default search action
TrustBus 2010: Bilbao, Spain
- Sokratis K. Katsikas, Javier López, Miguel Soriano:
Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings. Lecture Notes in Computer Science 6264, Springer 2010, ISBN 978-3-642-15151-4
Invited Talk
- Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, Artsiom Yautsiukhin:
Usage Control, Risk and Trust. 1-12
Prevention Systems
- Christoph Fritsch, Michael Netter, Andreas Reisser, Günther Pernul:
Attacking Image Recognition Captchas - A Naive but Effective Approach. 13-25 - Miltiadis Kandias, Alexios Mylonas, Nikos Virvilis, Marianthi Theoharidou, Dimitris Gritzalis:
An Insider Threat Prediction Model. 26-37 - Nikos Vrakas, Dimitris Geneiatakis, Costas Lambrinoudakis:
A Call Conference Room Interception Attack and Its Detection. 38-44 - Zeeshan Ahmed, Abdessamad Imine, Michaël Rusinowitch:
Safe and Efficient Strategies for Updating Firewall Policies. 45-57
Privacy I
- Javier Parra-Arnau, David Rebollo-Monedero, Jordi Forné:
A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression. 58-68 - Siani Pearson, Yun Shen:
Context-Aware Privacy Design Pattern Selection. 69-80 - Aimin Yu, Dengguo Feng:
Real-Time Remote Attestation with Privacy Protection. 81-92 - Huafei Zhu, Feng Bao:
Private Searching on MapReduce. 93-101
Privacy II
- Wesley Brandi, Martin S. Olivier:
In Search of Search Privacy. 102-116 - Sébastien Canard, Amandine Jambert:
Untraceability and Profiling Are Not Mutually Exclusive. 117-128 - Audun Jøsang, Lothar Fritsch, Tobias Mahler:
Privacy Policy Referencing. 129-140
Access Control
- Almudena Alcaide, Esther Palomar, Ana Isabel González-Tablas Ferreres, Arturo Ribagorda:
Formal Proof of Cooperativeness in a Multi-Party P2P Content Authentication Protocol. 141-152 - Gina Kounga, Marco Casassa Mont, Pete Bramhall:
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation. 153-164 - Evangelos Rekleitis, Panagiotis Rizomiliotis, Stefanos Gritzalis:
An Agent Based Back-End RFID Tag Management System. 165-176
Security and Trust Concepts
- Tarik Ibrahim, Steven Furnell, Maria Papadaki, Nathan L. Clarke:
Assessing the Usability of End-User Security Software. 177-189 - Luis Enrique Sánchez, Antonio Santos-Olmo, Eduardo Fernández-Medina, Mario Piattini:
Building ISMS through the Reuse of Knowledge. 190-201 - Soude Fazeli, Alireza Zarghami, Nima Dokoohaki, Mihhail Matskin:
Mechanizing Social Trust-Aware Recommenders with T-Index Augmented Trustworthiness. 202-213
Security for Dynamic Collaborations
- Christoph Fritsch, Günther Pernul:
Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution. 214-226 - Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis:
Analyzing Information Security Awareness through Networks of Association. 227-237 - Kun Peng, Feng Bao:
Efficiency Improvement of Homomorphic E-Auction. 238-249
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.