default search action
TrustBus 2014: Munich, Germany
- Claudia Eckert, Sokratis K. Katsikas, Günther Pernul:
Trust, Privacy, and Security in Digital Business - 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings. Lecture Notes in Computer Science 8647, Springer 2014, ISBN 978-3-319-09769-5
Trust Management
- Nazila Gol Mohammadi, Torsten Bandyszak, Micha Moffie, Xiaoyu Chen, Thorsten Weyer, Costas Kalogiros, Bassem I. Nasser, Mike Surridge:
Maintaining Trustworthiness of Socio-Technical Systems at Run-Time. 1-12 - Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg:
Trust Relationships in Privacy-ABCs' Ecosystems. 13-23
Trust Metrics and Evaluation Models
- Mykola Protsenko, Tilo Müller:
Android Malware Detection Based on Software Complexity Metrics. 24-35 - Gerhard Rauchecker, Emrah Yasasin, Guido Schryen:
A Decision Support System for IT Security Incident Management. 36-47 - Nagham Alhadad, Yann Busnel, Patricia Serrano-Alvarado, Philippe Lamarre:
Trust Evaluation of a System for an Activity with Subjective Logic. 48-59 - Thi-Thuy Linh-Vo, Tran Khanh Dang, Josef Küng:
A Hash-Based Index Method for Securing Biometric Fuzzy Vaults. 60-71
Privacy and Trust in Cloud Computing
- Youngbae Song, Hyoungshick Kim, Aziz Mohaisen:
A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain. 72-82 - Marc Walterbusch, Frank Teuteberg:
Towards an Understanding of the Formation and Retention of Trust in Cloud Computing: A Research Agenda, Proposed Research Methods and Preliminary Results. 83-93 - Kristian Beckers, Stephan Faßbender, Stefanos Gritzalis, Maritta Heisel, Christos Kalloniatis, Rene Meis:
Privacy-Aware Cloud Deployment Scenario Selection. 94-105
Security Management
- José Miguel Horcas, Mónica Pinto, Lidia Fuentes:
Closing the Gap between the Specification and Enforcement of Security Policies. 106-118 - Vasilis Stavrou, Miltiadis Kandias, Georgios Karoulas, Dimitris Gritzalis:
Business Process Modeling for Insider Threat Monitoring and Handling. 119-131 - Samuel Paul Kaluvuri, Michele Bezzi, Yves Roudier:
A Quantitative Analysis of Common Criteria Certification Practice. 132-143
Security, Trust and Privacy in Mobile and Pervasive Environments
- Ahmad Abdel-Hafez, Yue Xu, Audun Jøsang:
A Normal-Distribution Based Reputation Model. 144-155 - Lena Reinfelder, Zinaida Benenson, Freya Gassmann:
Differences between Android and iPhone Users in Their Security and Privacy Awareness. 156-167 - Alfred Kobsa:
User Acceptance of Footfall Analytics with Aggregated and Anonymized Mobile Phone Data. 168-179 - Jirí Kur, Vashek Matyás:
A Protocol for Intrusion Detection in Location Privacy-Aware Wireless Sensor Networks. 180-190
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.