols from Yao's Millionaires Problem
266(8)
Huafei Zhu
Feng Bao
An Improved Double Auction Protocol Against False Bids
274(14)
Jung Hoon Ha
Jianying Zhou
SangJae Moon
An Investigation of Dispute Resolution Mechanisms on Power and Trust: A Domain Study of Online Trust in e-Auctions
288(11)
Glenn Bewsell
Rodger Jamieson
Adrian Gardiner
Deborah Bunker
Smart Cards/Authentication
A Secure Fingerprint Authentication System on an Untrusted Computing Environment
299(12)
Yongwha Chung
Daesung Moon
Taehae Kim
SungBum Pan
Security Enhancement for Password Authentication Schemes with Smart Cards
311(10)
Eun-Jun Yoon
Woo-Hun Kim
Kee- Young Yoo
Securing Operating System Services Based on Smart Cards
321(10)
Luigi Catuogno
Roberto Gassira
Michele Masullo
Ivan Visconti
Author Index 331