|
Conferences in DBLP
- Alfred Kobsa
Trustbus'07 Keynote Talk: Privacy Enhanced Personalization. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:1- [Conf]
- Günther Pernul, Marco Casassa Mont, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger
Panel Discussion: Managing Digital Identities - Challenges and Opportunities. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:2- [Conf]
- Tuan-Anh Nguyen, David Chadwick, Bassem Nasser
Recognition of Authority in Virtual Organisations. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:3-13 [Conf]
- Florian Kerschbaum, Rafael Deitos, Philip Robinson
Securing VO Management. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:14-23 [Conf]
- Aggeliki Tsohou, Marianthi Theoharidou, Spyros Kokolakis, Dimitris Gritzalis
Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:24-33 [Conf]
- Simon Samwel Msanjila, Hamideh Afsarmanesh
Specification of the TrustMan System for Assisting Management of VBEs. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:34-43 [Conf]
- Min-Hua Shao
A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third Party. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:44-53 [Conf]
- Zhuowei Li, Amitabha Das, Jianying Zhou
Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:54-64 [Conf]
- Tariq Ehsan Elahi, Siani Pearson
Privacy Assurance: Bridging the Gap Between Preference and Practice. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:65-74 [Conf]
- Keshnee Padayachee, Jan H. P. Eloff
Enhancing Optimistic Access Controls with Usage Control. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:75-82 [Conf]
- Alexander Pretschner, Fabio Massacci, Manuel Hilty
Usage Control in Service-Oriented Architectures. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:83-93 [Conf]
- Marco Casassa Mont, Boris Balacheff
On Device-Based Identity Management in Enterprises. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:94-103 [Conf]
- Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
Analysis-Level Classes from Secure Business Processes Through Model Transformations. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:104-114 [Conf]
- Marijke Coetzee, Jan H. P. Eloff
A Trust and Context Aware Access Control Model for Web Services Conversations. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:115-124 [Conf]
- Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas
Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:125-134 [Conf]
- Georgios Kambourakis, Stefanos Gritzalis
On Device Authentication in Wireless Networks: Present Issues and Future Challenges. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:135-144 [Conf]
- Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin
The Meaning of Logs. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:145-154 [Conf]
- Gerald Quirchmayr, Christopher C. Wills
Data Protection and Privacy Laws in the Light of RFID and Emerging Technologies. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:155-164 [Conf]
- Quan Pham, Adrian McCullagh, Ed Dawson
Consistency of User Attribute in Federated Systems. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:165-177 [Conf]
- Klaus-Peter Fischer, Udo Bleimann, Steven Furnell
Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:178-189 [Conf]
- Thomas Buntrock, Hans-Christian Esperer, Claudia Eckert
Situation-Based Policy Enforcement. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:190-200 [Conf]
- Wynand van Staden, Martin S. Olivier
Using Purpose Lattices to Facilitate Customisation of Privacy Agreements. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:201-209 [Conf]
- Christos Kloukinas, George Spanoudakis
A Pattern-Driven Framework for Monitoring Security and Dependability. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:210-218 [Conf]
- Sibylle Hick, Christoph Ruland
Security Aspects for Secure Download of Regulated Software. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:219-227 [Conf]
- Christos Fragos, Maria Karyda, Evangelos A. Kiountouzis
Using the Lens of Circuits of Power in Information Systems Security Management. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:228-236 [Conf]
- Stefan Schmidt, Robert Steele, Tharam S. Dillon
Fuzzy Service Selection and Interaction Review in Distributed Electronic Markets. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:237-247 [Conf]
- Rachid Saadi, Jean-Marc Pierson, Lionel Brunie
X316 Security Toolbox for New Generation of Certificate. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:248-258 [Conf]
- José Fonseca, Marco Vieira, Henrique Madeira
Detecting Malicious SQL. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:259-268 [Conf]
- Antonio Maña, Antonio Muñoz
Trusted Code Execution in JavaCard. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:269-279 [Conf]
- Detlef Hühnlein, Manuel Bach
How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:280-289 [Conf]
|