000733620 000__ 04083cam\a2200541Ii\4500 000733620 001__ 733620 000733620 005__ 20230306141055.0 000733620 006__ m\\\\\o\\d\\\\\\\\ 000733620 007__ cr\cn\nnnunnun 000733620 008__ 150814s2015\\\\sz\a\\\\o\\\\\101\0\eng\d 000733620 020__ $$a9783319229065$$qelectronic book 000733620 020__ $$a3319229060$$qelectronic book 000733620 020__ $$z9783319229058 000733620 0247_ $$a10.1007/978-3-319-22906-5$$2doi 000733620 035__ $$aSP(OCoLC)ocn918563124 000733620 035__ $$aSP(OCoLC)918563124 000733620 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dOCLCO$$dYDXCP$$dSNK$$dUPM$$dOCLCF$$dOCLCO 000733620 049__ $$aISEA 000733620 050_4 $$aHD30.38 000733620 08204 $$a658.470285$$223 000733620 1112_ $$aTrustBus (Conference)$$n(12th :$$d2015 :$$cValencia, Spain) 000733620 24510 $$aTrust, privacy and security in digital business$$h[electronic resource] :$$b12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings /$$cSimone Fischer-Hübner, Costas Lambrinoudakis, Javier Lopez (eds.). 000733620 2463_ $$aTrustBus 2015 000733620 264_1 $$aCham :$$bSpringer,$$c2015. 000733620 300__ $$a1 online resource (xii, 235 pages) :$$billustrations. 000733620 336__ $$atext$$btxt$$2rdacontent 000733620 337__ $$acomputer$$bc$$2rdamedia 000733620 338__ $$aonline resource$$bcr$$2rdacarrier 000733620 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v9264 000733620 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000733620 500__ $$aInternational conference proceedings. 000733620 500__ $$aIncludes author index. 000733620 5050_ $$aAttributes Enhanced Role-Based Access Control -- Ontology-Based Delegation of Access Control: An Enhancement to the XACML Delegation Profile -- VISIO: a Visual Approach for Singularity Detection in Recommendation Systems -- Hidden in Plain Sight: SDP-based Covert Channel for Botnet Communication -- The Design of a Configurable Reputation Service -- Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software -- On the Efficacy of Static Features to Detect Malicious Applications in Android -- Protecting Android Apps against Reverse Engineering by the Use of the Native Code -- Designing Privacy-Aware Systems in the Cloud -- Accountability-Preserving Anonymous Delivery of Cloud Services -- Till All Are One: Towards a Unified Cloud IDS -- Security, Privacy and Usability -- A Survey of Users' Perceptions and Attitudes -- Identifying Factors that Influence Employees' Security Behavior for Enhancing ISP Compliance -- Dynamic Deployment and Monitoring of Security Policies -- A Taxonomy of Requirements for the Privacy Goal Transparency -- A Privacy Preserving Framework for Big Data in e-Government Environments -- Privacy Principles: Towards a Common Privacy Audit Methodology. 000733620 506__ $$aAccess limited to authorized users. 000733620 520__ $$aThis book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015, held in Valencia, Spain, in September 2015 in conjunction with DEXA 2015. The 17 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: access control; trust and reputation in pervasive environments; trust and privacy issues in mobile environments; security and privacy in the cloud; security policies/usability issues; and privacy requirements and privacy audit. 000733620 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed August 14, 2015). 000733620 650_0 $$aBusiness enterprises$$xComputer networks$$xSecurity measures$$vCongresses. 000733620 650_0 $$aComputer security$$xManagement$$vCongresses. 000733620 650_0 $$aElectronic commerce$$xSecurity measures$$vCongresses. 000733620 7001_ $$aFischer-Hübner, Simone,$$eeditor. 000733620 7001_ $$aLambrinoudakis, Costas,$$eeditor. 000733620 7001_ $$aLopez, Javier,$$eeditor. 000733620 830_0 $$aLecture notes in computer science ;$$v9264. 000733620 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000733620 852__ $$bebk 000733620 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-22906-5$$zOnline Access$$91397441.1 000733620 909CO $$ooai:library.usi.edu:733620$$pGLOBAL_SET 000733620 980__ $$aEBOOK 000733620 980__ $$aBIB 000733620 982__ $$aEbook 000733620 983__ $$aOnline 000733620 994__ $$a92$$bISE