000 | 03744nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-031-17926-6 | ||
003 | DE-He213 | ||
005 | 20240730170002.0 | ||
007 | cr nn 008mamaa | ||
008 | 221005s2022 sz | s |||| 0|eng d | ||
020 |
_a9783031179266 _9978-3-031-17926-6 |
||
024 | 7 |
_a10.1007/978-3-031-17926-6 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aTrust, Privacy and Security in Digital Business _h[electronic resource] : _b19th International Conference, TrustBus 2022, Vienna, Austria, August 24, 2022, Proceedings / _cedited by Sokratis Katsikas, Steven Furnell. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aXI, 97 p. 20 illus., 8 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13582 |
|
505 | 0 | _aPriPoCoG: Guiding Policy Authors to Define GDPR-Compliant Privacy Policies -- Closing the Gap between Privacy Policies and Privacy Preferences with Privacy Interfaces -- A Constructive Approach for Raising Information Privacy Competences: The Case of Escape Room Games -- Mitigating Sovereign Data Exchange Challenges: A Mapping to Apply Privacy- and Authenticity-Enhancing Technologies -- Threat Detection and Mitigation with Honeypots: A Modular Approach for IoT -- Homomorphic encryption in manufacturing compliance checks. | |
520 | _aThis volume LNCS 13582 constitutes the papers of the 19th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2022, held in August 2022 in Vienna, Austria, as part of the DEXA 2022 conference. The 11 full papers presented were carefully reviewed and selected from 30 submissions regarding advancements in the state of the art and practice of trust and privacy in digital business. The papers are organized in topical sections: Trust; Privacy; Security; Digital business; GDPR; Authenticity-enhancing technologies; Internet of Things; Intrusion detection; Honeypots; Homomorphic encryption;, and Serious games. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aData mining. _93907 |
|
650 | 0 |
_aApplication software. _991511 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aSecurity Services. _978910 |
650 | 2 | 4 |
_aData Mining and Knowledge Discovery. _991512 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _991513 |
700 | 1 |
_aKatsikas, Sokratis. _eeditor. _0(orcid) _10000-0003-2966-9683 _4edt _4http://id.loc.gov/vocabulary/relators/edt _991514 |
|
700 | 1 |
_aFurnell, Steven. _eeditor. _0(orcid) _10000-0003-0984-7542 _4edt _4http://id.loc.gov/vocabulary/relators/edt _991515 |
|
710 | 2 |
_aSpringerLink (Online service) _991516 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031179259 |
776 | 0 | 8 |
_iPrinted edition: _z9783031179273 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13582 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-17926-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86663 _d86663 |