Advertisement

Trust, Privacy and Security in Digital Business

16th International Conference, TrustBus 2019, Linz, Austria, August 26–29, 2019, Proceedings

  • Stefanos Gritzalis
  • Edgar R. Weippl
  • Sokratis K.  Katsikas
  • Gabriele Anderst-Kotsis
  • A Min Tjoa
  • Ismail Khalil
Conference proceedings TrustBus 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11711)

Also part of the Security and Cryptology book sub series (LNSC, volume 11711)

Table of contents

  1. Front Matter
    Pages i-x
  2. Privacy

    1. Front Matter
      Pages 1-1
    2. Katerina Vgena, Angeliki Kitsiou, Christos Kalloniatis, Dimitris Kavroudakis
      Pages 3-16
    3. Nazila Gol Mohammadi, Jens Leicht, Nelufar Ulfat-Bunyadi, Maritta Heisel
      Pages 46-62
    4. Oleksandr Tomashchuk, Dimitri Van Landuyt, Daniel Pletea, Kim Wuyts, Wouter Joosen
      Pages 63-77 Open Access
    5. Luca Piras, Mohammed Ghazi Al-Obeidallah, Andrea Praitano, Aggeliki Tsohou, Haralambos Mouratidis, Beatriz Gallego-Nicasio Crespo et al.
      Pages 78-93
    6. Aikaterini-Georgia Mavroeidi, Angeliki Kitsiou, Christos Kalloniatis
      Pages 110-125
  3. Audit, Compliance and Threat Intelligence

    1. Front Matter
      Pages 127-127
    2. Antonio Nehme, Vitor Jesus, Khaled Mahbub, Ali Abdallah
      Pages 129-144
    3. Bizhan Alipour, Abdessamad Imine, Michaël Rusinowitch
      Pages 145-160
    4. Florian Menges, Christine Sperl, Günther Pernul
      Pages 161-175
  4. Back Matter
    Pages 177-177

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 16th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2019, held in Linz, Austria, in August 2019 in conjunction with DEXA 2019.

The 11 full papers presented were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: privacy; and audit, compliance and threat intelligence.

The chapter "A data utility-driven benchmark for de-identification methods" is open access under a CC BY 4.0 license at link.springer.com.

Keywords

access control data privacy data protection privacy policies security social networking social networks threat intelligence

Editors and affiliations

  • Stefanos Gritzalis
    • 1
  • Edgar R. Weippl
    • 2
  • Sokratis K.  Katsikas
    • 3
  • Gabriele Anderst-Kotsis
    • 4
  • A Min Tjoa
    • 5
  • Ismail Khalil
    • 6
  1. 1.University of the AegeanMytileneGreece
  2. 2.SBA ResearchViennaAustria
  3. 3.Norwegian University of Science and TechnologyTrondheimNorway
  4. 4.Johannes Kepler University of LinzLinzAustria
  5. 5.Software Competence Center HagenbergHagenberg im MühlkreisAustria
  6. 6.Johannes Kepler University of LinzLinzAustria

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-27813-7
  • Copyright Information Springer Nature Switzerland AG 2019
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-27812-0
  • Online ISBN 978-3-030-27813-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Aerospace
Engineering