Conferences in DBLP
Ahmed Awad E. Ahmed , Issa Traoré Detecting Computer Intrusions Using Behavioral Biometrics. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Jacek Jonczy , Rolf Haenni Credential Networks: a General Model for Distributed Trust and Authenticity Management. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Hilmi Günes Kayacik , A. Nur Zincir-Heywood , Malcolm I. Heywood Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Glenn Mahoney , Wendy J. Myrvold , Gholamali C. Shoja Generic Reliability Trust Model. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] John Marchesini , Sean W. Smith SHEMP: Secure Hardware Enhanced MyProxy. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Frédéric Massicotte , Mathieu Couture , Yvan Labiche Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq Databases. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Stephen Neville Are Deeper Levels of Risk Analysis a Requirement for Enabling Optimal Tactical Responses in INFOSEC Alert Correlation Systems? [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Kevin Regan , Robin Cohen , Pascal Poupart The Advisor-POMDP: A Principled Approach to Trust through Reputation in Electronic Markets. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Carsten Roecker Providing Personalized Privacy Support in Public Places. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Mike Smit , Michael McAllister , Jacob Slonim Public Trust and Electronic Health Records. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Tim Storer , Ishbel Duncan Electronic Voting in the UK: Current Trends in Deployment , Requirements and Technologies. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Anthony Whitehead Towards Eliminating Steganographic Communication. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Zhengping Wu , Alfred C. Weaver A Privacy Preserving Enhanced Trust Building Mechanism for Web Services. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] George Yee , Larry Korba Specifying Personal Privacy Policies to Avoid Unexpected Outcomes. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Patrick C. K. Hung Towards a Privacy Access Control Model for e-Healthcare Services. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Andreas Hirt , Michael J. Jacobson Jr. , Carey L. Williamson A Practical Buses Protocol for Anonymous Internet Communication. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Jeff Gilchrist Solitary Confinement: Using Artificial Cells to Control Access and Facilitate Apoptosis in Computer Systems. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] George Bakos , Sergey Bratus Ubiquitous Redirection as Access Control Response. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] James Blustein , Daniel L. Silver , Ching-Lung Fu Information Visualization for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Narjès Boufaden , William Elazmeh , Stan Matwin , Nathalie Japkowicz PEEP- Privacy Enforcement in Email Project. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Lars Brückner , Marco Voss MozPETs - a privacy enhanced Web Browser. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Scott Buffett , Luc Comeau , Michael W. Fleming , Bruce Spencer MONOLOGUE: A Tool for Negotiating Exchanges of Private Information in E-Commerce. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Elizabeth Chang , Farookh Khadeer Hussain , Tharam S. Dillon Trustworthiness Measure for e-Service. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Mourad Debbabi , Mohamed Saleh , Chamseddine Talhi , Sami Zhioua Security Analysis of Wireless Java. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Nazar Elfadil Graphical and Digital signature Combination for fulfilling the cultural gap between traditional signature and current smart card digital certificate/signature. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Scott Flinn , Jo Lumsden User Perceptions of Privacy and Security on the Web. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Philip W. L. Fong Link-Time Enforcement of Confined Types for JVM Bytecode. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Ariel Futoransky , Ariel Waissbein Enforcing Privacy in Web Applications. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Weiwei Geng , Scott Flinn , John M. DeDourek Usable Firewall Configuration. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Jiong Zhang , Mohammad Zulkernine Network Intrusion Detection using Random Forests. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:- [Conf ] Sabah S. Al-Fedaghi How to Calculate the Information Privacy. [Citation Graph (0, 0)][DBLP ] PST, 2005, pp:3-13 [Conf ]