Search dblp for Publications

export results for "stream:journals/ijdtis:"

 download as .bib file

@article{DBLP:journals/ijdtis/Bose11,
  author       = {Utpal Bose},
  title        = {Analyzing the Ethical Dilemma between Protecting Consumer Privacy
                  and Marketing Customer Data},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {2},
  number       = {3},
  pages        = {55--68},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdtis.2011070104},
  doi          = {10.4018/JDTIS.2011070104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/Bose11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/CFGKP11,
  author       = {Amir K. C and
                  Harri Forsgren and
                  Kaj Grahn and
                  Timo Karvi and
                  G{\"{o}}ran Pulkkis},
  title        = {Security and Trust of Public Key Cryptography for {HIP} and {HIP}
                  Multicast},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {2},
  number       = {3},
  pages        = {17--35},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdtis.2011070102},
  doi          = {10.4018/JDTIS.2011070102},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/CFGKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/Cannoy11,
  author       = {Sherrie Drye Cannoy},
  title        = {An Interpretive Study of Critical Issues in Electronic Health Information
                  Exchange},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {2},
  number       = {1},
  pages        = {1--17},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdtis.2011010101},
  doi          = {10.4018/JDTIS.2011010101},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/Cannoy11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/Chen11,
  author       = {Charlie C. Chen},
  title        = {Cloud Computing in Case-Based Pedagogy: An Information Systems Success
                  Perspective},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {2},
  number       = {3},
  pages        = {1--16},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdtis.2011070101},
  doi          = {10.4018/JDTIS.2011070101},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/Chen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/HamidZGG11,
  author       = {Brahim Hamid and
                  Huaxi (Yulin) Zhang and
                  Jacob Geisel and
                  David Gonz{\'{a}}lez},
  title        = {First Experiment on Modeling Safety LifeCycle Process in Railway Systems},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {2},
  number       = {2},
  pages        = {17--39},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdtis.2011040102},
  doi          = {10.4018/JDTIS.2011040102},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/HamidZGG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/NetoV11,
  author       = {Afonso Ara{\'{u}}jo Neto and
                  Marco Vieira},
  title        = {Selecting Secure Web Applications Using Trustworthiness Benchmarking},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {2},
  number       = {2},
  pages        = {1--16},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdtis.2011040101},
  doi          = {10.4018/JDTIS.2011040101},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/NetoV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/ObiniyiAD11,
  author       = {Afolayan Ayodele Obiniyi and
                  Ezugwu E. Absalom and
                  Mohammed Dikko},
  title        = {Network Security and Firewall Technology: {A} Step to Safety of National
                  {IT} Vision},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {2},
  number       = {2},
  pages        = {40--60},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdtis.2011040103},
  doi          = {10.4018/JDTIS.2011040103},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdtis/ObiniyiAD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/OteroEOT11,
  author       = {Angel R. Otero and
                  Abdel Ejnioui and
                  Carlos E. Otero and
                  Gurvirender Tejay},
  title        = {Evaluation of Information Security Controls in Organizations by Grey
                  Relational Analysis},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {2},
  number       = {3},
  pages        = {36--54},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdtis.2011070103},
  doi          = {10.4018/JDTIS.2011070103},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/OteroEOT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/Salam11,
  author       = {Al F. Salam},
  title        = {Semantic Matchmaking and Decision Support System for Dependable Supplier
                  Selection in the Extended Enterprise Supply Chain},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {2},
  number       = {1},
  pages        = {50--80},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdtis.2011010103},
  doi          = {10.4018/JDTIS.2011010103},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/Salam11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/Vannoy11,
  author       = {Sandra A. Vannoy},
  title        = {A Structured Content Analytic Assessment of Business Services Advertisements
                  in the Cloud-Based Web Services Marketplace},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {2},
  number       = {1},
  pages        = {18--49},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdtis.2011010102},
  doi          = {10.4018/JDTIS.2011010102},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/Vannoy11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/CoftaLH10,
  author       = {Piotr Cofta and
                  Hazel Lacoh{\'{e}}e and
                  Paul Hodgson},
  title        = {Incorporating Social Trust into Design Practices for Secure Systems},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {1},
  number       = {4},
  pages        = {1--24},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdtis.2010100101},
  doi          = {10.4018/JDTIS.2010100101},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/CoftaLH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/Dai10,
  author       = {Hua Dai},
  title        = {Service Convenience, Trust and Exchange Relationship in Electronic
                  Mediated Environment {(EME):} An Empirical Study of Chinese Consumers},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {1},
  number       = {1},
  pages        = {1--24},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdtis.2010010101},
  doi          = {10.4018/JDTIS.2010010101},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/Dai10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/DeghailiCKI10,
