Trust, Privacy and Security in Digital Business

5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings

  • Editors
  • Steven Furnell
  • Sokratis K. Katsikas
  • Antonio Lioy
Conference proceedings TrustBus 2008
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5185)

Table of contents

  1. Front Matter
  2. Invited Lecture

  3. Trust

    1. John Debenham, Carles Sierra
      Pages 8-17
    2. SuGil Choi, JinHee Han, JeongWoo Lee, JongPil Kim, SungIk Jun
      Pages 18-27
    3. Isaac Agudo, Carmen Fernandez-Gago, Javier Lopez
      Pages 28-37
  4. Authentication, Authorization and Access Control

    1. Eduardo B. Fernandez, Günther Pernul, Maria M. Larrondo-Petrie
      Pages 38-47
    2. Dimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis
      Pages 59-68
  5. Reputation Systems

    1. Adam Wierzbicki, Radoslaw Nielek
      Pages 79-89
    2. Audun Jøsang, Touhid Bhuiyan, Yue Xu, Clive Cox
      Pages 90-99
  6. Security Policies and Identity Management

    1. Benjamin Aziz, Alvaro Arenas, Fabio Martinelli, Ilaria Matteucci, Paolo Mori
      Pages 100-117
    2. Subhendu Aich, Shamik Sural, Arun K. Majumdar
      Pages 118-127
  7. Intrusion Detection and Applications of Game Theory to IT Security Problems

    1. Gina C. Tjhai, Maria Papadaki, Steven M. Furnell, Nathan L. Clarke
      Pages 139-150
    2. Ioanna Kantzavelou, Sokratis Katsikas
      Pages 151-162
    3. Jens O. Oberender, Hermann de Meer
      Pages 163-172
  8. Privacy

    1. Susana Alcalde Bagüés, Jelena Mitic, Andreas Zeidler, Marta Tejada, Ignacio R. Matias, Carlos Fernandez Valdivielso
      Pages 173-184
    2. Suriadi Suriadi, Ernest Foo, Jason Smith
      Pages 185-194
    3. Wesley Brandi, Martin S. Olivier, Alf Zugenmaier
      Pages 195-204

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 5th International Conference on Trust and Privacy in Digital Business, TrustBus 2008, held in Turin, Italy, in September 2008 in conjunction with DEXA 2008.

The 18 revised full papers presented together with 1 invited keynote lecture were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on trust, authentication, authorization and access control, reputation systems, security policies and identity management, intrusion detection and applications of game theory to IT security problems, and privacy.

Keywords

IT security business game theory identity identity management management privacy security trust

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-85735-8
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-85734-1
  • Online ISBN 978-3-540-85735-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book