Trust, Privacy, and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings / Edition 1

Paperback (Print)
Buy New
Buy New from
Used and New from Other Sellers
Used and New from Other Sellers
from $36.00
Usually ships in 1-2 business days
(Save 63%)
Other sellers (Paperback)
  • All (14) from $36.00   
  • New (10) from $45.00   
  • Used (4) from $36.00   


Sincerely welcome to the proceedings of the 2nd International Conference on Trust, Privacy, would be and Security in Digital Business, held in Copenhagen, Denmark, from August 22nd till 26th, 2005. This conference was the successor to the successful TrustBus 2004 conference, held in 2004 in conjunction with the DEXA conferences in Zaragoza. It was our goal that this event would be a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust, privacy, and security in digital business. We thank the attendees for coming to Copenhagen to participate and debate the new emerging advances in this area. The workshop program consisted of one invited talk and 11 regular technical paper sessions. The invited talk and keynote speech was delivered by Hannes Federrath from the Chair for Management of Information Security at the University of Regensburg, Germany, on “Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. The regular paper sessions covered a broad range of topics, from access control issues to electronic auctioning, from trust and prools to smart cards. The conference attracted over 100 submissions of which the Program Committee accepted 32 papers for presentation and inclusion in the conference proceedings. The authors of the accepted papers come from 16 different countries. The proceedings contain the revised versions of all accepted papers.

Read More Show Less

Product Details

Table of Contents

Invited Talk.- Privacy Enhanced Technologies: Methods – Markets – Misuse.- Digital Business.- Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains.- Protection Mechanisms Against Phishing Attacks.- Dropout-Tolerant TTP-Free Mental Poker.- A Self-healing Mechanism for an Intrusion Tolerance System.- Protecting Online Rating Systems from Unfair Ratings.- Anonymous Payment in a Fair E-Commerce Prool with Verifiable TTP.- Designing Secure E-Tendering Systems.- Mobile/Wireless Services.- A Multilateral Secure Payment System for Wireless LAN Hotspots.- Secure Group Communications over Combined Wired and Wireless Networks.- A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms.- Making Money with Mobile Qualified Electronic Signatures.- Certificate Revocation/Index Search.- Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT).- Secure Index Search for Groups.- Trust.- Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations.- Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security.- The Fuzzy and Dynamic Nature of Trust.- Towards an Ontology of Trust.- Digital Signature.- An Improved Group Signature Scheme.- Efficient Member Revocation in Group Signature Schemes.- Conditional Digital Signatures.- A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions.- Privacy.- Privacy Enforcement for IT Governance in Enterprises: Doing It for Real.- An Adaptive Privacy Management System for Data Repositories.- Privacy Preserving Data Mining Services on the Web.- Reading Your Keystroke: Whose Mail Is It?.- E-Auctions.- A Novel Construction of Two-Party Private Bidding Prools from Yao’s Millionaires Problem.- An Improved Double Auction Prool Against False Bids.- An Investigation of Dispute Resolution Mechanisms on Power and Trust: A Domain Study of Online Trust in e-Auctions.- Smart Cards/Authentication.- A Secure Fingerprint Authentication System on an Untrusted Computing Environment.- Security Enhancement for Password Authentication Schemes with Smart Cards.- Securing Operating System Services Based on Smart Cards.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)