| 000 | 03824nam a22005775i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-15152-1 | ||
| 003 | DE-He213 | ||
| 005 | 20140220084544.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100830s2010 gw | s |||| 0|eng d | ||
| 020 |
_a9783642151521 _9978-3-642-15152-1 |
||
| 024 | 7 |
_a10.1007/978-3-642-15152-1 _2doi |
|
| 050 | 4 | _aTK5105.5-5105.9 | |
| 072 | 7 |
_aUKN _2bicssc |
|
| 072 | 7 |
_aCOM075000 _2bisacsh |
|
| 082 | 0 | 4 |
_a004.6 _223 |
| 100 | 1 |
_aKatsikas, Sokratis. _eeditor. |
|
| 245 | 1 | 0 |
_aTrust, Privacy and Security in Digital Business _h[electronic resource] : _b7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings / _cedited by Sokratis Katsikas, Javier Lopez, Miguel Soriano. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
| 300 |
_aXII, 252p. 67 illus. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6264 |
|
| 505 | 0 | _aInvited Talk -- Usage Control, Risk and Trust -- Prevention Systems -- Attacking Image Recognition Captchas -- An Insider Threat Prediction Model -- A Call Conference Room Interception Attack and Its Detection -- Safe and Efficient Strategies for Updating Firewall Policies -- Privacy I -- A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression -- Context-Aware Privacy Design Pattern Selection -- Real-Time Remote Attestation with Privacy Protection -- Private Searching on MapReduce -- Privacy II -- In Search of Search Privacy -- Untraceability and Profiling Are Not Mutually Exclusive -- Privacy Policy Referencing -- Access Control -- Formal Proof of Cooperativeness in a Multi–Party P2P Content Authentication Protocol -- Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation -- An Agent Based Back-End RFID Tag Management System -- Security and Trust Concepts -- Assessing the Usability of End-User Security Software -- Building ISMS through the Reuse of Knowledge -- Mechanizing Social Trust-Aware Recommenders with T-Index Augmented Trustworthiness -- Security for Dynamic Collaborations -- Security for Dynamic Service-Oriented eCollaboration -- Analyzing Information Security Awareness through Networks of Association -- Efficiency Improvement of Homomorphic E-Auction. | |
| 520 | _aThis book constitutes the refereed proceedings of the 7th International Conference on Trust, Privacy and Digital Business, TrustBus 2010, held in Bilbao, Spain, in August 2010. The papers are organized in topical sections on prevention systems; privacy; access control; security and trust concepts; and security for dynamic collaborations. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aData encryption (Computer science). | |
| 650 | 0 | _aComputer software. | |
| 650 | 0 | _aInformation systems. | |
| 650 | 0 | _aInformation Systems. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 650 | 2 | 4 | _aManagement of Computing and Information Systems. |
| 650 | 2 | 4 | _aData Encryption. |
| 650 | 2 | 4 | _aComputers and Society. |
| 650 | 2 | 4 | _aInformation Systems Applications (incl.Internet). |
| 650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
| 700 | 1 |
_aLopez, Javier. _eeditor. |
|
| 700 | 1 |
_aSoriano, Miguel. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642151514 |
| 830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6264 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-15152-1 |
| 912 | _aZDB-2-SCS | ||
| 912 | _aZDB-2-LNC | ||
| 999 |
_c112588 _d112588 |
||