The SCEAS System
Navigation Menu

Conferences in DBLP

Trust and Privacy in Digital Business (trustbus)
2007 (conf/trustbus/2007)

  1. Alfred Kobsa
    Trustbus'07 Keynote Talk: Privacy Enhanced Personalization. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:1- [Conf]
  2. Günther Pernul, Marco Casassa Mont, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger
    Panel Discussion: Managing Digital Identities - Challenges and Opportunities. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:2- [Conf]
  3. Tuan-Anh Nguyen, David Chadwick, Bassem Nasser
    Recognition of Authority in Virtual Organisations. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:3-13 [Conf]
  4. Florian Kerschbaum, Rafael Deitos, Philip Robinson
    Securing VO Management. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:14-23 [Conf]
  5. Aggeliki Tsohou, Marianthi Theoharidou, Spyros Kokolakis, Dimitris Gritzalis
    Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:24-33 [Conf]
  6. Simon Samwel Msanjila, Hamideh Afsarmanesh
    Specification of the TrustMan System for Assisting Management of VBEs. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:34-43 [Conf]
  7. Min-Hua Shao
    A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third Party. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:44-53 [Conf]
  8. Zhuowei Li, Amitabha Das, Jianying Zhou
    Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:54-64 [Conf]
  9. Tariq Ehsan Elahi, Siani Pearson
    Privacy Assurance: Bridging the Gap Between Preference and Practice. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:65-74 [Conf]
  10. Keshnee Padayachee, Jan H. P. Eloff
    Enhancing Optimistic Access Controls with Usage Control. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:75-82 [Conf]
  11. Alexander Pretschner, Fabio Massacci, Manuel Hilty
    Usage Control in Service-Oriented Architectures. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:83-93 [Conf]
  12. Marco Casassa Mont, Boris Balacheff
    On Device-Based Identity Management in Enterprises. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:94-103 [Conf]
  13. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    Analysis-Level Classes from Secure Business Processes Through Model Transformations. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:104-114 [Conf]
  14. Marijke Coetzee, Jan H. P. Eloff
    A Trust and Context Aware Access Control Model for Web Services Conversations. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:115-124 [Conf]
  15. Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas
    Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:125-134 [Conf]
  16. Georgios Kambourakis, Stefanos Gritzalis
    On Device Authentication in Wireless Networks: Present Issues and Future Challenges. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:135-144 [Conf]
  17. Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin
    The Meaning of Logs. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:145-154 [Conf]
  18. Gerald Quirchmayr, Christopher C. Wills
    Data Protection and Privacy Laws in the Light of RFID and Emerging Technologies. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:155-164 [Conf]
  19. Quan Pham, Adrian McCullagh, Ed Dawson
    Consistency of User Attribute in Federated Systems. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:165-177 [Conf]
  20. Klaus-Peter Fischer, Udo Bleimann, Steven Furnell
    Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:178-189 [Conf]
  21. Thomas Buntrock, Hans-Christian Esperer, Claudia Eckert
    Situation-Based Policy Enforcement. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:190-200 [Conf]
  22. Wynand van Staden, Martin S. Olivier
    Using Purpose Lattices to Facilitate Customisation of Privacy Agreements. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:201-209 [Conf]
  23. Christos Kloukinas, George Spanoudakis
    A Pattern-Driven Framework for Monitoring Security and Dependability. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:210-218 [Conf]
  24. Sibylle Hick, Christoph Ruland
    Security Aspects for Secure Download of Regulated Software. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:219-227 [Conf]
  25. Christos Fragos, Maria Karyda, Evangelos A. Kiountouzis
    Using the Lens of Circuits of Power in Information Systems Security Management. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:228-236 [Conf]
  26. Stefan Schmidt, Robert Steele, Tharam S. Dillon
    Fuzzy Service Selection and Interaction Review in Distributed Electronic Markets. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:237-247 [Conf]
  27. Rachid Saadi, Jean-Marc Pierson, Lionel Brunie
    X316 Security Toolbox for New Generation of Certificate. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:248-258 [Conf]
  28. José Fonseca, Marco Vieira, Henrique Madeira
    Detecting Malicious SQL. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:259-268 [Conf]
  29. Antonio Maña, Antonio Muñoz
    Trusted Code Execution in JavaCard. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:269-279 [Conf]
  30. Detlef Hühnlein, Manuel Bach
    How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:280-289 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002