Trust and Privacy in Digital Business: Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings: Lecture Notes in Computer Science, cartea 4083
Editat de Simone Fischer-Hübner, Steven Furnell, Costas Lambrinoudakisen Limba Engleză Paperback – 24 aug 2006
Din seria Lecture Notes in Computer Science
- 20% Preț: 1043.63 lei
- 20% Preț: 334.61 lei
- 20% Preț: 336.22 lei
- 20% Preț: 445.69 lei
- 20% Preț: 238.01 lei
- 20% Preț: 334.61 lei
- 20% Preț: 438.69 lei
- Preț: 442.03 lei
- 20% Preț: 337.87 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 256.27 lei
- 20% Preț: 634.41 lei
- 17% Preț: 427.22 lei
- 20% Preț: 643.99 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1057.10 lei
- 20% Preț: 581.55 lei
- Preț: 374.84 lei
- 20% Preț: 331.36 lei
- 15% Preț: 431.22 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- Preț: 389.48 lei
- 20% Preț: 326.98 lei
- 20% Preț: 1390.89 lei
- 20% Preț: 1007.16 lei
- 20% Preț: 569.54 lei
- 20% Preț: 575.48 lei
- 20% Preț: 573.59 lei
- 20% Preț: 750.35 lei
- 15% Preț: 570.71 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 347.59 lei
- 20% Preț: 576.02 lei
- Preț: 404.00 lei
- 20% Preț: 586.43 lei
- 20% Preț: 750.35 lei
- 20% Preț: 812.01 lei
- 20% Preț: 649.49 lei
- 20% Preț: 344.34 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 325.21 lei
Preț vechi: 406.51 lei
-20% Nou
Puncte Express: 488
Preț estimativ în valută:
62.24€ • 64.84$ • 51.75£
62.24€ • 64.84$ • 51.75£
Carte tipărită la comandă
Livrare economică 10-24 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540377504
ISBN-10: 3540377506
Pagini: 264
Ilustrații: XIV, 250 p.
Dimensiuni: 155 x 235 x 14 mm
Greutate: 0.37 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540377506
Pagini: 264
Ilustrații: XIV, 250 p.
Dimensiuni: 155 x 235 x 14 mm
Greutate: 0.37 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Session 1: Privacy and Identity Management.- Towards Scalable Management of Privacy Obligations in Enterprises.- A New User-Centric Identity Management Infrastructure for Federated Systems.- Session 2: Security and Risk Management.- Information Security Risk Assessment Model for Risk Management.- On the Limits of Cyber-Insurance.- Towards a Risk Management Perspective on AAIs.- Session 3: Security Requirements and Development.- Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes.- A Framework for Exploiting Security Expertise in Application Development.- On Diffusion and Confusion – Why Electronic Signatures Have Failed.- Session 4: Privacy Enhancing Technologies and Privacy Management.- Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy.- A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises.- A Generic Privacy Enhancing Technology for Pervasive Computing Environments.- Bringing the User Back into Control: A New Paradigm for Usability in Highly Dynamic Systems.- Session 5: Access Control Models.- Extending SQL to Allow the Active Usage of Purposes.- FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy.- A Framework for Modeling Restricted Delegation in Service Oriented Architecture.- Session 6: Trust and Reputation.- Reputation-Based Trust Systems for P2P Applications: Design Issues and Comparison Framework.- Towards Trust in Digital Rights Management Systems.- Cluster-Based Analysis and Recommendation of Sellers in Online Auctions.- Trust Model Architecture: Defining Prejudice by Learning.- Session 7: Security Protocols.- How to Protect a Signature from Being Shown to a Third Party.- Security Analysis and Improvement for Key IssuingSchemes in ID-Based Cryptography.- A Secure E-Tender Submission Protocol.- Session 8: Security and Privacy in Mobile Environments.- A Sophisticated Solution for Revealing Attacks on Wireless LAN.- Information Leakage in Ubiquitous Voice-over-IP Communications.