Anonymity
and pseudonymity in business transactions
|
Business
architectures and underlying infrastructures
|
Common
practice, legal and regulatory issues
|
Cryptographic
protocols
|
Delivery
technologies and scheduling protocols
|
Design
of businesses models with security requirements
|
Economics
of Information Systems Security
|
Electronic
cash, wallets and pay-per-view systems
|
Enterprise
management and consumer protection
|
Identity
and Trust Management
|
Intellectual
property and digital rights management
|
Intrusion
detection and information filtering
|
Languages
for description of services and contracts |
Management
of privacy & confidentiality
|
Models
for access control and authentication |
Multimedia
web services
|
New
cryptographic building-blocks for e-business applications
|
Online
transaction processing
|
PKI
& PMI
|
Public
administration, governmental services
|
P2P
transactions and scenarios
|
Real-time
Internet E-Services
|
Reliability
and security of content and data
|
Reliable
auction, e-procurement and negotiation technology
|
Reputation
in services provision
|
Secure
process integration and management
|
Security
and Privacy models for Pervasive Information Systems
|
Security
Policies |
Shopping, trading, and contract management tools
|
Smartcard technology |
Transactional Models
|
Trust and privacy issues in social networks environments |
Usability of security technologies and services
|