Anonymity and pseudonymity in business
transactions |
Business architectures and underlying
infrastructures |
Common practice, legal and regulatory
issues |
Cryptographic protocols |
Delivery technologies and scheduling
protocols |
Design of businesses models with
security requirements |
Economics of Information Systems
Security |
Electronic cash, wallets and
pay-per-view systems |
Enterprise management and
consumer protection |
Identity and Trust Management
|
Intellectual property and digital
rights management |
Intrusion detection and information
filtering |
Languages for description of services
and contracts |
Management of privacy &
confidentiality |
Models for access control and
authentication |
Multimedia web services |
New cryptographic building-blocks for
e-business applications |
Online transaction processing
|
PKI & PMI |
Public administration, governmental
services |
P2P transactions and scenarios
|
Real-time Internet E-Services
|
Reliability and security of content
and data |
Reliable auction, e-procurement and
negotiation technology |
Reputation in services provision
|
Secure process integration and
management |
Security and Privacy models for
Pervasive Information Systems |
Security Policies |
Shopping, trading, and contract
management tools |
Smartcard technology |
Transactional Models |
Trust and privacy issues in social
netwotks environments |
Usability of security technologies and
services |