  author       = {Rima Deghaili and
                  Ali Chehab and
                  Ayman I. Kayssi and
                  Wassim Itani},
  title        = {{STRIDE:} {A} Secure Framework for Modeling Trust-Privacy Tradeoffs
                  in Distributed Computing Environments},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {1},
  number       = {1},
  pages        = {60--81},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdtis.2010010104},
  doi          = {10.4018/JDTIS.2010010104},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/DeghailiCKI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/DionysiouB10,
  author       = {Ioanna Dionysiou and
                  David E. Bakken},
  title        = {A Conceptual Framework for Adaptive and Configurable Activity-Aware
                  Trust in Collaborative Environments},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {1},
  number       = {1},
  pages        = {25--44},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdtis.2010010102},
  doi          = {10.4018/JDTIS.2010010102},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/DionysiouB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/Ekberg10,
  author       = {Jan{-}Erik Ekberg},
  title        = {Mobile Trusted Computing Based on {MTM}},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {1},
  number       = {4},
  pages        = {25--42},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdtis.2010100102},
  doi          = {10.4018/JDTIS.2010100102},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/Ekberg10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/EricksonKU10,
  author       = {G. Scott Erickson and
                  Kurt Komaromi and
                  Fahri Unsal},
  title        = {Social Networks and Trust in e-Commerce},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {1},
  number       = {1},
  pages        = {45--59},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdtis.2010010103},
  doi          = {10.4018/JDTIS.2010010103},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/EricksonKU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/Golan10,
  author       = {Oren Golan},
  title        = {Trust Over the Net: The Case of Israeli Youth},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {1},
  number       = {2},
  pages        = {70--85},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdtis.2010040104},
  doi          = {10.4018/JDTIS.2010040104},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/Golan10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/Grabner-KrauterF10,
  author       = {Sonja Grabner{-}Kr{\"{a}}uter and
                  Rita Faullant},
  title        = {Internet Trust as a Specific Form of Technology Trust and its Influence
                  on Online Banking Adoption},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {1},
  number       = {4},
  pages        = {43--60},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdtis.2010100103},
  doi          = {10.4018/JDTIS.2010100103},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/Grabner-KrauterF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/GuentherM10,
  author       = {Tina Guenther and
                  Guido M{\"{o}}llering},
  title        = {A Framework for Studying the Problem of Trust in Online Settings},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {1},
  number       = {3},
  pages        = {14--31},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdtis.2010070102},
  doi          = {10.4018/JDTIS.2010070102},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/GuentherM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/Lian10,
  author       = {Shiguo Lian},
  title        = {Trust Issues and Solutions in Multimedia Content Distribution},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {1},
  number       = {3},
  pages        = {32--54},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdtis.2010070103},
  doi          = {10.4018/JDTIS.2010070103},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/Lian10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/Liu10,
  author       = {Conghui Liu},
  title        = {Human-Machine Trust Interaction: {A} Technical Overview},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {1},
  number       = {4},
  pages        = {61--74},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdtis.2010100104},
  doi          = {10.4018/JDTIS.2010100104},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/Liu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/LuoZ10,
  author       = {Zongwei Luo and
                  Tianle Zhang},
  title        = {A Mobile Service Platform for Trustworthy E-Learning Service Provisioning},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {1},
  number       = {3},
  pages        = {1--13},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdtis.2010070101},
  doi          = {10.4018/JDTIS.2010070101},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/LuoZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/NetoV10,
  author       = {Afonso Ara{\'{u}}jo Neto and
                  Marco Vieira},
  title        = {Benchmarking Untrustworthiness: An Alternative to Security Measurement},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {1},
  number       = {2},
  pages        = {32--54},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdtis.2010040102},
  doi          = {10.4018/JDTIS.2010040102},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/NetoV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/RobbinsG10,
  author       = {Blaine Robbins and
                  Maria Grigoryeva},
  title        = {Information Technology, Political Institutions, and Generalized Trust:
                  An Empirical Assessment Using Structural Equation Models},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {1},
  number       = {2},
  pages        = {55--69},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdtis.2010040103},
  doi          = {10.4018/JDTIS.2010040103},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/RobbinsG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/SchmidtLCS10,
  author       = {Andreas U. Schmidt and
                  Andreas Leicher and
                  Inhyok Cha and
                  Yogendra Shah},
  title        = {Trusted Platform Validation and Management},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {1},
  number       = {2},
  pages        = {1--31},
  year         = {2010},
  url          = {https://doi.org/10.4018/jdtis.2010040101},
  doi          = {10.4018/JDTIS.2010040101},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/SchmidtLCS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}