Update cookies preferences

E-book: Trust, Privacy, and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings

Edited by , Edited by
  • Format: PDF+DRM
  • Series: Security and Cryptology 3592
  • Pub. Date: 31-Aug-2005
  • Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Language: eng
  • ISBN-13: 9783540317968
Other books in subject:
  • Format - PDF+DRM
  • Price: 55,56 €*
  • * the price is final i.e. no additional discount will apply
  • Add to basket
  • Add to Wishlist
  • This ebook is for personal use only. E-Books are non-refundable.
  • Format: PDF+DRM
  • Series: Security and Cryptology 3592
  • Pub. Date: 31-Aug-2005
  • Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Language: eng
  • ISBN-13: 9783540317968
Other books in subject:

DRM restrictions

  • Copying (copy/paste):

    not allowed

  • Printing:

    not allowed

  • Usage:

    Digital Rights Management (DRM)
    The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it.  To read this e-book you have to create Adobe ID More info here. Ebook can be read and downloaded up to 6 devices (single user with the same Adobe ID).

    Required software
    To read this ebook on a mobile device (phone or tablet) you'll need to install this free app: PocketBook Reader (iOS / Android)

    To download and read this eBook on a PC or Mac you need Adobe Digital Editions (This is a free app specially developed for eBooks. It's not the same as Adobe Reader, which you probably already have on your computer.)

    You can't read this ebook with Amazon Kindle

Sincerely welcome to the proceedings of the 2nd International Conference on Trust, Privacy, would be and Security in Digital Business, held in Copenhagen, Denmark, from August 22nd till 26th, 2005. This conference was the successor to the successful TrustBus 2004 conference, held in 2004 in conjunction with the DEXA conferences in Zaragoza. It was our goal that this event would be a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust, privacy, and security in digital business. We thank the attendees for coming to Copenhagen to participate and debate the new emerging advances in this area. The workshop program consisted of one invited talk and 11 regular technical paper sessions. The invited talk and keynote speech was delivered by Hannes Federrath from the Chair for Management of Information Security at the University of Regensburg, Germany, on Privacy Enhanced Technology, Methods Markets Misuse. A paper covering his talk is also contained in this book. The regular paper sessions covered a broad range of topics, from access control issues to electronic auctioning, from trust and protocols to smart cards. The conference attracted over 100 submissions of which the Program Committee accepted 32 papers for presentation and inclusion in the conference proceedings. The authors of the accepted papers come from 16 different countries. The proceedings contain the revised versions of all accepted papers.
Invited Talk
Privacy Enhanced Technologies: Methods -- Markets -- Misuse
1(9)
Hannes Federrath
Digital Business
Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains
10(10)
Petros Belsis
Stefanos Gritzalis
Apostolos Malatras
Christos Skourlas
Ioannis Chalaris
Protection Mechanisms Against Phishing Attacks
20(10)
Klaus Plossl
Hannes Federrath
Thomas Nowey
Dropout-Tolerant TTP-Free Mental Poker
30(11)
Jordi Castella-Roca
Francesc Sebe
Josep Domingo-Ferrer
A Self-healing Mechanism for an Intrusion Tolerance System
41(9)
Bumjoo Park
Kiejin Park
Sungsoo Kim
Protecting Online Rating Systems from Unfair Ratings
50(10)
Jianshu Weng
Chunyan Miao
Angela Goh
Anonymous Payment in a Fair E-Commerce Protocol with Verifiable TTP
60(10)
M. Magdalena Payeras-Capella
Josep Lluis Ferrer-Gomila
Llorenc Huguet-Rotger
Designing Secure E-Tendering Systems
70(10)
Rong Du
Ernest Foo
Juan Gonzalez Nieto
Colin Boyd
Mobile/Wireless Services
A Multilateral Secure Payment System for Wireless LAN Hotspots
80(10)
Stephan Groß
Sabine Lein
Sandra Steinbrecher
Secure Group Communications over Combined Wired and Wireless Networks
90(10)
Junghyun Nam
Seungjoo Kim
Dongho Won
A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms
100(10)
Oliver Jorns
Oliver Jung
Julia Gross
Sandford Bessler
Making Money with Mobile Qualified Electronic Signatures
110(9)
Heiko Rossnagel
Denis Royer
Certificate Revocation/Index Search
Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT)
119(9)
Jose L. Munoz
Jordi Forne
Oscar Esparza
Manel Rey
Secure Index Search for Groups
128(13)
Hyun- A Park
Jin Wook Byun
Dong Hoon Lee
Trust
Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations
141(10)
Nikolaos Oikonomidis
Sergiu Tcaciuc
Christoph Ruland
Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security
151(10)
Ching Lin
Vijay Varadharajan
Yan Wang
The Fuzzy and Dynamic Nature of Trust
161(14)
Elizabeth Chang
Patricia Thomson
Tharam Dillon
Farookh Hussain
Towards an Ontology of Trust
175(10)
Lea Viljanen
Digital Signature
An Improved Group Signature Scheme
185(10)
Jianhong Zhang
Jiancheng Zou
Yumin Wang
Efficient Member Revocation in Group Signature Schemes
195(11)
Eun Young Choi
Hyun-Jeong Kim
Dong Hoon Lee
Conditional Digital Signatures
206(10)
Marek Klonowski
Miroslaw Kutylowski
Anna Lauks
Filip Zagorski
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions
216(10)
Seung-Hyun Seo
Kyung-Ah Shim
Sang-Ho Lee
Privacy
Privacy Enforcement for IT Governance in Enterprises: Doing It for Real
226(10)
Marco Casassa Mont
Robert Thyne
Pete Bramhall
An Adaptive Privacy Management System for Data Repositories
236(10)
Marco Casassa Mont
Siani Pearson
Privacy Preserving Data Mining Services on the Web
246(10)
Ayca Azgin Hintoglu
Yucel Saygin
Salima Benbernou
Mohand Said Hacid
Reading Your Keystroke: Whose Mail Is It?
256(10)
Sylvia Mercado Kierkegaard
E-Auctions
A Novel Construction of Two-Party Private Bidding Protocols from Yao's Millionaires Problem
266(8)
Huafei Zhu
Feng Bao
An Improved Double Auction Protocol Against False Bids
274(14)
Jung Hoon Ha
Jianying Zhou
SangJae Moon
An Investigation of Dispute Resolution Mechanisms on Power and Trust: A Domain Study of Online Trust in e-Auctions
288(11)
Glenn Bewsell
Rodger Jamieson
Adrian Gardiner
Deborah Bunker
Smart Cards/Authentication
A Secure Fingerprint Authentication System on an Untrusted Computing Environment
299(12)
Yongwha Chung
Daesung Moon
Taehae Kim
SungBum Pan
Security Enhancement for Password Authentication Schemes with Smart Cards
311(10)
Eun-Jun Yoon
Woo-Hun Kim
Kee- Young Yoo
Securing Operating System Services Based on Smart Cards
321(10)
Luigi Catuogno
Roberto Gassira
Michele Masullo
Ivan Visconti
Author Index 331