default search action
TrustBus 2011: Toulouse, France
- Steven Furnell, Costas Lambrinoudakis, Günther Pernul:
Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings. Lecture Notes in Computer Science 6863, Springer 2011, ISBN 978-3-642-22889-6
Identity and Trust Management
- Konrad Leszczynski, Maciej Zakrzewicz:
Electrostatic Force Method: - Trust Management Method Inspired by the Laws of Physics. 1-12 - Diana Berbecaru, Antonio Lioy, Marco Domenico Aime:
Exploiting Proxy-Based Federated Identity Management in Wireless Roaming Access. 13-23
Security and Privacy Models for Pervasive Information Systems
- George Drosatos, Pavlos S. Efraimidis:
Privacy-Preserving Statistical Analysis on Ubiquitous Health Data. 24-36 - Florian Scheuer, Karl-Peter Fuchs, Hannes Federrath:
A Safety-Preserving Mix Zone for VANETs. 37-48 - Alexios Mylonas, Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis:
A Secure Smartphone Applications Roll-out Scheme. 49-61
Reliability and Security of Content and Data
- Maria Eleni Skarkala, Manolis Maragoudakis, Stefanos Gritzalis, Lilian Mitrou:
Privacy Preserving Tree Augmented Naïve Bayesian Multi-party Implementation on Horizontally Partitioned Databases. 62-73 - Nikos Virvilis, Stelios Dritsas, Dimitris Gritzalis:
Secure Cloud Storage: Available Infrastructures and Architectures Review and Evaluation. 74-85 - Nahid Shahmehri, David Byers, Rahul Hiran:
TRAP: Open Decentralized Distributed Spam Filtering. 86-97
Authentication and Authorization in Digital Business
- Gerhard de Koning Gans, Eric R. Verheul:
Best Effort and Practice Activation Codes. 98-112 - Jan Lehnhardt, Adrian Spalka:
Decentralized Generation of Multiple, Uncorrelatable Pseudonyms without Trusted Third Parties. 113-124
Intrusion Detection and Information Filtering
- Nurit Gal-Oz, Yaron Gonen, Ran Yahalom, Ehud Gudes, Boris Rozenberg, Erez Shmueli:
Mining Roles from Web Application Usage Patterns. 125-137 - Eleni Darra, Christoforos Ntantogian, Christos Xenakis, Sokratis K. Katsikas:
A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks. 138-149 - Christoforos Panos, Christos Xenakis, Ioannis Stavrakakis:
An Evaluation of Anomaly-Based Intrusion Detection Engines for Mobile Ad Hoc Networks. 150-160
Management of Privacy and Confidentiality
- Liqiang Geng, Yonghua You, Yunli Wang, Hongyu Liu:
Privacy Measures for Free Text Documents: Bridging the Gap between Theory and Practice. 161-173 - Ebenezer Paintsil:
Towards Legal Privacy Risk Assessment and Specification. 174-185 - Johannes Heurix, Thomas Neubauer:
Privacy-Preserving Storage and Access of Medical Data through Pseudonymization and Encryption. 186-197
Cryptographic Protocols/ Usability of Security
- Benjamin Aziz:
Correcting a Delegation Protocol for Grids. 198-209 - Thomas Lederm, Nathan L. Clarke:
Risk Assessment for Mobile Devices. 210-221
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.