Trust, Privacy, and Security in Digital Business

10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings

Editors:

ISBN: 978-3-642-40342-2 (Print) 978-3-642-40343-9 (Online)

Table of contents (16 chapters)

  1. Front Matter

    Pages -

  2. Session 1: Access Control and Authentication

    1. No Access

      Book Chapter

      Pages 1-12

      Improving Kerberos Ticket Acquisition during Application Service Access Control

    2. No Access

      Book Chapter

      Pages 13-23

      A Better Time Approximation Scheme for e-Passports

  3. Session 2: Identity and Trust Management

    1. No Access

      Book Chapter

      Pages 24-36

      Trust Evaluation of a System for an Activity

    2. No Access

      Book Chapter

      Pages 37-47

      Defining a Trust Framework Design Process

    3. No Access

      Book Chapter

      Pages 48-61

      Executable Model-Based Risk Analysis Method for Identity Management Systems: Using Hierarchical Colored Petri Nets

  4. Session 3: Pivacy and Confidentiality Management

    1. No Access

      Book Chapter

      Pages 62-73

      Preserving the User’s Privacy in Social Networking Sites

    2. No Access

      Book Chapter

      Pages 74-84

      A Classification of Factors Influencing Low Adoption of PETs Among SNS Users

    3. No Access

      Book Chapter

      Pages 85-96

      Towards Privacy-by-Design Peer-to-Peer Cloud Computing

    4. No Access

      Book Chapter

      Pages 97-111

      Preservation of Utility through Hybrid k-Anonymization

  5. Session 4: Information Systems Security

    1. No Access

      Book Chapter

      Pages 112-123

      The Security of Information Systems in Greek Hospitals

    2. No Access

      Book Chapter

      Pages 124-136

      Risk Acceptance and Rejection for Threat and Opportunity Risks in Conflicting Incentives Risk Analysis

  6. Session 5: Security Policies/Legal Issues

    1. No Access

      Book Chapter

      Pages 137-148

      ProCAVE: Privacy-Preserving Collection and Authenticity Validation of Online Evidence

    2. No Access

      Book Chapter

      Pages 149-160

      Assessing the Feasibility of Security Metrics

  7. Session 6: Trust and Privacy in Mobile and Pervasive Environments

    1. No Access

      Book Chapter

      Pages 161-172

      The Influence of Social Media Use on Willingness to Share Location Information

    2. No Access

      Book Chapter

      Pages 173-184

      A Qualitative Metrics Vector for the Awareness of Smartphone Security Users

    3. No Access

      Book Chapter

      Pages 185-198

      Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions

  8. Back Matter

    Pages -