Advertisement

Trust, Privacy, and Security in Digital Business

11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings

  • Claudia Eckert
  • Sokratis K. Katsikas
  • Günther Pernul
Conference proceedings TrustBus 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8647)

Table of contents

  1. Front Matter
  2. Trust Management

    1. Nazila Gol Mohammadi, Torsten Bandyszak, Micha Moffie, Xiaoyu Chen, Thorsten Weyer, Costas Kalogiros et al.
      Pages 1-12
    2. Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg
      Pages 13-23
  3. Trust Metrics and Evaluation Models

    1. Mykola Protsenko, Tilo Müller
      Pages 24-35
    2. Gerhard Rauchecker, Emrah Yasasin, Guido Schryen
      Pages 36-47
    3. Nagham Alhadad, Yann Busnel, Patricia Serrano-Alvarado, Philippe Lamarre
      Pages 48-59
    4. Thi Thuy Linh Vo, Tran Khanh Dang, Josef Küng
      Pages 60-71
  4. Privacy and Trust in Cloud Computing

    1. Kristian Beckers, Stephan Faßbender, Stefanos Gritzalis, Maritta Heisel, Christos Kalloniatis, Rene Meis
      Pages 94-105
  5. Security Management

    1. José-Miguel Horcas, Mónica Pinto, Lidia Fuentes
      Pages 106-118
    2. Vasilis Stavrou, Miltiadis Kandias, Georgios Karoulas, Dimitris Gritzalis
      Pages 119-131
    3. Samuel Paul Kaluvuri, Michele Bezzi, Yves Roudier
      Pages 132-143
  6. Security, Trust and Privacy in Mobile and Pervasive Environments

  7. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital Business, TrustBus 2014, held in Munich, Germany, in September 2014 in conjunction with DEXA 2014. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: trust management; trust metrics and evaluation models; privacy and trust in cloud computing; security management; and security, trust, and privacy in mobile and pervasive environments.

Keywords

business process monitoring cloud computing privacy risk management security social media social networks software product lines trusted computing

Editors and affiliations

  • Claudia Eckert
    • 1
  • Sokratis K. Katsikas
    • 2
  • Günther Pernul
    • 3
  1. 1.Fraunhofer-Institut für Angewandte und Integrierte Sicherheit (AISEC)GarchingGermany
  2. 2.Department of Digital SystemsUniversity of PiraeusPiraeusGreece
  3. 3.LS Wirtschaftsinformatik 1 - InformationssystemeUniversität RegensburgRegensburgGermany

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-09770-1
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-09769-5
  • Online ISBN 978-3-319-09770-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law
Aerospace
Engineering