000 | 04640nam a22006855i 4500 | ||
---|---|---|---|
001 | 978-3-030-58986-8 | ||
003 | DE-He213 | ||
005 | 20240730165635.0 | ||
007 | cr nn 008mamaa | ||
008 | 200913s2020 sz | s |||| 0|eng d | ||
020 |
_a9783030589868 _9978-3-030-58986-8 |
||
024 | 7 |
_a10.1007/978-3-030-58986-8 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aTrust, Privacy and Security in Digital Business _h[electronic resource] : _b17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14-17, 2020, Proceedings / _cedited by Stefanos Gritzalis, Edgar R. Weippl, Gabriele Kotsis, A Min Tjoa, Ismail Khalil. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aX, 235 p. 69 illus., 30 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v12395 |
|
505 | 0 | _aAnalysis of uPort Open, an identity management blockchain-based solution -- Cloud Computing Framework for e-Health Security Requirements & Security Policy Rules Case Study: A European Cloud-based Health System -- On the Suitability of Using SGX for Secure Key Storage in the Cloud -- Employment of Secure Enclaves in CheatDetection Hardening -- SECONDO: A Platform for Cybersecurity Investments and Cyber Insurance Decisions -- Are Sensor Based Business Models a Threat to Privacy: The Case Of Pay-How-Your-Drive Insurance Models -- Microtargeting or Microphishing? Phishing Unveiled -- Privacy - Preserving Service Composition with Enhanced Flexibility and Efficiency -- An empirical Investigation of the right to explanation under GDPR in insurance -- Measuring users' socio-contextual attributes for Self-Adaptive Privacy within Cloud-Computing Environments -- Empowering Users Through a PrivacyMiddleware Watchdog -- Utility Requirement Description for Utility-preserving and Privacy-respecting Data Pseudonymization -- DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance -- A Distributed Trust Framework for Privacy-Preserving Machine Learning -- A Fuzzy Trust Model for Autonomous Entities Acting in Pervasive Computing. | |
520 | _aThis book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2020, held in Bratislava, Slovakia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 11 full and 4 short papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: blockchain, cloud security/hardware; economics/privacy; human aspects; privacy; privacy and machine learning; trust. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aApplication software. _989961 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _989962 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _989963 |
650 | 2 | 4 |
_aArtificial Intelligence. _93407 |
700 | 1 |
_aGritzalis, Stefanos. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _989964 |
|
700 | 1 |
_aWeippl, Edgar R. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _989965 |
|
700 | 1 |
_aKotsis, Gabriele. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _989966 |
|
700 | 1 |
_aTjoa, A Min. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _989967 |
|
700 | 1 |
_aKhalil, Ismail. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _989968 |
|
710 | 2 |
_aSpringerLink (Online service) _989969 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030589851 |
776 | 0 | 8 |
_iPrinted edition: _z9783030589875 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v12395 _989970 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-58986-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86445 _d86445 |