


default search action
TrustBus 2010: Bilbao, Spain
- Sokratis K. Katsikas

, Javier López
, Miguel Soriano
:
Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings. Lecture Notes in Computer Science 6264, Springer 2010, ISBN 978-3-642-15151-4
Invited Talk
- Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori

, Artsiom Yautsiukhin
:
Usage Control, Risk and Trust. 1-12
Prevention Systems
- Christoph Fritsch, Michael Netter

, Andreas Reisser, Günther Pernul:
Attacking Image Recognition Captchas - A Naive but Effective Approach. 13-25 - Miltiadis Kandias, Alexios Mylonas

, Nikos Virvilis, Marianthi Theoharidou
, Dimitris Gritzalis:
An Insider Threat Prediction Model. 26-37 - Nikos Vrakas, Dimitris Geneiatakis, Costas Lambrinoudakis

:
A Call Conference Room Interception Attack and Its Detection. 38-44 - Zeeshan Ahmed, Abdessamad Imine, Michaël Rusinowitch:

Safe and Efficient Strategies for Updating Firewall Policies. 45-57
Privacy I
- Javier Parra-Arnau, David Rebollo-Monedero

, Jordi Forné
:
A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression. 58-68 - Siani Pearson

, Yun Shen:
Context-Aware Privacy Design Pattern Selection. 69-80 - Aimin Yu, Dengguo Feng:

Real-Time Remote Attestation with Privacy Protection. 81-92 - Huafei Zhu, Feng Bao:

Private Searching on MapReduce. 93-101
Privacy II
- Wesley Brandi, Martin S. Olivier

:
In Search of Search Privacy. 102-116 - Sébastien Canard, Amandine Jambert:

Untraceability and Profiling Are Not Mutually Exclusive. 117-128 - Audun Jøsang

, Lothar Fritsch, Tobias Mahler:
Privacy Policy Referencing. 129-140
Access Control
- Almudena Alcaide, Esther Palomar

, Ana Isabel González-Tablas Ferreres
, Arturo Ribagorda:
Formal Proof of Cooperativeness in a Multi-Party P2P Content Authentication Protocol. 141-152 - Gina Kounga, Marco Casassa Mont

, Pete Bramhall:
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation. 153-164 - Evangelos Rekleitis

, Panagiotis Rizomiliotis, Stefanos Gritzalis
:
An Agent Based Back-End RFID Tag Management System. 165-176
Security and Trust Concepts
- Tarik Ibrahim, Steven Furnell

, Maria Papadaki
, Nathan L. Clarke
:
Assessing the Usability of End-User Security Software. 177-189 - Luis Enrique Sánchez

, Antonio Santos-Olmo
, Eduardo Fernández-Medina
, Mario Piattini
:
Building ISMS through the Reuse of Knowledge. 190-201 - Soude Fazeli, Alireza Zarghami, Nima Dokoohaki

, Mihhail Matskin:
Mechanizing Social Trust-Aware Recommenders with T-Index Augmented Trustworthiness. 202-213
Security for Dynamic Collaborations
- Christoph Fritsch, Günther Pernul:

Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution. 214-226 - Aggeliki Tsohou, Maria Karyda

, Spyros Kokolakis, Evangelos A. Kiountouzis:
Analyzing Information Security Awareness through Networks of Association. 227-237 - Kun Peng, Feng Bao:

Efficiency Improvement of Homomorphic E-Auction. 238-249

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














