


default search action
TrustBus 2015: Valencia, Spain
- Simone Fischer-Hübner, Costas Lambrinoudakis, Javier López:
Trust, Privacy and Security in Digital Business - 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings. Lecture Notes in Computer Science 9264, Springer 2015, ISBN 978-3-319-22905-8
Access Control
- Qasim Mahmood Rajpoot, Christian Damsgaard Jensen
, Ram Krishnan
:
Attributes Enhanced Role-Based Access Control Model. 3-17 - Malik Imran Daud
, David Sánchez
, Alexandre Viejo
:
Ontology-Based Delegation of Access Control: An Enhancement to the XACML Delegation Profile. 18-29
Trust and Reputation in Pervasive Environments
- Alessandro Colantonio, Roberto Di Pietro
, Marinella Petrocchi, Angelo Spognardi
:
VISIO: A Visual Approach for Singularity Detection in Recommendation Systems. 33-47 - Zisis Tsiatsikas, Marios Anagnostopoulos
, Georgios Kambourakis, Sozon Lambrou, Dimitris Geneiatakis:
Hidden in Plain Sight. SDP-Based Covert Channel for Botnet Communication. 48-59 - Channel Hillebrand, Marijke Coetzee
:
The Design of a Configurable Reputation Service. 60-70
Trust and Privacy Issues in Mobile Environments
- Christoforos Ntantogian, Grigoris Valtas, Nikos Kapetanakis, Faidon Lalagiannis, Georgios Karopoulos, Christos Xenakis
:
Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software. 73-86 - Dimitris Geneiatakis, Riccardo Satta, Igor Nai Fovino, Ricardo Neisse:
On the Efficacy of Static Features to Detect Malicious Applications in Android. 87-98 - Mykola Protsenko, Tilo Müller:
Protecting Android Apps Against Reverse Engineering by the Use of the Native Code. 99-110
Security and Privacy in the Cloud
- Christos Kalloniatis:
Designing Privacy-Aware Systems in the Cloud. 113-123 - Francesco Buccafurri, Gianluca Lax
, Serena Nicolazzo
, Antonino Nocera
:
Accountability-Preserving Anonymous Delivery of Cloud Services. 124-135 - Nikolaos Pitropakis, Costas Lambrinoudakis
, Dimitris Geneiatakis:
Till All Are One: Towards a Unified Cloud IDS. 136-149
Security Policies / Usability Issues
- Abdulwahid Al Abdulwahid
, Nathan L. Clarke
, Ingo Stengel, Steven Furnell
, Christoph Reich
:
Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes. 153-168 - Ioanna Topa, Maria Karyda:
Identifying Factors that Influence Employees' Security Behavior for Enhancing ISP Compliance. 169-179 - José Miguel Horcas
, Mónica Pinto
, Lidia Fuentes
, Wissam Mallouli, Edgardo Montes de Oca:
Dynamic Deployment and Monitoring of Security Policies. 180-192
Privacy Requirements and Privacy Audit
- Rene Meis
, Roman Wirtz, Maritta Heisel:
A Taxonomy of Requirements for the Privacy Goal Transparency. 195-209 - Prokopios Drogkaris, Aristomenis Gritzalis:
A Privacy Preserving Framework for Big Data in e-Government Environments. 210-218 - Eleni-Laskarina Makri
, Costas Lambrinoudakis
:
Privacy Principles: Towards a Common Privacy Audit Methodology. 219-234

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.