did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540229193

Trust and Privacy in Digital Business : First International Conference, Trustbus 2004, Zaragoza, Spain, August 30-September 1, 2004, Proceedings

by ; ;
  • ISBN13:

    9783540229193

  • ISBN10:

    3540229191

  • Format: Paperback
  • Copyright: 2004-10-16
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $99.00 Save up to $80.44
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the First International Conference on Trust and Privacy in Digital Business, TrustBus 2004, held in Zaragoza, Spain in August/September 2004.The 29 revised full papers presented together with an invited paper were carefully reviewed and selected from close to 100 submissions. The papers are organized in topical sections on trust, access control, e-business issues, privacy, e-voting, protocols, copyright protection, multicast, and PKI and signature schemes.

Table of Contents

Invited Talk
Developing Secure, Trusted and Auditable Services for e-Business: An Autonomic Computing Approach
1(10)
Ahmed Patel
Trust
A Mechanism for Trust Sustainability Among Trusted Computing Platforms
11(9)
Zheng Yan
Piotr Cofta
Enabling Trust-Awareness in Naming Services
20(10)
Nicola Mezzetti
Virtual Trust in Distributed Systems
30(10)
Semir Daskapan
Ana Cristina Costa
Willem G. Vree
Amr A. Eldin
Modelling Trust Relationships in Distributed Environments
40(10)
Weiliang Zhao
Vijay Varadharajan
George Bryan
Access Control
Dynamically Changing Trust Structure in Capability Based Access Control Systems
50(10)
Sandra Wortmann
Barbara Sprick
Christoph Kobusch
On the Design of a New Trust Model for Mobile Agent Security
60(10)
Ching Lin
Vijay Varadharajan
Yan Wang
Yi Mu
e-Business Issues
Balancing Privacy and Trust in Electronic Marketplaces
70(10)
Sandra Steinbrecher
Reducing Server Trust in Private Proxy Auctions
80(10)
Giovanni Di Crescenzo
Javier Herranz
German Saez
Secure Ad-Hoc mBusiness: Enhancing WindowsCE Security
90(10)
Florina Almenarez
Daniel Diaz
Andres Marin
Role-Based Privilege Management Using Attribute Certificates and Delegation
100(10)
Gail-Joon Ahn
Dongwan Shin
Longhua Zhang
Privacy
Consent as a Threat. A Critical Approach to Privacy Negotiation in e-Commerce Practices
110(10)
A. Daniel Oliver-Lalana
Dealing with Privacy Obligations: Important Aspects and Technical Approaches
120(12)
Marco Casassa Mont
Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures
132(10)
Ming Yao
Matt Henricksen
Ernest Foo
Ed Dawson
Privacy Preserving Data Generation for Database Application Performance Testing
142(10)
Yongge Wang
Xintao Wu
Yuliang Zheng
e-Voting
An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness
152(10)
Riza Aditya
Byoungcheon Lee
Colin Boyd
Ed Dawson
Trust in Public Administration e-Transactions: e-Voting in the UK
162(10)
Alexandros Xenakis
Ann Macintosh
Protocols
An Unbalanced Protocol for Group Key Exchange
172(9)
Javier Herranz
Jorge L. Villar
Certified E-Mail with Temporal Authentication: An Improved Optimistic Protocol
181(10)
Clemente Galdi
Raffaella Giordano
Efficient Password-Based Group Key Exchange
191(9)
Su Mi Lee
Jung Yeon Hwang
Dong Hoon Lee
Optimality in Asynchronous Contract Signing Protocols
200(9)
Josep Lluis Ferrer-Gomila
Magdalena Payeras-Capella
Llorenc Huguet-Rotger
Copyright Protection
Development of Visible Anti-copy Patterns
209(10)
Jong Weon Kim
KyuTae Kim
JungSoo Lee
JongUk Choi
Holographic Image Watermarking for Secure Content
219(13)
KyuTae Kim
JongWeon Kim
JungSoo Lee
JongUk Choi
Hybrid Fingerprint Matching on Programmable Smart Cards
232(10)
Tommaso Cucinotta
Riccardo Brigo
Marco Di Natale
Protecting ASF Movie on VOD
242(9)
Ji-Hyun Park
Jeong-Hyun Kim
Ki-Song Yoon
Multicast
DiffSig: Differentiated Digital Signature for Real-Time Multicast Packet Flows
251(10)
Namhi Kang
Christoph Ruland
Large-Scale Pay-As-You-Watch for Unicast and Multicast Communications
261(8)
Antoni Martinez-Balleste
Francese Sebe
Josep Domingo-Ferrer
PKI, Signature Schemes
Reducing the Communication Overhead of an Offline Revocation Dictionary
269(10)
Jose L. Munoz
Jordi Forne
Oscar Esparza
Josep Pegueroles
Esteve Pallares
Breaking Down Architectural Gaps in Smart-Card Middleware Design
279(10)
Tommaso Cucinotta
Marco Di Natale
David Corcoran
On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes
289(10)
Guilin Wang
Jianying Zhou
Robert H. Deng
Author Index 299

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program