Conferences in DBLP
Marco Casassa Mont Towards Scalable Management of Privacy Obligations in Enterprises. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:1-10 [Conf ] Vassilis Poursalidis , Christos Nikolaou A New User-Centric Identity Management Infrastructure for Federated Systems. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:11-20 [Conf ] Dariusz Wawrzyniak Information Security Risk Assessment Model for Risk Management. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:21-30 [Conf ] Rainer Böhme , Gaurav Kataria On the Limits of Cyber-Insurance. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:31-40 [Conf ] Christian Schläger , Thomas Nowey Towards a Risk Management Perspective on AAIs. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:41-50 [Conf ] Alfonso Rodríguez , Eduardo Fernández-Medina , Mario Piattini Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:51-61 [Conf ] Theodoros Balopoulos , Lazaros Gymnopoulos , Maria Karyda , Spyros Kokolakis , Stefanos Gritzalis , Sokratis K. Katsikas A Framework for Exploiting Security Expertise in Application Development. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:62-70 [Conf ] Heiko Roßnagel On Diffusion and Confusion - Why Electronic Signatures Have Failed. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:71-80 [Conf ] Wesley Brandi , Martin S. Olivier Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:81-90 [Conf ] Marco Casassa Mont , Siani Pearson , Robert Thyne A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:91-102 [Conf ] Stelios Dritsas , John Tsaparas , Dimitris Gritzalis A Generic Privacy Enhancing Technology for Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:103-113 [Conf ] Sebastian Höhn Bringing the User Back into Control: A New Paradigm for Usability in Highly Dynamic Systems. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:114-122 [Conf ] Wynand van Staden , Martin S. Olivier Extending SQL to Allow the Active Usage of Purposes. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:123-131 [Conf ] Guoqiang Zhan , Zude Li , Xiaojun Ye , Jianmin Wang FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:132-141 [Conf ] Muhammad Alam , Michael Hafner , Ruth Breu , Stefan Unterthiner A Framework for Modeling Restricted Delegation in Service Oriented Architecture. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:142-151 [Conf ] Eleni Koutrouli , Aphrodite Tsalgatidou Reputation-Based Trust Systems for P2P Applications: Design Issues and Comparison Framework. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:152-161 [Conf ] Jürgen Nützel , Anja Beyer Towards Trust in Digital Rights Management Systems. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:162-171 [Conf ] Mikolaj Morzy , Juliusz Jezierski Cluster-Based Analysis and Recommendation of Sellers in Online Auctions. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:172-181 [Conf ] M. Wojcik , Jan H. P. Eloff , H. S. Venter Trust Model Architecture: Defining Prejudice by Learning. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:182-191 [Conf ] Marek Klonowski , Przemyslaw Kubiak , Miroslaw Kutylowski , Anna Lauks How to Protect a Signature from Being Shown to a Third Party. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:192-202 [Conf ] Saeran Kwon , Sang-Ho Lee Security Analysis and Improvement for Key Issuing Schemes in ID-Based Cryptography. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:203-212 [Conf ] Rong Du , Colin Boyd , Ernest Foo A Secure E-Tender Submission Protocol. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:213-222 [Conf ] René Neumerkel , Stephan Groß A Sophisticated Solution for Revealing Attacks on Wireless LAN. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:223-232 [Conf ] Thorsten Neumann , Heiko Tillwick , Martin S. Olivier Information Leakage in Ubiquitous Voice-over-IP Communications. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:233-242 [Conf ]