default search action
Search dblp for Publications
export results for "stream:journals/ijdtis:"
@article{DBLP:journals/ijdtis/Bose11, author = {Utpal Bose}, title = {Analyzing the Ethical Dilemma between Protecting Consumer Privacy and Marketing Customer Data}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {2}, number = {3}, pages = {55--68}, year = {2011}, url = {https://doi.org/10.4018/jdtis.2011070104}, doi = {10.4018/JDTIS.2011070104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/Bose11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/CFGKP11, author = {Amir K. C and Harri Forsgren and Kaj Grahn and Timo Karvi and G{\"{o}}ran Pulkkis}, title = {Security and Trust of Public Key Cryptography for {HIP} and {HIP} Multicast}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {2}, number = {3}, pages = {17--35}, year = {2011}, url = {https://doi.org/10.4018/jdtis.2011070102}, doi = {10.4018/JDTIS.2011070102}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/CFGKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/Cannoy11, author = {Sherrie Drye Cannoy}, title = {An Interpretive Study of Critical Issues in Electronic Health Information Exchange}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {2}, number = {1}, pages = {1--17}, year = {2011}, url = {https://doi.org/10.4018/jdtis.2011010101}, doi = {10.4018/JDTIS.2011010101}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/Cannoy11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/Chen11, author = {Charlie C. Chen}, title = {Cloud Computing in Case-Based Pedagogy: An Information Systems Success Perspective}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {2}, number = {3}, pages = {1--16}, year = {2011}, url = {https://doi.org/10.4018/jdtis.2011070101}, doi = {10.4018/JDTIS.2011070101}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/Chen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/HamidZGG11, author = {Brahim Hamid and Huaxi (Yulin) Zhang and Jacob Geisel and David Gonz{\'{a}}lez}, title = {First Experiment on Modeling Safety LifeCycle Process in Railway Systems}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {2}, number = {2}, pages = {17--39}, year = {2011}, url = {https://doi.org/10.4018/jdtis.2011040102}, doi = {10.4018/JDTIS.2011040102}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/HamidZGG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/NetoV11, author = {Afonso Ara{\'{u}}jo Neto and Marco Vieira}, title = {Selecting Secure Web Applications Using Trustworthiness Benchmarking}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {2}, number = {2}, pages = {1--16}, year = {2011}, url = {https://doi.org/10.4018/jdtis.2011040101}, doi = {10.4018/JDTIS.2011040101}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/NetoV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/ObiniyiAD11, author = {Afolayan Ayodele Obiniyi and Ezugwu E. Absalom and Mohammed Dikko}, title = {Network Security and Firewall Technology: {A} Step to Safety of National {IT} Vision}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {2}, number = {2}, pages = {40--60}, year = {2011}, url = {https://doi.org/10.4018/jdtis.2011040103}, doi = {10.4018/JDTIS.2011040103}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdtis/ObiniyiAD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/OteroEOT11, author = {Angel R. Otero and Abdel Ejnioui and Carlos E. Otero and Gurvirender Tejay}, title = {Evaluation of Information Security Controls in Organizations by Grey Relational Analysis}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {2}, number = {3}, pages = {36--54}, year = {2011}, url = {https://doi.org/10.4018/jdtis.2011070103}, doi = {10.4018/JDTIS.2011070103}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/OteroEOT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/Salam11, author = {Al F. Salam}, title = {Semantic Matchmaking and Decision Support System for Dependable Supplier Selection in the Extended Enterprise Supply Chain}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {2}, number = {1}, pages = {50--80}, year = {2011}, url = {https://doi.org/10.4018/jdtis.2011010103}, doi = {10.4018/JDTIS.2011010103}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/Salam11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/Vannoy11, author = {Sandra A. Vannoy}, title = {A Structured Content Analytic Assessment of Business Services Advertisements in the Cloud-Based Web Services Marketplace}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {2}, number = {1}, pages = {18--49}, year = {2011}, url = {https://doi.org/10.4018/jdtis.2011010102}, doi = {10.4018/JDTIS.2011010102}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/Vannoy11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/CoftaLH10, author = {Piotr Cofta and Hazel Lacoh{\'{e}}e and Paul Hodgson}, title = {Incorporating Social Trust into Design Practices for Secure Systems}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {1}, number = {4}, pages = {1--24}, year = {2010}, url = {https://doi.org/10.4018/jdtis.2010100101}, doi = {10.4018/JDTIS.2010100101}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/CoftaLH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/Dai10, author = {Hua Dai}, title = {Service Convenience, Trust and Exchange Relationship in Electronic Mediated Environment {(EME):} An Empirical Study of Chinese Consumers}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {1}, number = {1}, pages = {1--24}, year = {2010}, url = {https://doi.org/10.4018/jdtis.2010010101}, doi = {10.4018/JDTIS.2010010101}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/Dai10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/DeghailiCKI10, author = {Rima Deghaili and Ali