Trust, Privacy and Security in Digital Business

5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings

  • Editors
  • Steven Furnell
  • Sokratis K. Katsikas
  • Antonio Lioy
Conference proceedings TrustBus 2008

DOI: 10.1007/978-3-540-85735-8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5185)

Table of contents (19 papers)

  1. Front Matter
  2. Invited Lecture

  3. Trust

    1. A Map of Trust between Trading Partners
      John Debenham, Carles Sierra
      Pages 8-17
    2. Implementation of a TCG-Based Trusted Computing in Mobile Device
      SuGil Choi, JinHee Han, JeongWoo Lee, JongPil Kim, SungIk Jun
      Pages 18-27
    3. A Model for Trust Metrics Analysis
      Isaac Agudo, Carmen Fernandez-Gago, Javier Lopez
      Pages 28-37
  4. Authentication, Authorization and Access Control

    1. Patterns and Pattern Diagrams for Access Control
      Eduardo B. Fernandez, Günther Pernul, Maria M. Larrondo-Petrie
      Pages 38-47
    2. A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony
      Dimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis
      Pages 59-68
  5. Reputation Systems

    1. Fairness Emergence through Simple Reputation
      Adam Wierzbicki, Radoslaw Nielek
      Pages 79-89
    2. Combining Trust and Reputation Management for Web-Based Services
      Audun Jøsang, Touhid Bhuiyan, Yue Xu, Clive Cox
      Pages 90-99
  6. Security Policies and Identity Management

    1. Controlling Usage in Business Process Workflows through Fine-Grained Security Policies
      Benjamin Aziz, Alvaro Arenas, Fabio Martinelli, Ilaria Matteucci, Paolo Mori
      Pages 100-117
    2. Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy
      Subhendu Aich, Shamik Sural, Arun K. Majumdar
      Pages 118-127
  7. Intrusion Detection and Applications of Game Theory to IT Security Problems

    1. The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset
      Gina C. Tjhai, Maria Papadaki, Steven M. Furnell, Nathan L. Clarke
      Pages 139-150
    2. A Generic Intrusion Detection Game Model in IT Security
      Ioanna Kantzavelou, Sokratis Katsikas
      Pages 151-162
    3. On the Design Dilemma in Dining Cryptographer Networks
      Jens O. Oberender, Hermann de Meer
      Pages 163-172
  8. Privacy

    1. Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing
      Susana Alcalde Bagüés, Jelena Mitic, Andreas Zeidler, Marta Tejada, Ignacio R. Matias, Carlos Fernandez Valdivielso
      Pages 173-184
    2. A User-Centric Protocol for Conditional Anonymity Revocation
      Suriadi Suriadi, Ernest Foo, Jason Smith
      Pages 185-194
    3. Preservation of Privacy in Thwarting the Ballot Stuffing Scheme
      Wesley Brandi, Martin S. Olivier, Alf Zugenmaier
      Pages 195-204

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 5th International Conference on Trust and Privacy in Digital Business, TrustBus 2008, held in Turin, Italy, in September 2008 in conjunction with DEXA 2008.

The 18 revised full papers presented together with 1 invited keynote lecture were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on trust, authentication, authorization and access control, reputation systems, security policies and identity management, intrusion detection and applications of game theory to IT security problems, and privacy.

Keywords

IT security business game theory identity identity management management privacy security trust

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-85734-1
  • Online ISBN 978-3-540-85735-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349