Skip to main content
Book cover

Trust and Privacy in Digital Business

Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings

  • Conference proceedings
  • © 2006

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4083)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: TrustBus 2006.

Buy print copy

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Table of contents (24 papers)

  1. Session 1: Privacy and Identity Management

  2. Session 2: Security and Risk Management

  3. Session 3: Security Requirements and Development

  4. Session 5: Access Control Models

Other volumes

  1. Trust and Privacy in Digital Business

Keywords

About this book

This book presents the proceedings of the Third International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2006), held in Kraków, Poland, September 5-7, 2006. The conference continues from previous events held in Zaragoza (2004) and Copenhagen (2005), and maintains the aim of bringing together academic researchers and industry developers to discuss the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Kraków to participate and debate the new emerging advances in this area. The conference programme included two keynote presentations, one panel session and eight technical papers sessions. The keynote speeches were delivered by Jeremy Ward from Symantec EMEA on the topic of “Building the Information Assurance Community of Purpose”, and by Günter Karjoth from IBM Research - Zurich, with a talk entitled “Privacy Practices and Economics –– From Privacy Policies to Privacy SLAs. ” The subject of the panel discussion was “Is Security Without Trust Feasible?” chaired by Leszek T. Lilien from Western Michigan University, USA. The reviewed paper sessions covered a broad range of topics, from access control models to security and risk management, and from privacy and identity management to security protocols. The conference attracted 70 submissions, each of which was assigned to four referees for review. The Programme Committee ultimately accepted 24 papers for inclusion, which were revised based upon comments from their reviews.

Editors and Affiliations

  • Department of Computer Science, Karlstad University, Karlstad, Sweden

    Simone Fischer-Hübner

  • School of Computing, Communications and Electronics, Network Research Group, University of Plymouth, Plymouth, UK

    Stevel Furnell

  • Laboratory of Information and Communication Systems Security Department of Information and Communication Systems Engineering, University of the Aegean, Samos, Greece

    Costas Lambrinoudakis

Bibliographic Information

Publish with us