Security and privacy in business networking

@article{Wohlgemuth2014SecurityAP,
  title={Security and privacy in business networking},
  author={Sven Wohlgemuth and Stefan Sackmann and Noboru Sonehara and A Min Tjoa},
  journal={Electronic Markets},
  year={2014},
  volume={24},
  pages={81-88}
}
Business networking relies on application-specific quantity and quality of information in order to support social infrastructures in, e.g., energy allocation coordinated by smart grids, healthcare services with electronic health records, traffic management with personal sensors, RFID in retail and logistics, or integration of individuals’ social network information into good, services, and rescue operations. Due to the increasing reliance of networking applications on sharing ICT services… 
Adaptive User-Centered Security
TLDR
This work proposes to extend Privacy by Design by adapting an IT system not only to inevitable security vulnerabilities but in particular to their users’ view on an information exchange and its IT support with different, eventually opposite security interests.
Adaptive User-Centered Security
TLDR
This work proposes to extend Privacy by Design by adapting an IT system not only to inevitable security vulnerabilities but in particular to their users’ view with different, eventually opposite security interests.
Double Securing from Hackers in B2B E-commerce
TLDR
This paper is designing a security framework which runs double securing algorithm by using keyless cryptography algorithm for finding the authentic supplier and to see that the order of sub product to be manufactured reaches correct supplier for this caser cryptography algorithm is used.
The impact of transparency on mobile privacy decision making
TLDR
The results indicate increased comprehension of data processing practices when privacy policies are transparently disclosed, whereas acceptance rates do not vary significantly.
Editorial 25/2: Electronic Markets and privacy
TLDR
The aspect of privacy is a current and at the same time an established topic for electronic markets and information hubs, such as electronic markets, play a key role in this race between protecting information and making it selectively available for desired uses.
Potential and limits of Blockchain technology for networked businesses
TLDR
This Special Issue takes a broad and neutral view on the technology and considers it a facilitator for new coordination mechanisms for networked businesses, including the potential to disrupt trusted business models, but also to address some of the deeper technical foundations such as scalability, accountability, and security.
The Uncertainty of Information Systems: Cause or Effect of VUCA?
TLDR
The article follows this question along three infrastructural spheres, based on F.A. von Hayeks “pretence of knowledge”: the development of technology relies on an existing technology infrastructure, which allows to connect even smallest information feeds (the Internet of Things), and the knowledge infrastructure allows sustainable business models to provide new economic services.
Implementing Social Commerce Systems
Upon completion of this chapter, you will be able to: 1. Describe the major issues in the social commerce implementation landscape. 2. Discuss the security and fraud protection issues in social
Editorial 24/2: Electronic Markets and journal sections
TLDR
The world of academic publishing has profoundly changed in the last decade and the transformation presents a challenge for publishing companies which need to adapt their business model and journals need to position themselves in this increasingly competitive marketplace.
Privacy-Enhancing Trust Infrastructure for Process Mining

References

SHOWING 1-10 OF 46 REFERENCES
Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data
TLDR
The Platform for Enterprise Privacy Practices (E-P3P), which defines technology for privacy-enabled management and exchange of customer data, is described, which introduces a viable separation of duty between the three "administrators" of a privacy system.
Privacy and Identity
TLDR
This chapter presents technical and organisational solutions elaborated within FIDIS on how privacy can be preserved in spite of the disclosure of personal data.
Isolation in Cloud Computing and Privacy-Enhancing Technologies
TLDR
This state-of-the-art contribution shows the analogy of the confidentiality of external data processing by Cloud services with mechanisms known and applied in privacy.
Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy
TLDR
This article shows a privacy risk by the example of using electronic health records abroad and proposes to observe disclosures of personal data to third parties by using data provenance history and digital watermarking.
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
TLDR
This paper proposes a practical anonymous credential system that is based on the strong RSA assumption and the decisional Diffie-Hellman assumption modulo a safe prime product and is considerably superior to existing ones.
Privacy with Delegation of Rights by Identity Management
TLDR
This work proposes a generic privacy-preserving protocol for sharing identifying attributes as credentials with others, which extends current identity management systems.
Can homomorphic encryption be practical?
TLDR
A proof-of-concept implementation of the recent somewhat homomorphic encryption scheme of Brakerski and Vaikuntanathan, whose security relies on the "ring learning with errors" (Ring LWE) problem, and a number of application-specific optimizations to the encryption scheme, including the ability to convert between different message encodings in a ciphertext.
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
TLDR
It is shown that it is possible to map the internal cloud infrastructure, identify where a particular target VM is likely to reside, and then instantiate new VMs until one is placed co-resident with the target, and how such placement can then be used to mount cross-VM side-channel attacks to extract information from a target VM on the same machine.
Basic concepts and taxonomy of dependable and secure computing
TLDR
The aim is to explicate a set of general concepts, of relevance across a wide range of situations and, therefore, helping communication and cooperation among a number of scientific and technical communities, including ones that are concentrating on particular types of system, of system failures, or of causes of systems failures.
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
TLDR
It is concluded that PGP 5.0 is not usable enough to provide effective security for most computer users, despite its attractive graphical user interface, supporting the hypothesis that user interface design for effective security remains an open problem.
...
...