Skip to main content
  • Conference proceedings
  • © 2006

Trust and Privacy in Digital Business

Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4083)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): TrustBus: International Conference on Trust and Privacy in Digital Business

Conference proceedings info: TrustBus 2006.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (24 papers)

  1. Front Matter

  2. Session 1: Privacy and Identity Management

    1. A New User-Centric Identity Management Infrastructure for Federated Systems

      • Vassilis Poursalidis, Christos Nikolaou
      Pages 11-20
  3. Session 2: Security and Risk Management

    1. On the Limits of Cyber-Insurance

      • Rainer Böhme, Gaurav Kataria
      Pages 31-40
    2. Towards a Risk Management Perspective on AAIs

      • Christian Schläger, Thomas Nowey
      Pages 41-50
  4. Session 3: Security Requirements and Development

    1. Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes

      • Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
      Pages 51-61
    2. A Framework for Exploiting Security Expertise in Application Development

      • Theodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis Katsikas
      Pages 62-70
  5. Session 4: Privacy Enhancing Technologies and Privacy Management

    1. A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises

      • Marco Casassa Mont, Siani Pearson, Robert Thyne
      Pages 91-102
    2. A Generic Privacy Enhancing Technology for Pervasive Computing Environments

      • Stelios Dritsas, John Tsaparas, Dimitris Gritzalis
      Pages 103-113
  6. Session 5: Access Control Models

    1. Extending SQL to Allow the Active Usage of Purposes

      • Wynand van Staden, Martin S. Olivier
      Pages 123-131
    2. FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy

      • Guoqiang Zhan, Zude Li, Xiaojun Ye, Jianmin Wang
      Pages 132-141
    3. A Framework for Modeling Restricted Delegation in Service Oriented Architecture

      • Muhammad Alam, Michael Hafner, Ruth Breu, Stefan Unterthiner
      Pages 142-151
  7. Session 6: Trust and Reputation

    1. Towards Trust in Digital Rights Management Systems

      • Jürgen Nützel, Anja Beyer
      Pages 162-171
    2. Cluster-Based Analysis and Recommendation of Sellers in Online Auctions

      • Mikołaj Morzy, Juliusz Jezierski
      Pages 172-181
    3. Trust Model Architecture: Defining Prejudice by Learning

      • M. Wojcik, J. H. P. Eloff, H. S. Venter
      Pages 182-191

Other Volumes

  1. Trust and Privacy in Digital Business

About this book

This book presents the proceedings of the Third International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2006), held in Kraków, Poland, September 5-7, 2006. The conference continues from previous events held in Zaragoza (2004) and Copenhagen (2005), and maintains the aim of bringing together academic researchers and industry developers to discuss the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Kraków to participate and debate the new emerging advances in this area. The conference programme included two keynote presentations, one panel session and eight technical papers sessions. The keynote speeches were delivered by Jeremy Ward from Symantec EMEA on the topic of “Building the Information Assurance Community of Purpose”, and by Günter Karjoth from IBM Research - Zurich, with a talk entitled “Privacy Practices and Economics –– From Privacy Policies to Privacy SLAs. ” The subject of the panel discussion was “Is Security Without Trust Feasible?” chaired by Leszek T. Lilien from Western Michigan University, USA. The reviewed paper sessions covered a broad range of topics, from access control models to security and risk management, and from privacy and identity management to security protocols. The conference attracted 70 submissions, each of which was assigned to four referees for review. The Programme Committee ultimately accepted 24 papers for inclusion, which were revised based upon comments from their reviews.

Keywords

  • business
  • development
  • identity
  • identity management
  • management
  • privacy
  • security
  • trust

Editors and Affiliations

  • Department of Computer Science, Karlstad University, Karlstad, Sweden

    Simone Fischer-Hübner

  • School of Computing, Communications and Electronics, Network Research Group, University of Plymouth, Plymouth, UK

    Stevel Furnell

  • Laboratory of Information and Communication Systems Security Department of Information and Communication Systems Engineering, University of the Aegean, Samos, Greece

    Costas Lambrinoudakis

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions