Trust, Privacy and Security in Digital Business 16th International C

This book constitutes the refereed proceedings of the 16th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2019, held in Linz, Austria, in August 2019 in conjunction with DEXA 2019. The 11 full papers presented were c

  • PDF / 11,034,865 Bytes
  • 183 Pages / 439.371 x 666.143 pts Page_size
  • 15 Downloads / 195 Views

DOWNLOAD

REPORT


Stefanos Gritzalis · Edgar R. Weippl · Sokratis K. Katsikas · Gabriele Anderst-Kotsis · A Min Tjoa · Ismail Khalil (Eds.)

Trust, Privacy and Security in Digital Business 16th International Conference, TrustBus 2019 Linz, Austria, August 26–29, 2019 Proceedings

Lecture Notes in Computer Science Founding Editors Gerhard Goos Karlsruhe Institute of Technology, Karlsruhe, Germany Juris Hartmanis Cornell University, Ithaca, NY, USA

Editorial Board Members Elisa Bertino Purdue University, West Lafayette, IN, USA Wen Gao Peking University, Beijing, China Bernhard Steffen TU Dortmund University, Dortmund, Germany Gerhard Woeginger RWTH Aachen, Aachen, Germany Moti Yung Columbia University, New York, NY, USA

11711

More information about this series at http://www.springer.com/series/7410

Stefanos Gritzalis Edgar R. Weippl Sokratis K. Katsikas Gabriele Anderst-Kotsis A Min Tjoa Ismail Khalil (Eds.) •









Trust, Privacy and Security in Digital Business 16th International Conference, TrustBus 2019 Linz, Austria, August 26–29, 2019 Proceedings

123

Editors Stefanos Gritzalis University of the Aegean Mytilene, Greece Sokratis K. Katsikas Norwegian University of Science and Technology Trondheim, Norway A Min Tjoa Software Competence Center Hagenberg Hagenberg im Mühlkreis, Austria

Edgar R. Weippl SBA Research Vienna, Austria Gabriele Anderst-Kotsis Johannes Kepler University of Linz Linz, Austria Ismail Khalil Johannes Kepler University of Linz Linz, Austria

ISSN 0302-9743 ISSN 1611-3349 (electronic) Lecture Notes in Computer Science ISBN 978-3-030-27812-0 ISBN 978-3-030-27813-7 (eBook) https://doi.org/10.1007/978-3-030-27813-7 LNCS Sublibrary: SL4 – Security and Cryptology © Springer Nature Switzerland AG 2019 The chapter “A Data Utility-Driven Benchmark for De-identification Methods” is Open Access. This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http:// creativecommons.org/licenses/by/4.0/). For further details see license information in the chapter. This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to