Buch, Englisch, Band 3184, 301 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 482 g
First International Conference, TrustBus 2004, Zaragoza, Spain, August 30-September 1, 2004, Proceedings
Buch, Englisch, Band 3184, 301 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 482 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-22919-3
Verlag: Springer Berlin Heidelberg
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Mathematik | Informatik EDV | Informatik Betriebssysteme Windows Betriebssysteme
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsinformatik, SAP, IT-Management
- Mathematik | Informatik EDV | Informatik Business Application Unternehmenssoftware SAP
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
- Wirtschaftswissenschaften Betriebswirtschaft Bereichsspezifisches Management E-Commerce, E-Business, E-Marketing
Weitere Infos & Material
Invited Talk.- Developing Secure, Trusted and Auditable Services for e-Business: An Autonomic Computing Approach.- Trust.- A Mechanism for Trust Sustainability Among Trusted Computing Platforms.- Enabling Trust-Awareness in Naming Services.- Virtual Trust in Distributed Systems.- Modelling Trust Relationships in Distributed Environments.- Access Control.- Dynamically Changing Trust Structure in Capability Based Access Control Systems.- On the Design of a New Trust Model for Mobile Agent Security.- e-Business Issues.- Balancing Privacy and Trust in Electronic Marketplaces.- Reducing Server Trust in Private Proxy Auctions.- Secure Ad-Hoc mBusiness: Enhancing WindowsCE Security.- Role-Based Privilege Management Using Attribute Certificates and Delegation.- Privacy.- Consent as a Threat. A Critical Approach to Privacy Negotiation in e-Commerce Practices.- Dealing with Privacy Obligations: Important Aspects and Technical Approaches.- Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures.- Privacy Preserving Data Generation for Database Application Performance Testing.- e-Voting.- An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness.- Trust in Public Administration e-Transactions: e-Voting in the UK.- Protocols.- An Unbalanced Protocol for Group Key Exchange.- Certified E-Mail with Temporal Authentication: An Improved Optimistic Protocol.- Efficient Password-Based Group Key Exchange.- Optimality in Asynchronous Contract Signing Protocols.- Copyright Protection.- Development of Visible Anti-copy Patterns.- Holographic Image Watermarking for Secure Content.- Hybrid Fingerprint Matching on Programmable Smart Cards.- Protecting ASF Movie on VOD.- Multicast.- DiffSig: Differentiated Digital Signature for Real-Time Multicast Packet Flows.- Large-Scale Pay-As-You-Watch for Unicast and Multicast Communications.- PKI, Signature Schemes.- Reducing the Communication Overhead of an Offline Revocation Dictionary.- Breaking Down Architectural Gaps in Smart-Card Middleware Design.- On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes.