注冊(cè) | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當(dāng)前位置: 首頁出版圖書科學(xué)技術(shù)計(jì)算機(jī)/網(wǎng)絡(luò)信息安全數(shù)字業(yè)務(wù)中的信任與保密:TrustBus 2006/會(huì)議錄

數(shù)字業(yè)務(wù)中的信任與保密:TrustBus 2006/會(huì)議錄

數(shù)字業(yè)務(wù)中的信任與保密:TrustBus 2006/會(huì)議錄

定 價(jià):¥508.50

作 者: Simone Fischer-Hübner 著
出版社: 崇文書局(原湖北辭書出版社)
叢編項(xiàng):
標(biāo) 簽: 暫缺

ISBN: 9783540377504 出版時(shí)間: 2006-12-01 包裝: 平裝
開本: 頁數(shù): 字?jǐn)?shù):  

內(nèi)容簡介

  This book constitutes the refereed proceedings of the Third International Conference on Trust and Privacy in Digital Business, TrustBus 2006, held in Krakow, Poland in September 2006 in conjunction with DEXA 2006.The 24 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on privacy and identity management, security and risk management, security requirements and development, privacy enhancing technologies and privacy management, access control models, trust and reputation, security protocols, and security and privacy in mobile environments.

作者簡介

暫缺《數(shù)字業(yè)務(wù)中的信任與保密:TrustBus 2006/會(huì)議錄》作者簡介

圖書目錄

Session 1: Privacy and Identity Management
Towards Scalable Management of Privacy Obligations in Enterprises
A New User-Centric Identity Management Infrastructure for Federated Systems
Session 2: Security and Risk Management
Information Security Risk Assessment Model for Risk Management
On the Limits of Cyber-Insurance
Towards a Risk Management Perspective on AAIs
Session 3: Security Requirements and Development
Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes
A Framework for Exploiting Security Expertise in Application Development
On Diffusion and Confusion Why Electronic Signatures Have Failed
Session 4: Privacy Enhancing Technologies and Privacy Management
Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy
A Systematic Approach to Privacy Enforcement and Policy Complian Checking in Enterprises
A Generic Privacy Enhancing Technology for Pervasive Computing Environments
Bringing the User Back into Control: A New Paradigm for Usability in Highly Dynamic Systems
Session 5: Access Control Models
Extending SQL to Allow the Active Usage of Purposes
FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy
A Framework for Modeling Restricted Delegation in Service Oriente~ Architecture
Session 6: Trust and Reputation
Reputation-Based Trust Systems for P2P Applications: Design Issue and Comparison Framework
Towards Trust in Digital Rights Management Systems
Cluster-Based Analysis and Recommendation of Sellers in Online Auctions
Trust Model Architecture: Defining Prejudice by Learning
Session 7: Security Protocols
How to Protect a Signature from Being Shown to a Third Party
……
Session 8: Security and Privacy in Mobile Environments
Author Index

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) m.ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號(hào) 鄂公網(wǎng)安備 42010302001612號(hào)