


default search action
TrustBus 2013: Prague, Czech Republic
- Steven Furnell
, Costas Lambrinoudakis
, Javier López
:
Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings. Lecture Notes in Computer Science 8058, Springer 2013, ISBN 978-3-642-40342-2
Session 1: Access Control and Authentication
- Fernando Pereñíguez-Garcia
, Rafael Marín López, Antonio Fernandez Gómez-Skarmeta:
Improving Kerberos Ticket Acquisition during Application Service Access Control. 1-12 - Charalampos Petrou, Christoforos Ntantogian, Christos Xenakis
:
A Better Time Approximation Scheme for e-Passports. 13-23
Session 2: Identity and Trust Management
- Nagham Alhadad, Patricia Serrano-Alvarado, Yann Busnel
, Philippe Lamarre:
Trust Evaluation of a System for an Activity. 24-36 - Mark Vinkovits, Andreas Zimmermann:
Defining a Trust Framework Design Process. 37-47 - Ebenezer Paintsil, Lothar Fritsch:
Executable Model-Based Risk Analysis Method for Identity Management Systems: Using Hierarchical Colored Petri Nets. 48-61
Session 3: Pivacy and Confidentiality Management
- Alexandre Viejo
, Jordi Castellà-Roca, Guillem Rufián:
Preserving the User's Privacy in Social Networking Sites. 62-73 - Konstantina Vemou, Maria Karyda
:
A Classification of Factors Influencing Low Adoption of PETs Among SNS Users. 74-84 - Leucio Antonio Cutillo
, Antonio Lioy
:
Towards Privacy-by-Design Peer-to-Peer Cloud Computing. 85-96 - Mehmet Ercan Nergiz, Muhammed Zahit Gök, Ufuk Özkanli:
Preservation of Utility through Hybrid k-Anonymization. 97-111
Session 4: Information Systems Security
- George Aggelinos, Sokratis K. Katsikas
:
The Security of Information Systems in Greek Hospitals. 112-123 - Lisa Rajbhandari, Einar Snekkenes:
Risk Acceptance and Rejection for Threat and Opportunity Risks in Conflicting Incentives Risk Analysis. 124-136
Session 5: Security Policies/Legal Issues
- Efthymios Lalas, Lilian Mitrou, Costas Lambrinoudakis
:
ProCAVE: Privacy-Preserving Collection and Authenticity Validation of Online Evidence. 137-148 - Bernhard Heinzle, Steven Furnell
:
Assessing the Feasibility of Security Metrics. 149-160
Session 6: Trust and Privacy in Mobile and Pervasive Environments
- Bjørnar Tessem, Lars Nyre:
The Influence of Social Media Use on Willingness to Share Location Information. 161-172 - Alexios Mylonas
, Dimitris Gritzalis, Bill Tsoumas, Theodore K. Apostolopoulos:
A Qualitative Metrics Vector for the Awareness of Smartphone Security Users. 173-184 - Michalis Pavlidis
, Haralambos Mouratidis
, Christos Kalloniatis, Shareeful Islam, Stefanos Gritzalis
:
Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions. 185-198

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.