Search dblp for Publications

export results for "toc:db/journals/ijdtis/ijdtis2.bht:"

 download as .bib file

@article{DBLP:journals/ijdtis/Bose11,
  author       = {Utpal Bose},
  title        = {Analyzing the Ethical Dilemma between Protecting Consumer Privacy
                  and Marketing Customer Data},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {2},
  number       = {3},
  pages        = {55--68},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdtis.2011070104},
  doi          = {10.4018/JDTIS.2011070104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/Bose11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/CFGKP11,
  author       = {Amir K. C and
                  Harri Forsgren and
                  Kaj Grahn and
                  Timo Karvi and
                  G{\"{o}}ran Pulkkis},
  title        = {Security and Trust of Public Key Cryptography for {HIP} and {HIP}
                  Multicast},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {2},
  number       = {3},
  pages        = {17--35},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdtis.2011070102},
  doi          = {10.4018/JDTIS.2011070102},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/CFGKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/Cannoy11,
  author       = {Sherrie Drye Cannoy},
  title        = {An Interpretive Study of Critical Issues in Electronic Health Information
                  Exchange},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {2},
  number       = {1},
  pages        = {1--17},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdtis.2011010101},
  doi          = {10.4018/JDTIS.2011010101},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/Cannoy11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/Chen11,
  author       = {Charlie C. Chen},
  title        = {Cloud Computing in Case-Based Pedagogy: An Information Systems Success
                  Perspective},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {2},
  number       = {3},
  pages        = {1--16},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdtis.2011070101},
  doi          = {10.4018/JDTIS.2011070101},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/Chen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/HamidZGG11,
  author       = {Brahim Hamid and
                  Huaxi (Yulin) Zhang and
                  Jacob Geisel and
                  David Gonz{\'{a}}lez},
  title        = {First Experiment on Modeling Safety LifeCycle Process in Railway Systems},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {2},
  number       = {2},
  pages        = {17--39},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdtis.2011040102},
  doi          = {10.4018/JDTIS.2011040102},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/HamidZGG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/NetoV11,
  author       = {Afonso Ara{\'{u}}jo Neto and
                  Marco Vieira},
  title        = {Selecting Secure Web Applications Using Trustworthiness Benchmarking},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {2},
  number       = {2},
  pages        = {1--16},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdtis.2011040101},
  doi          = {10.4018/JDTIS.2011040101},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/NetoV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/ObiniyiAD11,
  author       = {Afolayan Ayodele Obiniyi and
                  Ezugwu E. Absalom and
                  Mohammed Dikko},
  title        = {Network Security and Firewall Technology: {A} Step to Safety of National
                  {IT} Vision},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {2},
  number       = {2},
  pages        = {40--60},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdtis.2011040103},
  doi          = {10.4018/JDTIS.2011040103},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdtis/ObiniyiAD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/OteroEOT11,
  author       = {Angel R. Otero and
                  Abdel Ejnioui and
                  Carlos E. Otero and
                  Gurvirender Tejay},
  title        = {Evaluation of Information Security Controls in Organizations by Grey
                  Relational Analysis},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {2},
  number       = {3},
  pages        = {36--54},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdtis.2011070103},
  doi          = {10.4018/JDTIS.2011070103},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/OteroEOT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/Salam11,
  author       = {Al F. Salam},
  title        = {Semantic Matchmaking and Decision Support System for Dependable Supplier
                  Selection in the Extended Enterprise Supply Chain},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {2},
  number       = {1},
  pages        = {50--80},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdtis.2011010103},
  doi          = {10.4018/JDTIS.2011010103},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/Salam11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdtis/Vannoy11,
  author       = {Sandra A. Vannoy},
  title        = {A Structured Content Analytic Assessment of Business Services Advertisements
                  in the Cloud-Based Web Services Marketplace},
  journal      = {Int. J. Dependable Trust. Inf. Syst.},
  volume       = {2},
  number       = {1},
  pages        = {18--49},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdtis.2011010102},
  doi          = {10.4018/JDTIS.2011010102},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdtis/Vannoy11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics