Catálogo de publicaciones - libros

Compartir en
redes sociales


Trust, Privacy and Security in Digital Business: 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007. Proceedings

Costas Lambrinoudakis ; Günther Pernul ; A Min Tjoa (eds.)

En conferencia: 4º International Conference on Trust, Privacy and Security in Digital Business (TrustBus) . Regensburg, Germany . September 3, 2007 - September 7, 2007

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Computers and Society; Management of Computing and Information Systems; Data Encryption; Computer Communication Networks; Systems and Data Security; IT in Business

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-74408-5

ISBN electrónico

978-3-540-74409-2

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2007

Tabla de contenidos

Trustbus’07 Keynote Talk Privacy Enhanced Personalization

Alfred Kobsa

Web personalization has demonstrated to be advantageous for both online customers and vendors. However, current personalization methods require considerable amounts of data about users, and the benefits of personalization are therefore counteracted by privacy concerns. Personalized systems need to take these concerns into account, as well as privacy laws and industry self-regulation that may be in effect. Privacy-Enhanced Personalization aims at reconciling the goals and methods of user modeling and personalization with privacy considerations, and to strive for best possible personalization within the boundaries set by privacy. This talk surveys recent research on factors that affect people’s personal information disclosure and on personalization methods that bear fewer privacy risks, and presents design recommendations based thereon.

- Trustbus’07 Keynote Talk Privacy Enhanced Personalization | Pp. 1-1

Panel Discussion Managing Digital Identities – Challenges and Opportunities

Günther Pernul; Marco Casassa Mont; Eduardo B. Fernandez; Socrates Katsikas; Alfred Kobsa; Rolf Oppliger

Identity Management (IdM) comes in two dimensions: First, the secure and efficient creation, use, and administration of personal attributes which make up a digital identifier of a human and used in large scale global networks, such as the Internet. Second, as in-house IdM which is a core component of enterprise security management. In this panel we will be focusing on both.

In open networks the major question is how IdM has to be organised to enable efficient user identification (on request) and how it would still be possible at the same time to safeguard privacy by avoiding the scenario of a “transparent system user”. The challenges for global IdM are manifold but linked to a basic trade-off-situation: Service providers will only grant electronic access upon successful authentication of a requester, but at the same time users should be able to protect their privacy and transactions shall not be linkable. In addition, in the wake of terrorist threat, the request for global unique electronic identifiers has gained more popularity than ever.

In-house IdM is influenced by organisational and technical drivers. It deals with the management of digital identities during their lifecycle within organisations. Some years ago, technologies like stand-alone Single-Sign-On modules or meta-directories quite often already were branded with the term IdM. Lately researchers as well as software vendors have realised that companies need more than just technical components to solve their identity chaos: Organisations need a comprehensive IdM Infrastructure, bearing in mind technical as well as organisational aspects. In addition to that, the emerging demand for sharing identity information between organisations results in a greater need for standardized data exchange channels.

For IdM on a global as well as on a local scale many technical, organisational and political questions are still to be solved. Data ownership, compliance with laws and regulations, data privacy issues are examples for questions which need to be faced in an efficient way in the future.

- Trustbus’07 Keynote Talk Privacy Enhanced Personalization | Pp. 2-2

Recognition of Authority in Virtual Organisations

Tuan-Anh Nguyen; David Chadwick; Bassem Nasser

A Virtual Organisation (VO) is a temporary alliance of autonomous, diverse, and geographically dispersed organisations, where the participants pool resources, information and knowledge in order to meet common objectives. This requires dynamic security policy management. We propose an authorisation policy management model called (ROA) which allows dynamically trusted authorities to adjust the authorisation policies for VO resources. The model supports dynamic delegation of authority, and the expansion and contraction of organizations in a VO, so that the underlying authorisation system is able to use existing user credentials issued by participating organisations to evaluate the user’s access rights to VO resources.

- Session 1: Secure and Trusted Virtual Organisations | Pp. 3-13

Securing VO Management

Florian Kerschbaum; Rafael Deitos; Philip Robinson

In this paper we propose a security architecture and mechanism for Virtual Organizations (VO) for businesses. The VOs we consider are based on web service technology to address interoperability issues and cater for future business software, and are dynamic, i.e. their membership may change frequently throughout their lifetime. We improve over previous approaches in the following aspect: We have designed, implemented and evaluated a comprehensive security mechanism for our architecture that can protect both the web services in the VO and the VO management services. The security policies of VO management are enforced by inspecting the request for the encodings of parameters that are relevant to the policy decision. The basic idea may be applicable to other web service based software with data-dependent security policies, e.g. databases.

- Session 1: Secure and Trusted Virtual Organisations | Pp. 14-23

Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship

Aggeliki Tsohou; Marianthi Theoharidou; Spyros Kokolakis; Dimitris Gritzalis

Organizational culture influences the way a) information security is perceived, b) security countermeasures are adopted, and c) the organization reacts to the cultural changes of a new security program. In Information Security Management Outsourcing (ISMO), cultural differences may arise between the organization and the provider, for example conflict between the countermeasures applied by the provider and the company’s internal policies. We propose a conceptual framework of security mechanisms in order organizations that choose ISMO to identify and manage cultural dissimilarity.

- Session 1: Secure and Trusted Virtual Organisations | Pp. 24-33

Specification of the TrustMan System for Assisting Management of VBEs

Simon Samwel Msanjila; Hamideh Afsarmanesh

The establishement of trust relationships among organizations has proved to enhance the cooperation among organizations involved in Virtual organization Breeding Environments (VBEs) and their collaboration within the Virtual Organizations (VOs). Main obstacles to establishing trust relationships however stems from the lack of a common definition for trust and trust parameters. Consequently the assessment of the trust level of organizations as well as the creation of trust among organizations are quite challenging. In practice organizations individually assess the trustworthiness of others both manually and in an ad hoc manner. This paper presents an approach and a system for semi-automatic agement (TrustMan) in collaborative networks. Based on the multi-criteria and customizable trust model that we have defined in earlier publications, here we define the TrustMan system that on one hand aggregates our previously introduced models and approaches, and on the other hand automates the processes related to management of trust among organizations in VBEs.

- Session 1: Secure and Trusted Virtual Organisations | Pp. 34-43

A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third Party

Min-Hua Shao

Digital watermarking is a value-added technique used in digital rights management systems for the purposes of copy protection and copy deterrence for digital contents, and it has inspired a large variety of work. Unfortunately, much of that work focus mainly on right-holder’s security needs rather than those of consumers. This paper proposes a new buyer-seller watermarking protocol for the betterment of consumers’ security needs. The key features of our scheme are including of loss-preventing security property ensured, semi-trust third party involved, efficient protection from conspiracy attacks, and lightweight involvement for buyers.

- Session 2: Privacy in Digital Business | Pp. 44-53

Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures

Zhuowei Li; Amitabha Das; Jianying Zhou

Intrusion signatures are used to detect and/or prevent fast-spreading worms or exploits, and usually, constructing these signatures is an automatic process without human intervention for the sake of speed. In principle, the automatic signature construction process can produce not only true-positive intrusion signatures but also false-positive ones, the latter of which poses a grave problem because they can be misused to disclose privacy information. Manual signature checking (for a whitelist) can solve the problem, but it slows down the reaction time for an attack dramatically. In this paper, we propose a mechanism to generate signatures automatically while preserving the privacy information. Essentially, we transform the original feature values within an audit trail instance into feature ranges, and then use these feature ranges to construct a privacy-preserved intrusion signature. Our current focus is on the methods constructing feature ranges, and for this purpose, several methods are proposed to discover feature ranges. The experimental results are quite encouraging: the transformation from values to ranges leads not only to the preservation of privacy but also to the enhancement of the detection performance.

- Session 2: Privacy in Digital Business | Pp. 54-64

Privacy Assurance: Bridging the Gap Between Preference and Practice

Tariq Ehsan Elahi; Siani Pearson

Personal identifying information is released without much control from the end user to service providers. We describe a system to scrutinize the stated claims of a service provider on safeguarding PII by interrogating their infrastructure. We attempt to empower end users by providing means to communicate their privacy concerns in a common language understood by the service provider, allowing them to set baseline privacy practices for service providers to adhere to, and providing a means of retrieving information from the service provider in the common language to base their PII release decisions.

- Session 2: Privacy in Digital Business | Pp. 65-74

Enhancing Optimistic Access Controls with Usage Control

Keshnee Padayachee; J. H. P. Eloff

With the advent of agile programming, lightweight software processes are being favoured over the highly formalised approaches of the past. Likewise, access control may benefit from a less prescriptive approach with an increasing reliance on users to behave ethically. These ideals correlate with optimistic access controls. However, ensuring that users behave in a trustworthy manner may require more than optimistic access controls. This paper investigates the possibility of enhancing optimistic access controls with usage control to ensure that users conduct themselves in a trustworthy manner. Usage control enables finer-grained control over the usage of digital objects than do traditional access control policies and models. Further to ease the development and maintenance of usage control measures, it is posited that it is completely separated from the application logic by using aspect-oriented programming.

- Session 3: Identity Management and Usage Control | Pp. 75-82