Conferences in DBLP
Digital identity management and protection. [Citation Graph (, )][DBLP ] Topological analysis of network attack vulnerability. [Citation Graph (, )][DBLP ] Paths to creativity in security careers. [Citation Graph (, )][DBLP ] Role-based access control: past, present and future. [Citation Graph (, )][DBLP ] From concept to commercialiazed product: the challenges of privacy technologies. [Citation Graph (, )][DBLP ] Deep packet inspection comes to the desktop. [Citation Graph (, )][DBLP ] Label-based access control (LBAC) in DB2 LUW. [Citation Graph (, )][DBLP ] Computing trust from revision history. [Citation Graph (, )][DBLP ] Analyzing trust in technology strategies. [Citation Graph (, )][DBLP ] Requirements of federated trust management for service-oriented architectures. [Citation Graph (, )][DBLP ] Trust modelling for online transactions: a phishing scenario. [Citation Graph (, )][DBLP ] A comparison of reputation-based trust systems. [Citation Graph (, )][DBLP ] A constraint based role based access control in the SECTET a model-driven approach. [Citation Graph (, )][DBLP ] Protected data paths: delivering sensitive data via untrusted proxies. [Citation Graph (, )][DBLP ] Architecture-based refinements for secure computer systems design. [Citation Graph (, )][DBLP ] A new fair non-repudiation protocol for secure negotiation and contract signing. [Citation Graph (, )][DBLP ] Detecting low-profile scans in TCP anomaly event data. [Citation Graph (, )][DBLP ] Towards a precise semantics for authenticity and trust. [Citation Graph (, )][DBLP ] An improved familiarity measurement for formalization of trust in e-commerce based multiagent systems. [Citation Graph (, )][DBLP ] Trust and security in spatial messaging: FoxyTag, the speed camera case study. [Citation Graph (, )][DBLP ] Modeling trust using transactional, numerical units. [Citation Graph (, )][DBLP ] Building online trust through privacy policies. [Citation Graph (, )][DBLP ] Approximate autoregressive modeling for network attack detection. [Citation Graph (, )][DBLP ] Dynamic inference control in privacy preference enforcement. [Citation Graph (, )][DBLP ] Privacy policy enforcement in enterprises with identity management solutions. [Citation Graph (, )][DBLP ] Formal consistency verification between BPEL process and privacy policy. [Citation Graph (, )][DBLP ] A privacy-preserving UBICOMP architecture. [Citation Graph (, )][DBLP ] Query rewriting for detection of privacy violation through inferencing. [Citation Graph (, )][DBLP ] Privacy in video surveilled areas. [Citation Graph (, )][DBLP ] Is workplace surveillance legal in Canada? [Citation Graph (, )][DBLP ] Bridging the gap: software specification meets intrusion detector. [Citation Graph (, )][DBLP ] Phishing defense against IDN address spoofing attacks. [Citation Graph (, )][DBLP ] Using self-organizing maps to build an attack map for forensic analysis. [Citation Graph (, )][DBLP ] An efficient traitor tracing scheme based on MDS code. [Citation Graph (, )][DBLP ] Using web service enhancements to bridge business trust relationships. [Citation Graph (, )][DBLP ] An incentive compatible reputation mechanism for ubiquitous computing environments. [Citation Graph (, )][DBLP ] Alert correlation survey: framework and techniques. [Citation Graph (, )][DBLP ] Execution monitoring enforcement for limited-memory systems. [Citation Graph (, )][DBLP ] Embedding verifiable information flow analysis. [Citation Graph (, )][DBLP ] Behavior analysis through reputation propagation in a multi-context environment. [Citation Graph (, )][DBLP ] Achieving privacy and security in radio frequency identification. [Citation Graph (, )][DBLP ] Privacy enhanced personalization in e-learning. [Citation Graph (, )][DBLP ] Security hardening of open source software. [Citation Graph (, )][DBLP ] Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET. [Citation Graph (, )][DBLP ] Security crosscutting concerns and AspectJ. [Citation Graph (, )][DBLP ] Privacy-preserving OLAP based on output perturbation across multiple sites. [Citation Graph (, )][DBLP ] A framework ensuring privacy in a distributed environment. [Citation Graph (, )][DBLP ] An early release heuristic for k-anonymization. [Citation Graph (, )][DBLP ] Towards reliable trust establishment in grid: a pre-evaluating set based bias-tuned method for dishonest feedback filtering. [Citation Graph (, )][DBLP ] A trust framework model for situational contexts. [Citation Graph (, )][DBLP ] Trust-based contextual information filtering. [Citation Graph (, )][DBLP ] Trust determination in ad hoc networks. [Citation Graph (, )][DBLP ] MTRMS: mutual-trust-based reputation management system in community-based peer-to-peer environment. [Citation Graph (, )][DBLP ] Towards a model for risk and consent management of personal health information. [Citation Graph (, )][DBLP ] A concept of intelligent biometric-based early detection and warning system. [Citation Graph (, )][DBLP ] The 'how' and 'why' of persistent information security. [Citation Graph (, )][DBLP ] Virtual identities in authentication and authorization scenarios. [Citation Graph (, )][DBLP ] AA-RR: working with authentication and authorization infrastructures. [Citation Graph (, )][DBLP ] Persona concept for web-based identity management. [Citation Graph (, )][DBLP ] Off-line verification of one-time ID in distributed environment. [Citation Graph (, )][DBLP ] Chinese text watermarking based on occlusive components. [Citation Graph (, )][DBLP ] User-credential based role mapping in multi-domain environment. [Citation Graph (, )][DBLP ] Privacy, traceability, and anonymity for content protection. [Citation Graph (, )][DBLP ] Cryptanalysis and improvement on Yang-Shieh authentication schemes. [Citation Graph (, )][DBLP ] Intelligent virus detection on mobile devices. [Citation Graph (, )][DBLP ] Towards an MDA-oriented UML profile for critical infrastructure modeling. [Citation Graph (, )][DBLP ] Using an improved C4.5 for imbalanced dataset of intrusion. [Citation Graph (, )][DBLP ] Secure algorithm for finding K nearest neighbors in distributed databases. [Citation Graph (, )][DBLP ] Design and implementation of a behavioral difference analyzer for network intrusion detection. [Citation Graph (, )][DBLP ] Towards believing answers from cyber-infrastructure-based applications. [Citation Graph (, )][DBLP ] Defining the security required for WAP based mobile ticket sales. [Citation Graph (, )][DBLP ] The quantum nature of cryptography: problems of public-key cryptography and the prospect of quantum key distribution. [Citation Graph (, )][DBLP ] Is privacy an attainable goal?: a review of the privacy rights dilemma. [Citation Graph (, )][DBLP ] Exploiting a buffer overflow using metasploit framework. [Citation Graph (, )][DBLP ] Ontario healthcare privacy act: compliant ad hoc healthcare applications. [Citation Graph (, )][DBLP ] Mobile access control policy for healthcare applications with XACML. [Citation Graph (, )][DBLP ] Mobile healthcare applications: a study of access control. [Citation Graph (, )][DBLP ] Considering role-based conflicts of interest in analyzing and designing e-health systems with goal-oriented methodologies. [Citation Graph (, )][DBLP ] From stakeholder goals to product features: towards a role-based variability framework with decision boundary. [Citation Graph (, )][DBLP ]