


default search action
TrustBus 2007: Regensburg, Germany
- Costas Lambrinoudakis, Günther Pernul, A Min Tjoa:
Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings. Lecture Notes in Computer Science 4657, Springer 2007, ISBN 978-3-540-74408-5 - Alfred Kobsa:
Trustbus'07 Keynote Talk: Privacy Enhanced Personalization. 1 - Günther Pernul, Marco Casassa Mont
, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger:
Panel Discussion: Managing Digital Identities - Challenges and Opportunities. 2
Secure and Trusted Virtual Organisations
- Tuan-Anh Nguyen, David W. Chadwick, Bassem Nasser:
Recognition of Authority in Virtual Organisations. 3-13 - Florian Kerschbaum, Rafael Deitos, Philip Robinson:
Securing VO Management. 14-23 - Aggeliki Tsohou, Marianthi Theoharidou
, Spyros Kokolakis, Dimitris Gritzalis:
Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship. 24-33 - Simon Samwel Msanjila, Hamideh Afsarmanesh:
Specification of the TrustMan System for Assisting Management of VBEs. 34-43
Privacy in Digital Business
- Min-Hua Shao:
A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third Party. 44-53 - Zhuowei Li, Amitabha Das, Jianying Zhou:
Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. 54-64 - Tariq Ehsan Elahi, Siani Pearson
:
Privacy Assurance: Bridging the Gap Between Preference and Practice. 65-74
Identity Management and Usage Control
- Keshnee Padayachee
, Jan H. P. Eloff:
Enhancing Optimistic Access Controls with Usage Control. 75-82 - Alexander Pretschner, Fabio Massacci, Manuel Hilty:
Usage Control in Service-Oriented Architectures. 83-93 - Marco Casassa Mont, Boris Balacheff:
On Device-Based Identity Management in Enterprises. 94-103 - Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Analysis-Level Classes from Secure Business Processes Through Model Transformations. 104-114
Authentication and Access Control
- Marijke Coetzee, Jan H. P. Eloff:
A Trust and Context Aware Access Control Model for Web Services Conversations. 115-124 - Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas:
Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains. 125-134 - Georgios Kambourakis, Stefanos Gritzalis:
On Device Authentication in Wireless Networks: Present Issues and Future Challenges. 135-144
Compliance and User Privacy
- Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin
:
The Meaning of Logs. 145-154 - Gerald Quirchmayr, Christopher C. Wills
:
Data Protection and Privacy Laws in the Light of RFID and Emerging Technologies. 155-164 - Quan Pham, Adrian McCullagh, Ed Dawson:
Consistency of User Attribute in Federated Systems. 165-177
Policy Management
- Klaus Peter Fischer, Udo Bleimann, Steven Furnell:
Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes. 178-189 - Thomas Buntrock, Hans-Christian Esperer, Claudia Eckert:
Situation-Based Policy Enforcement. 190-200 - Wynand van Staden
, Martin S. Olivier
:
Using Purpose Lattices to Facilitate Customisation of Privacy Agreements. 201-209 - Christos Kloukinas
, George Spanoudakis:
A Pattern-Driven Framework for Monitoring Security and Dependability. 210-218
Security System Management
- Sibylle Hick, Christoph Ruland:
Security Aspects for Secure Download of Regulated Software. 219-227 - Christos Fragos, Maria Karyda, Evangelos A. Kiountouzis:
Using the Lens of Circuits of Power in Information Systems Security Management. 228-236 - Stefan Schmidt, Robert Steele, Tharam S. Dillon:
Fuzzy Service Selection and Interaction Review in Distributed Electronic Markets. 237-247
Security and Trust
- Rachid Saadi, Jean-Marc Pierson
, Lionel Brunie:
X316 Security Toolbox for New Generation of Certificate. 248-258 - José Fonseca, Marco Vieira
, Henrique Madeira:
Detecting Malicious SQL. 259-268 - Antonio Maña
, Antonio Muñoz:
Trusted Code Execution in JavaCard. 269-279 - Detlef Hühnlein, Manuel Bach:
How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards. 280-289

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.