Chehab and Ayman I. Kayssi and Wassim Itani}, title = {{STRIDE:} {A} Secure Framework for Modeling Trust-Privacy Tradeoffs in Distributed Computing Environments}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {1}, number = {1}, pages = {60--81}, year = {2010}, url = {https://doi.org/10.4018/jdtis.2010010104}, doi = {10.4018/JDTIS.2010010104}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/DeghailiCKI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/DionysiouB10, author = {Ioanna Dionysiou and David E. Bakken}, title = {A Conceptual Framework for Adaptive and Configurable Activity-Aware Trust in Collaborative Environments}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {1}, number = {1}, pages = {25--44}, year = {2010}, url = {https://doi.org/10.4018/jdtis.2010010102}, doi = {10.4018/JDTIS.2010010102}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/DionysiouB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/Ekberg10, author = {Jan{-}Erik Ekberg}, title = {Mobile Trusted Computing Based on {MTM}}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {1}, number = {4}, pages = {25--42}, year = {2010}, url = {https://doi.org/10.4018/jdtis.2010100102}, doi = {10.4018/JDTIS.2010100102}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/Ekberg10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/EricksonKU10, author = {G. Scott Erickson and Kurt Komaromi and Fahri Unsal}, title = {Social Networks and Trust in e-Commerce}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {1}, number = {1}, pages = {45--59}, year = {2010}, url = {https://doi.org/10.4018/jdtis.2010010103}, doi = {10.4018/JDTIS.2010010103}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/EricksonKU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/Golan10, author = {Oren Golan}, title = {Trust Over the Net: The Case of Israeli Youth}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {1}, number = {2}, pages = {70--85}, year = {2010}, url = {https://doi.org/10.4018/jdtis.2010040104}, doi = {10.4018/JDTIS.2010040104}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/Golan10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/Grabner-KrauterF10, author = {Sonja Grabner{-}Kr{\"{a}}uter and Rita Faullant}, title = {Internet Trust as a Specific Form of Technology Trust and its Influence on Online Banking Adoption}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {1}, number = {4}, pages = {43--60}, year = {2010}, url = {https://doi.org/10.4018/jdtis.2010100103}, doi = {10.4018/JDTIS.2010100103}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/Grabner-KrauterF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/GuentherM10, author = {Tina Guenther and Guido M{\"{o}}llering}, title = {A Framework for Studying the Problem of Trust in Online Settings}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {1}, number = {3}, pages = {14--31}, year = {2010}, url = {https://doi.org/10.4018/jdtis.2010070102}, doi = {10.4018/JDTIS.2010070102}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/GuentherM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/Lian10, author = {Shiguo Lian}, title = {Trust Issues and Solutions in Multimedia Content Distribution}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {1}, number = {3}, pages = {32--54}, year = {2010}, url = {https://doi.org/10.4018/jdtis.2010070103}, doi = {10.4018/JDTIS.2010070103}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/Lian10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/Liu10, author = {Conghui Liu}, title = {Human-Machine Trust Interaction: {A} Technical Overview}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {1}, number = {4}, pages = {61--74}, year = {2010}, url = {https://doi.org/10.4018/jdtis.2010100104}, doi = {10.4018/JDTIS.2010100104}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/Liu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/LuoZ10, author = {Zongwei Luo and Tianle Zhang}, title = {A Mobile Service Platform for Trustworthy E-Learning Service Provisioning}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {1}, number = {3}, pages = {1--13}, year = {2010}, url = {https://doi.org/10.4018/jdtis.2010070101}, doi = {10.4018/JDTIS.2010070101}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/LuoZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/NetoV10, author = {Afonso Ara{\'{u}}jo Neto and Marco Vieira}, title = {Benchmarking Untrustworthiness: An Alternative to Security Measurement}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {1}, number = {2}, pages = {32--54}, year = {2010}, url = {https://doi.org/10.4018/jdtis.2010040102}, doi = {10.4018/JDTIS.2010040102}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/NetoV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/RobbinsG10, author = {Blaine Robbins and Maria Grigoryeva}, title = {Information Technology, Political Institutions, and Generalized Trust: An Empirical Assessment Using Structural Equation Models}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {1}, number = {2}, pages = {55--69}, year = {2010}, url = {https://doi.org/10.4018/jdtis.2010040103}, doi = {10.4018/JDTIS.2010040103}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/RobbinsG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdtis/SchmidtLCS10, author = {Andreas U. Schmidt and Andreas Leicher and Inhyok Cha and Yogendra Shah}, title = {Trusted Platform Validation and Management}, journal = {Int. J. Dependable Trust. Inf. Syst.}, volume = {1}, number = {2}, pages = {1--31}, year = {2010}, url = {https://doi.org/10.4018/jdtis.2010040101}, doi = {10.4018/JDTIS.2010040101}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdtis/SchmidtLCS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.