| 作 者: | Simone Fischer-Hübner |
| 出版社: | 崇文书局(原湖北辞书出版社) |
| 丛编项: | |
| 版权说明: | 本书为公共版权或经版权方授权,请支持正版图书 |
| 标 签: | 暂缺 |
| ISBN | 出版时间 | 包装 | 开本 | 页数 | 字数 |
|---|---|---|---|---|---|
| 未知 | 暂无 | 暂无 | 未知 | 0 | 暂无 |
Session 1: Privacy and Identity Management
Towards Scalable Management of Privacy Obligations in Enterprises
A New User-Centric Identity Management Infrastructure for Federated Systems
Session 2: Security and Risk Management
Information Security Risk Assessment Model for Risk Management
On the Limits of Cyber-Insurance
Towards a Risk Management Perspective on AAIs
Session 3: Security Requirements and Development
Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes
A Framework for Exploiting Security Expertise in Application Development
On Diffusion and Confusion Why Electronic Signatures Have Failed
Session 4: Privacy Enhancing Technologies and Privacy Management
Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy
A Systematic Approach to Privacy Enforcement and Policy Complian Checking in Enterprises
A Generic Privacy Enhancing Technology for Pervasive Computing Environments
Bringing the User Back into Control: A New Paradigm for Usability in Highly Dynamic Systems
Session 5: Access Control Models
Extending SQL to Allow the Active Usage of Purposes
FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy
A Framework for Modeling Restricted Delegation in Service Oriente~ Architecture
Session 6: Trust and Reputation
Reputation-Based Trust Systems for P2P Applications: Design Issue and Comparison Framework
Towards Trust in Digital Rights Management Systems
Cluster-Based Analysis and Recommendation of Sellers in Online Auctions
Trust Model Architecture: Defining Prejudice by Learning
Session 7: Security Protocols
How to Protect a Signature from Being Shown to a Third Party
……
Session 8: Security and Privacy in Mobile Environments
Author Index