Skip to main content
  • Conference proceedings
  • © 2011

Trust, Privacy and Security in Digital Business

8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011, Proceedings

  • State-of-the-art research
  • Fast-track conference proceedings
  • Unique visibility

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6863)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): TrustBus: International Conference on Trust and Privacy in Digital Business

Conference proceedings info: TrustBus 2011.

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (18 papers)

  1. Front Matter

  2. Identity and Trust Management

    1. Electrostatic Force Method:

      • Konrad Leszczyński, Maciej Zakrzewicz
      Pages 1-12
    2. Exploiting Proxy-Based Federated Identity Management in Wireless Roaming Access

      • Diana Berbecaru, Antonio Lioy, Marco Domenico Aime
      Pages 13-23
  3. Security and Privacy Models for Pervasive Information Systems

    1. Privacy-Preserving Statistical Analysis on Ubiquitous Health Data

      • George Drosatos, Pavlos S. Efraimidis
      Pages 24-36
    2. A Safety-Preserving Mix Zone for VANETs

      • Florian Scheuer, Karl-Peter Fuchs, Hannes Federrath
      Pages 37-48
    3. A Secure Smartphone Applications Roll-out Scheme

      • Alexios Mylonas, Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis
      Pages 49-61
  4. Reliability and Security of Content and Data

    1. Privacy Preserving Tree Augmented Naïve Bayesian Multi-party Implementation on Horizontally Partitioned Databases

      • Maria Eleni Skarkala, Manolis Maragoudakis, Stefanos Gritzalis, Lilian Mitrou
      Pages 62-73
    2. Secure Cloud Storage: Available Infrastructures and Architectures Review and Evaluation

      • Nikos Virvilis, Stelios Dritsas, Dimitris Gritzalis
      Pages 74-85
    3. TRAP: Open Decentralized Distributed Spam Filtering

      • Nahid Shahmehri, David Byers, Rahul Hiran
      Pages 86-97
  5. Authentication and Authorization in Digital Business

    1. Best Effort and Practice Activation Codes

      • Gerhard de Koning Gans, Eric R. Verheul
      Pages 98-112
  6. Intrusion Detection and Information Filtering

    1. Mining Roles from Web Application Usage Patterns

      • Nurit Gal-Oz, Yaron Gonen, Ran Yahalom, Ehud Gudes, Boris Rozenberg, Erez Shmueli
      Pages 125-137
    2. A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks

      • Eleni Darra, Christoforos Ntantogian, Christos Xenakis, Sokratis Katsikas
      Pages 138-149
    3. An Evaluation of Anomaly-Based Intrusion Detection Engines for Mobile Ad Hoc Networks

      • Christoforos Panos, Christos Xenakis, Ioannis Stavrakakis
      Pages 150-160
  7. Management of Privacy and Confidentiality

    1. Privacy Measures for Free Text Documents: Bridging the Gap between Theory and Practice

      • Liqiang Geng, Yonghua You, Yunli Wang, Hongyu Liu
      Pages 161-173
  8. Cryptographic Protocols/ Usability of Security

    1. Correcting a Delegation Protocol for Grids

      • Benjamin Aziz
      Pages 198-209
    2. Risk Assessment for Mobile Devices

      • Thomas Lederm, Nathan L. Clarke
      Pages 210-221
  9. Back Matter

Other Volumes

  1. Trust, Privacy and Security in Digital Business

About this book

This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2011, held in Toulouse, France, in August/September 2011 in conjunction with DEXA 2011. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: identity and trust management; security and privacy models for pervasive information systems; reliability and security of content and data; authentication and authorization in digital business; intrusion detection and information filtering; management of privacy and confidentiality; and cryptographic protocols/usability of security.

Editors and Affiliations

  • School of Computing, Communications and Electronics, University of Plymouth, Plymouth, UK

    Steven Furnell

  • Department of Digital Systems, University of Piraeus, Piraeus, Greece

    Costas Lambrinoudakis

  • Department of Management Information Systems, University of Regensburg, Regensburg, Germany

    Günther Pernul

Bibliographic Information

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access