001439329 000__ 08712cam\a2200721\i\4500 001439329 001__ 1439329 001439329 003__ OCoLC 001439329 005__ 20230309004423.0 001439329 006__ m\\\\\o\\d\\\\\\\\ 001439329 007__ cr\un\nnnunnun 001439329 008__ 210902s2021\\\\sz\a\\\\o\\\\\101\0\eng\d 001439329 019__ $$a1266908910 001439329 020__ $$a9783030865863$$q(electronic bk.) 001439329 020__ $$a303086586X$$q(electronic bk.) 001439329 020__ $$z9783030865856 001439329 020__ $$z3030865851 001439329 0247_ $$a10.1007/978-3-030-86586-3$$2doi 001439329 035__ $$aSP(OCoLC)1266355429 001439329 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dEBLCP$$dNOC$$dOCLCO$$dOCLCF$$dSFB$$dOCLCO$$dOCLCQ$$dCOM$$dOCLCO$$dOCLCQ 001439329 049__ $$aISEA 001439329 050_4 $$aQA76.9.A25$$bT78 2021 001439329 08204 $$a005.8$$223 001439329 1112_ $$aTrustBus (Conference)$$n(18th :$$d2021 :$$cOnline) 001439329 24510 $$aTrust, privacy and security in digital business :$$b18th international conference, TrustBus 2021 virtual event, September 27-30, 2021 : proceedings /$$cSimone Fischer-Hübner, Costas Lambrinoudakis, Gabriele Kotsis, A Min Tjoe, Ismail Khalil (eds.). 001439329 24630 $$aTrustBus 2021 001439329 264_1 $$aCham :$$bSpringer,$$c[2021] 001439329 264_4 $$c©2021 001439329 300__ $$a1 online resource :$$billustrations (some color) 001439329 336__ $$atext$$btxt$$2rdacontent 001439329 337__ $$acomputer$$bc$$2rdamedia 001439329 338__ $$aonline resource$$bcr$$2rdacarrier 001439329 4901_ $$aLecture notes in computer science ;$$v12927 001439329 4901_ $$aLNCS sublibrary: SL4 - Security and cryptology 001439329 500__ $$aInternational conference proceedings. 001439329 500__ $$aIncludes author index. 001439329 5050_ $$aIntro -- Preface -- Organization -- Towards Privacy-Preserving and Trustworthy AI (Abstract of Keynote Talk) -- Contents -- Trust Evaluation -- Monitoring Access Reviews by Crowd Labelling -- 1 Introduction -- 2 Theoretical Background -- 2.1 Research Method -- 3 Problem Formulation -- 3.1 Practice-Inspired Research -- 3.2 Defining Access Review Decision Quality as an Instance of a Class of Problems -- 4 Theory-Ingrained Artifact -- 4.1 Designing the Initial Artifact -- 4.2 Applying Crowd Sourcing Theories to Access Reviews -- 5 Building, Intervention and Evaluation -- 5.1 Mutually Influenced Roles -- 5.2 Access Review Campaign Data -- 5.3 Reciprocal Shaping -- 5.4 Evaluation -- 6 Conclusion -- References -- Automating the Evaluation of Trustworthiness -- 1 Introduction -- 2 The TE Framework -- 2.1 Defining Trustworthiness -- 2.2 Requirements -- 2.3 Framework Participants -- 2.4 Data Model -- 2.5 Rulebooks -- 2.6 Trustworthiness Evaluation -- 2.7 Instance Data -- 3 Implementation -- 4 Related Work -- 5 Conclusions and Future Work -- References -- Security Risks -- At Your Service 24/7 or Not? Denial of Service on ESInet Systems -- 1 Introduction -- 2 Preliminaries and Adversarial Model -- 3 Evaluation -- 3.1 Test-Bed Setup and Attack Scenarios -- 3.2 Results -- 4 Detection and Remedies -- 5 Related Work -- 6 Conclusions and Future Directions -- References -- Impact of False Positives and False Negatives on Security Risks in Transactions Under Threat -- 1 Introduction -- 2 Importance of False Positives and False Negatives -- 3 Security Countermeasures and Risks in Transactions -- 3.1 Applying Security Countermeasures and Decision Making -- 3.2 Risk Assessment Based on Optimal Strategy for Counteracting -- 4 Measuring False Positives and False Negatives -- 5 Impact of False Positives/Negatives on Security Risks. 001439329 5058_ $$a5.1 Dependence of the Security Risks from Detection Precision -- 5.2 Dynamics of the Security Risks Along the Transactions -- 5.3 Dependency of the Cost from the Moment of Counteracting -- 6 Discussion and Future Development -- References -- Web Security -- Launching Adversarial Label Contamination Attacks Against Malicious URL Detection -- 1 Introduction -- 2 Background and Related Work -- 2.1 Machine Learning and Attacks Against It -- 2.2 Related Work -- 3 Methodology and Experimental Design -- 3.1 Dataset Overview -- 3.2 Experimental Design -- 4 Results -- 5 Discussion -- 6 Conclusions and Future Work -- References -- Neither Good nor Bad: A Large-Scale Empirical Analysis of HTTP Security Response Headers -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Experimental Evaluation -- 4.1 Testbed -- 4.2 Results -- 5 Discussion -- 6 Conclusions -- References -- Data Protection and Privacy Controls -- Components