| Anonymity and pseudonymity in business
transactions |
Business architectures and underlying
infrastructures |
| Common practice, legal and regulatory
issues |
Cryptographic protocols |
| Delivery technologies and scheduling
protocols |
Design of businesses models with
security requirements |
| Economics of Information Systems
Security |
Electronic cash, wallets and
pay-per-view systems |
| Enterprise management and
consumer protection |
Identity and Trust Management
|
| Intellectual property and digital
rights management |
Intrusion detection and information
filtering |
| Languages for description of services
and contracts |
Management of privacy &
confidentiality |
| Models for access control and
authentication |
Multimedia web services |
| New cryptographic building-blocks for
e-business applications |
Online transaction processing
|
| PKI & PMI |
Public administration, governmental
services |
| P2P transactions and scenarios
|
Real-time Internet E-Services
|
| Reliability and security of content
and data |
Reliable auction, e-procurement and
negotiation technology |
| Reputation in services provision
|
Secure process integration and
management |
| Security and Privacy models for
Pervasive Information Systems |
Security Policies |
| Shopping, trading, and contract
management tools |
Smartcard technology |
| Transactional Models |
Trust and privacy issues in social
netwotks environments |
| Usability of security technologies and
services |