|  |
 |
| Artikel-Nr.: 5667A-9783540744085 Herst.-Nr.: 9783540744085 EAN/GTIN: 9783540744085 |
| |
|
|  |  |
 | Trustbus'07 Keynote Talk Privacy Enhanced Personalization.- Trustbus'07 Keynote Talk Privacy Enhanced Personalization.- Panel Discussion Managing Digital Identities - Challenges and Opportunities.- Session 1: Secure and Trusted Virtual Organisations.- Recognition of Authority in Virtual Organisations.- Securing VO Management.- Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship.- Specification of the TrustMan System for Assisting Management of VBEs.- Session 2: Privacy in Digital Business.- A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third Party.- Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures.- Privacy Assurance: Bridging the Gap Between Preference and Practice.- Session 3: Identity Management and Usage Control.- Enhancing Optimistic Access Controls with Usage Control.- Usage Control in Service-Oriented Architectures.- On Device-Based Identity Management in Enterprises.- Analysis-Level Classes from Secure Business Processes Through Model Transformations.- Session 4: Authentication and Access Control.- A Trust and Context Aware Access Control Model for Web Services Conversations.- Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains.- On Device Authentication in Wireless Networks: Present Issues and Future Challenges.- Session 5: Compliance and User Privacy.- The Meaning of Logs.- Data Protection and Privacy Laws in the Light of RFID and Emerging Technologies.- Consistency of User Attribute in Federated Systems.- Session 6: Policy Management.- Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes.- Situation-Based Policy Enforcement.- Using Purpose Lattices to FacilitateCustomisation of Privacy Agreements.- A Pattern-Driven Framework for Monitoring Security and Dependability.- Session 7: Security System Management.- Security Aspects for Secure Download of Regulated Software.- Using the Lens of Circuits of Power in Information Systems Security Management.- Fuzzy Service Selection and Interaction Review in Distributed Electronic Markets.- Session 8: Security and Trust.- X316 Security Toolbox for New Generation of Certificate.- Detecting Malicious SQL.- Trusted Code Execution in JavaCard.- How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards. Weitere Informationen:  |  | Author: | Costas Lambrinoudakis; Günther Pernul; A Min Tjoa | Verlag: | Springer Berlin | Sprache: | eng |
|
|  |  |
 | |  |  |
 | Weitere Suchbegriffe: bücher über e-commerce - englischsprachig, Datensicherheit / Netz, E-Business, Electronic Commerce - E-Commerce, E-Venture, Internet / Electronic Commerce, Net Economy, DRM systems, SQL, VoIP, access control, business process |
|  |  |
| |