Security and privacy in business networking
@article{Wohlgemuth2014SecurityAP, title={Security and privacy in business networking}, author={Sven Wohlgemuth and Stefan Sackmann and Noboru Sonehara and A Min Tjoa}, journal={Electronic Markets}, year={2014}, volume={24}, pages={81-88} }
Business networking relies on application-specific quantity and quality of information in order to support social infrastructures in, e.g., energy allocation coordinated by smart grids, healthcare services with electronic health records, traffic management with personal sensors, RFID in retail and logistics, or integration of individuals’ social network information into good, services, and rescue operations. Due to the increasing reliance of networking applications on sharing ICT services…
10 Citations
Adaptive User-Centered Security
- Computer ScienceCD-ARES
- 2014
This work proposes to extend Privacy by Design by adapting an IT system not only to inevitable security vulnerabilities but in particular to their users’ view on an information exchange and its IT support with different, eventually opposite security interests.
Adaptive User-Centered Security
- Computer Science
- 2018
This work proposes to extend Privacy by Design by adapting an IT system not only to inevitable security vulnerabilities but in particular to their users’ view with different, eventually opposite security interests.
Double Securing from Hackers in B2B E-commerce
- Computer Science
- 2016
This paper is designing a security framework which runs double securing algorithm by using keyless cryptography algorithm for finding the authentic supplier and to see that the order of sub product to be manufactured reaches correct supplier for this caser cryptography algorithm is used.
The impact of transparency on mobile privacy decision making
- Computer ScienceElectron. Mark.
- 2020
The results indicate increased comprehension of data processing practices when privacy policies are transparently disclosed, whereas acceptance rates do not vary significantly.
Editorial 25/2: Electronic Markets and privacy
- Computer ScienceElectron. Mark.
- 2015
The aspect of privacy is a current and at the same time an established topic for electronic markets and information hubs, such as electronic markets, play a key role in this race between protecting information and making it selectively available for desired uses.
Potential and limits of Blockchain technology for networked businesses
- Computer ScienceElectron. Mark.
- 2020
This Special Issue takes a broad and neutral view on the technology and considers it a facilitator for new coordination mechanisms for networked businesses, including the potential to disrupt trusted business models, but also to address some of the deeper technical foundations such as scalability, accountability, and security.
The Uncertainty of Information Systems: Cause or Effect of VUCA?
- Computer Science
- 2016
The article follows this question along three infrastructural spheres, based on F.A. von Hayeks “pretence of knowledge”: the development of technology relies on an existing technology infrastructure, which allows to connect even smallest information feeds (the Internet of Things), and the knowledge infrastructure allows sustainable business models to provide new economic services.
Implementing Social Commerce Systems
- Business
- 2016
Upon completion of this chapter, you will be able to: 1. Describe the major issues in the social commerce implementation landscape. 2. Discuss the security and fraud protection issues in social…
Editorial 24/2: Electronic Markets and journal sections
- EducationElectron. Mark.
- 2014
The world of academic publishing has profoundly changed in the last decade and the transformation presents a challenge for publishing companies which need to adapt their business model and journals need to position themselves in this increasingly competitive marketplace.
Privacy-Enhancing Trust Infrastructure for Process Mining
- Computer ScienceIEICE Trans. Fundam. Electron. Commun. Comput. Sci.
- 2018
References
SHOWING 1-10 OF 46 REFERENCES
Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data
- Computer SciencePrivacy Enhancing Technologies
- 2002
The Platform for Enterprise Privacy Practices (E-P3P), which defines technology for privacy-enabled management and exchange of customer data, is described, which introduces a viable separation of duty between the three "administrators" of a privacy system.
Privacy and Identity
- Computer ScienceThe Future of Identity in the Information Society
- 2009
This chapter presents technical and organisational solutions elaborated within FIDIS on how privacy can be preserved in spite of the disclosure of personal data.
Isolation in Cloud Computing and Privacy-Enhancing Technologies
- Computer ScienceBus. Inf. Syst. Eng.
- 2011
This state-of-the-art contribution shows the analogy of the confidentiality of external data processing by Cloud services with mechanisms known and applied in privacy.
Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy
- Computer ScienceSEC
- 2010
This article shows a privacy risk by the example of using electronic health records abroad and proposes to observe disclosures of personal data to third parties by using data provenance history and digital watermarking.
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2001
This paper proposes a practical anonymous credential system that is based on the strong RSA assumption and the decisional Diffie-Hellman assumption modulo a safe prime product and is considerably superior to existing ones.
Privacy with Delegation of Rights by Identity Management
- Computer ScienceETRICS
- 2006
This work proposes a generic privacy-preserving protocol for sharing identifying attributes as credentials with others, which extends current identity management systems.
Can homomorphic encryption be practical?
- Computer Science, MathematicsCCSW '11
- 2011
A proof-of-concept implementation of the recent somewhat homomorphic encryption scheme of Brakerski and Vaikuntanathan, whose security relies on the "ring learning with errors" (Ring LWE) problem, and a number of application-specific optimizations to the encryption scheme, including the ability to convert between different message encodings in a ciphertext.
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
- Computer ScienceCCS
- 2009
It is shown that it is possible to map the internal cloud infrastructure, identify where a particular target VM is likely to reside, and then instantiate new VMs until one is placed co-resident with the target, and how such placement can then be used to mount cross-VM side-channel attacks to extract information from a target VM on the same machine.
Basic concepts and taxonomy of dependable and secure computing
- Computer ScienceIEEE Transactions on Dependable and Secure Computing
- 2004
The aim is to explicate a set of general concepts, of relevance across a wide range of situations and, therefore, helping communication and cooperation among a number of scientific and technical communities, including ones that are concentrating on particular types of system, of system failures, or of causes of systems failures.
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
- Computer ScienceUSENIX Security Symposium
- 1999
It is concluded that PGP 5.0 is not usable enough to provide effective security for most computer users, despite its attractive graphical user interface, supporting the hypothesis that user interface design for effective security remains an open problem.