Trust, Privacy and Security in Digital Business

9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedings

  • Simone Fischer-Hübner
  • Sokratis Katsikas
  • Gerald Quirchmayr
Conference proceedings TrustBus 2012

DOI: 10.1007/978-3-642-32287-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7449)

Table of contents (30 papers)

  1. Front Matter
  2. Web Security

    1. How Much Network Security Must Be Visible in Web Browsers?
      Tobias Hirsch, Luigi Lo Iacono, Ina Wechsung
      Pages 1-16
    2. A User-Level Authentication Scheme to Mitigate Web Session-Based Vulnerabilities
      Bastian Braun, Stefan Kucher, Martin Johns, Joachim Posegga
      Pages 17-29
    3. Access Control Configuration for J2EE Web Applications: A Formal Perspective
      Matteo Maria Casalino, Romuald Thion, Mohand-Said Hacid
      Pages 30-35
  3. Secure Management Processes and Procedures

    1. Cloud Separation: Stuck Inside the Cloud
      Waldo Delport, Martin S. Olivier
      Pages 36-49
    2. Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process
      Kashif Syed, Pavol Zavarsky, Dale Lindskog, Ron Ruhl, Shaun Aghili
      Pages 50-64
  4. Access Control

    1. An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control
      Michael Netter, Sabri Hassan, Günther Pernul
      Pages 65-78
    2. A Prototype for Enforcing Usage Control Policies Based on XACML
      Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori
      Pages 79-92
  5. Intrusion Detection - Trust

    1. A Conceptual Framework for Trust Models
      Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez
      Pages 93-104
    2. Advances and Challenges in Standalone Host-Based Intrusion Detection Systems
      Vit Bukac, Pavel Tucek, Martin Deutsch
      Pages 105-117
  6. Applied Cryptography

    1. Encrypted Adaptive Storage Model – Analysis and Performance Tests
      Marcin Gorawski, Michal Lorek, Michal Gorawski
      Pages 118-128
    2. Efficient Comparison of Encrypted Biometric Templates
      Michael Dorn, Peter Wackersreuther, Christian Böhm
      Pages 129-142
    3. Short and Efficient Identity-Based Undeniable Signature Scheme
      Rouzbeh Behnia, Swee-Huay Heng, Che-Sheng Gan
      Pages 143-148
  7. Privacy

    1. Damage Sharing May Not Be Enough: An Analysis of an Ex-ante Regulation Policy for Data Breaches
      Giuseppe D’Acquisto, Marta Flamini, Maurizio Naldi
      Pages 149-160
    2. Flexible Regulation with Privacy Points
      Hanno Langweg, Lisa Rajbhandari
      Pages 161-166
  8. Secure Services, Databases and Data Warehouses

    1. On the Security of the Non-Repudiation of Forwarding Service
      Rainer Schick, Christoph Ruland
      Pages 167-178
    2. Profitability and Cost Management of Trustworthy Composite Services
      Hisain Elshaafi, Jimmy McGibney, Dmitri Botvich
      Pages 179-191
    3. Verification of Security Coherence in Data Warehouse Designs
      Ali Salem, Salah Triki, Hanêne Ben-Abdallah, Nouria Harbi, Omar Boussaid
      Pages 207-213
  9. Presentation of EU Projects (Extended Abstracts)

About these proceedings


This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2012, held in Vienna, Austria, in September 2012 in conjunction with DEXA 2012.
The 18 revised full papers presented together with 12 presentations of EU projects were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: Web security; secure management processes and procedures; access control; intrusion detection - trust; applied cryptography; secure services, databases, and data warehouses; and presentations of EU projects.


Internet of things authentication encryption policy trustworthy services

Editors and affiliations

  • Simone Fischer-Hübner
    • 1
  • Sokratis Katsikas
    • 2
  • Gerald Quirchmayr
    • 3
  1. 1.Department of Computer ScienceKarlstad UniversityKarlstadSweden
  2. 2.Department of Digital SystemsUniversity of PiraeusPiraeusGreece
  3. 3.Department of IT, Engineering and EnvironmentUniversity of South AustraliaAdelaideAustralia

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-32286-0
  • Online ISBN 978-3-642-32287-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349