Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Trust, privacy and security in digit...
~
(1998 :)
Trust, privacy and security in digital business12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Trust, privacy and security in digital businessedited by Simone Fischer-Hubner, Costas Lambrinoudakis, Javier Lopez.
Reminder of title:
12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015 : proceedings /
remainder title:
TrustBus 2015
other author:
Fischer-Hubner, Simone.
corporate name:
Published:
Cham :Springer International Publishing :2015.
Description:
xii, 235 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Business enterprisesCongresses.Computer networks
Online resource:
http://dx.doi.org/10.1007/978-3-319-22906-5
ISBN:
9783319229065$q(electronic bk.)
Trust, privacy and security in digital business12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015 : proceedings /
Trust, privacy and security in digital business
12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015 : proceedings /[electronic resource] :TrustBus 2015edited by Simone Fischer-Hubner, Costas Lambrinoudakis, Javier Lopez. - Cham :Springer International Publishing :2015. - xii, 235 p. :ill., digital ;24 cm. - Lecture notes in computer science,92640302-9743 ;. - Lecture notes in computer science ;4891..
Attributes Enhanced Role-Based Access Control -- Ontology-Based Delegation of Access Control: An Enhancement to the XACML Delegation Profile -- VISIO: a Visual Approach for Singularity Detection in Recommendation Systems -- Hidden in Plain Sight: SDP-based Covert Channel for Botnet Communication -- The Design of a Configurable Reputation Service -- Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software -- On the Efficacy of Static Features to Detect Malicious Applications in Android -- Protecting Android Apps against Reverse Engineering by the Use of the Native Code -- Designing Privacy-Aware Systems in the Cloud -- Accountability-Preserving Anonymous Delivery of Cloud Services -- Till All Are One: Towards a Unified Cloud IDS -- Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes -- Identifying Factors that Influence Employees' Security Behavior for Enhancing ISP Compliance -- Dynamic Deployment and Monitoring of Security Policies -- A Taxonomy of Requirements for the Privacy Goal Transparency -- A Privacy Preserving Framework for Big Data in e-Government Environments -- Privacy Principles: Towards a Common Privacy Audit Methodology.
This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015, held in Valencia, Spain, in September 2015 in conjunction with DEXA 2015. The 17 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: access control; trust and reputation in pervasive environments; trust and privacy issues in mobile environments; security and privacy in the cloud; security policies/usability issues; and privacy requirements and privacy audit.
ISBN: 9783319229065$q(electronic bk.)
Standard No.: 10.1007/978-3-319-22906-5doiSubjects--Topical Terms:
447216
Business enterprises
--Computer networks--Congresses.
LC Class. No.: HD30.38
Dewey Class. No.: 658.470285
Trust, privacy and security in digital business12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015 : proceedings /
LDR
:03010nmm a2200349 a 4500
001
475011
003
DE-He213
005
20160317150441.0
006
m d
007
cr nn 008maaau
008
160420s2015 gw s 0 eng d
020
$a
9783319229065$q(electronic bk.)
020
$a
9783319229058$q(paper)
024
7
$a
10.1007/978-3-319-22906-5
$2
doi
035
$a
978-3-319-22906-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
HD30.38
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
658.470285
$2
23
090
$a
HD30.38
$b
.T873 2015
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Trust, privacy and security in digital business
$h
[electronic resource] :
$b
12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015 : proceedings /
$c
edited by Simone Fischer-Hubner, Costas Lambrinoudakis, Javier Lopez.
246
3
$a
TrustBus 2015
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2015.
300
$a
xii, 235 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
9264
505
0
$a
Attributes Enhanced Role-Based Access Control -- Ontology-Based Delegation of Access Control: An Enhancement to the XACML Delegation Profile -- VISIO: a Visual Approach for Singularity Detection in Recommendation Systems -- Hidden in Plain Sight: SDP-based Covert Channel for Botnet Communication -- The Design of a Configurable Reputation Service -- Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software -- On the Efficacy of Static Features to Detect Malicious Applications in Android -- Protecting Android Apps against Reverse Engineering by the Use of the Native Code -- Designing Privacy-Aware Systems in the Cloud -- Accountability-Preserving Anonymous Delivery of Cloud Services -- Till All Are One: Towards a Unified Cloud IDS -- Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes -- Identifying Factors that Influence Employees' Security Behavior for Enhancing ISP Compliance -- Dynamic Deployment and Monitoring of Security Policies -- A Taxonomy of Requirements for the Privacy Goal Transparency -- A Privacy Preserving Framework for Big Data in e-Government Environments -- Privacy Principles: Towards a Common Privacy Audit Methodology.
520
$a
This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015, held in Valencia, Spain, in September 2015 in conjunction with DEXA 2015. The 17 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: access control; trust and reputation in pervasive environments; trust and privacy issues in mobile environments; security and privacy in the cloud; security policies/usability issues; and privacy requirements and privacy audit.
650
0
$a
Business enterprises
$x
Computer networks
$x
Security measures
$v
Congresses.
$3
447216
650
0
$a
Computer security
$x
Management
$v
Handbooks, manuals, etc.
$3
666210
650
0
$a
Electronic commerce
$x
Security measures
$v
Congresses.
$3
444578
650
1 4
$a
Computer Science.
$3
212513
650
2 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Management of Computing and Information Systems.
$3
274191
650
2 4
$a
Computer Communication Networks.
$3
218087
700
1
$a
Fischer-Hubner, Simone.
$3
259977
700
1
$a
Lambrinoudakis, Costas.
$3
279789
700
1
$a
Lopez, Javier.
$3
280368
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
4891.
$3
383229
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-22906-5
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000119133
電子館藏
1圖書
電子書
EB HD30.38 T873 2015
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://dx.doi.org/10.1007/978-3-319-22906-5
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login