and Architecture for the Implementation of Technology-Driven Employee Data Protection -- 1 Introduction -- 2 Components of Employee Data Protection -- 2.1 A -- Information -- 2.2 B -- Self-determination -- 2.3 C -- Enforcement -- 2.4 D -- Data Query and Access -- 2.5 E -- Communication -- 2.6 F -- Support -- 3 Legal Review of the Components -- 3.1 Storage Limitation, Integrity, and Confidentiality -- 3.2 Transparency -- 3.3 Consent and Direct Implementations of Laws -- 4 Implementation and Integration Concept -- 4.1 Architecture -- 4.2 Integration Concept -- 5 Related Work -- 6 Conclusion and Discussion -- References -- Towards an Information Privacy and Personal Data Protection Competency Model for Citizens -- 1 Introduction -- 2 Theoretical Background -- 2.1 The Concept of Competency -- 2.2 Competency Models -- 2.3 Competency Models in Information Systems Literature -- 3 A RoadMap for Developing the Competency Model. 001439329 5058_ $$a3.1 Activities Involved in the Development of Competency Models -- 3.2 The Proposed RoadMap -- 4 Preliminary Results -- 4.1 Existing Information Privacy Competency Models for Citizens -- 4.2 Information Privacy Competencies Implied in the Literature -- 4.3 Information Privacy Competencies for Citizens: Initial Results -- 5 Conclusions -- References -- A Category-Based Framework for Privacy-Aware Collaborative Access Control -- 1 Introduction -- 2 Background -- 2.1 Classical Access Control Models -- 2.2 Collaborative and Concurrent Access Models -- 3 Our Solution for Privacy-Aware Access Control -- 3.1 Framework Architecture -- 3.2 Shared-CBAC Model -- 4 BYOD Use Case -- 5 Evaluation -- 5.1 Model Design -- 5.2 Analysis -- 6 Conclusion -- References -- Privacy and Users -- Car Drivers' Privacy Concerns and Trust Perceptions -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Results -- 4.1 Correlations -- 5 Conclusions -- References -- AuthGuide: Analyzing Security, Privacy and Usability Trade-Offs in Multi-factor Authentication -- 1 Introduction -- 2 Related Work -- 3 AuthGuide: Design and Implementation -- 3.1 Modeling the Configuration Space of Authentication Factors -- 3.2 Registration and Replacement of Authentication Factors -- 3.3 AuthGuide Implementation -- 4 Evaluation -- 4.1 Performance Evaluation -- 4.2 Configuration Support for the Security Administrator -- 4.3 Analysis of Security, Privacy and Usability Trade-Off -- 5 Conclusion -- References -- Author Index. 001439329 506__ $$aAccess limited to authorized users. 001439329 520__ $$aThis volume LNCS 12927 constitutes the papers of the 18th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2021, held in September 2021 as part of the DEXA 2021 conference. The event was held virtually due to COVID-19 pandemic. The 11 full papers presented were carefully reviewed and selected from 30 submissions regarding advancements in the state of the art and practice of trust and privacy in digital business. The papers are organized in topical sections: Trust Evaluation; Security Risks; Web Security; Data Protection and Privacy Controls; and Privacy and Users. 001439329 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 9, 2021). 001439329 650_0 $$aBusiness enterprises$$xComputer networks$$xSecurity measures$$vCongresses. 001439329 650_0 $$aComputer security$$xManagement$$vCongresses. 001439329 650_0 $$aElectronic commerce$$xSecurity measures$$vCongresses. 001439329 650_6 $$aSécurité informatique$$xGestion$$vCongrès. 001439329 650_6 $$aCommerce électronique$$xSécurité$$xMesures$$vCongrès. 001439329 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001439329 655_7 $$aConference papers and proceedings.$$2lcgft 001439329 655_7 $$aActes de congrès.$$2rvmgf 001439329 655_0 $$aElectronic books. 001439329 7001_ $$aFischer-Hübner, Simone,$$eeditor. 001439329 7001_ $$aLambrinoudakis, Costas,$$eeditor. 001439329 7001_ $$aKotsis, Gabriele,$$d1967-$$eeditor. 001439329 7001_ $$aTjoa, A. Min,$$eeditor. 001439329 7001_ $$aKhalil, Ismail,$$d1960-$$eeditor. 001439329 830_0 $$aLecture notes in computer science ;$$v12927. 001439329 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 001439329 852__ $$bebk 001439329 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-86586-3$$zOnline Access$$91397441.1 001439329 909CO $$ooai:library.usi.edu:1439329$$pGLOBAL_SET 001439329 980__ $$aBIB 001439329 980__ $$aEBOOK 001439329 982__ $$aEbook 001439329 983__ $$aOnline 001439329 994__ $$a92$$bISE