default search action
15th TrustBus 2018: Regensburg, Germany
- Steven Furnell, Haralambos Mouratidis, Günther Pernul:
Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings. Lecture Notes in Computer Science 11033, Springer 2018, ISBN 978-3-319-98384-4
Permission Models and Cloud
- Costas Lambrinoudakis:
The General Data Protection Regulation (GDPR) Era: Ten Steps for Compliance of Data Processors and Data Controllers. 3-8 - Lena Reinfelder, Andrea Schankin, Sophie Russ, Zinaida Benenson:
An Inquiry into Perception and Usage of Smartphone Permission Models. 9-22 - Ferdinand Bollwein, Lena Wiese:
On the Hardness of Separation of Duties Problems for Cloud Databases. 23-38 - Frank Pallas, Martin Grambow:
Three Tales of Disillusion: Benchmarking Property Preserving Encryption Schemes. 39-54
Privacy
- João S. Resende, Patrícia R. Sousa, Luís Antunes:
Evaluating the Privacy Properties of Secure VoIP Metadata. 57-68 - Anand Paturi, Subhasish Mazumdar:
Can Spatial Transformation-Based Privacy Preservation Compromise Location Privacy? 69-84 - Majed Alshammari, Andrew Simpson:
Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Assessment. 85-99
Proactive Security Measures
- Dina Aladawy, Kristian Beckers, Sebastian Pape:
PERSUADED: Fighting Social Engineering Attacks with a Serious Game. 103-118 - Melanie Volkamer, Karen Renaud, Benjamin Reinheimer, Philipp Rack, Marco Ghiglieri, Peter Mayer, Alexandra Kunz, Nina Gerber:
Developing and Evaluating a Five Minute Phishing Awareness Video. 119-134 - Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell:
Biometrically Linking Document Leakage to the Individuals Responsible. 135-149 - Stavros Simou, Ioannis Troumpis, Christos Kalloniatis, Dimitris Kavroudakis, Stefanos Gritzalis:
A Decision-Making Approach for Improving Organizations' Cloud Forensic Readiness. 150-164
Cyber Physical Systems
- Martin Nuss, Alexander Puchta, Michael Kunz:
Towards Blockchain-Based Identity and Access Management for Internet of Things in Enterprises. 167-181 - Brian Greaves, Marijke Coetzee, Wai Sze Leung:
Access Control Requirements for Physical Spaces Protected by Virtual Perimeters. 182-197 - Myrsini Athinaiou, Haralambos Mouratidis, Theo Fotis, Michalis Pavlidis, Emmanouil Panaousis:
Towards the Definition of a Security Incident Response Modelling Language. 198-212 - Nikolaos Pitropakis, Emmanouil Panaousis, Alkiviadis Giannakoulias, George Kalpakis, Rodrigo Diaz Rodriguez, Panayiotis Sarigiannidis:
An Enhanced Cyber Attack Attribution Framework. 213-228 - Antonio Acien, Ana Nieto, Gerardo Fernandez, Javier López:
A Comprehensive Methodology for Deploying IoT Honeypots. 229-243 - Nazila Gol Mohammadi, Nelufar Ulfat-Bunyadi, Maritta Heisel:
Trustworthiness Cases - Toward Preparation for the Trustworthiness Certification. 244-259
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.