The SCEAS System
Navigation Menu

Conferences in DBLP

Trust and Privacy in Digital Business (trustbus)
2006 (conf/trustbus/2006)

  1. Marco Casassa Mont
    Towards Scalable Management of Privacy Obligations in Enterprises. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:1-10 [Conf]
  2. Vassilis Poursalidis, Christos Nikolaou
    A New User-Centric Identity Management Infrastructure for Federated Systems. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:11-20 [Conf]
  3. Dariusz Wawrzyniak
    Information Security Risk Assessment Model for Risk Management. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:21-30 [Conf]
  4. Rainer Böhme, Gaurav Kataria
    On the Limits of Cyber-Insurance. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:31-40 [Conf]
  5. Christian Schläger, Thomas Nowey
    Towards a Risk Management Perspective on AAIs. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:41-50 [Conf]
  6. Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
    Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:51-61 [Conf]
  7. Theodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis K. Katsikas
    A Framework for Exploiting Security Expertise in Application Development. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:62-70 [Conf]
  8. Heiko Roßnagel
    On Diffusion and Confusion - Why Electronic Signatures Have Failed. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:71-80 [Conf]
  9. Wesley Brandi, Martin S. Olivier
    Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:81-90 [Conf]
  10. Marco Casassa Mont, Siani Pearson, Robert Thyne
    A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:91-102 [Conf]
  11. Stelios Dritsas, John Tsaparas, Dimitris Gritzalis
    A Generic Privacy Enhancing Technology for Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:103-113 [Conf]
  12. Sebastian Höhn
    Bringing the User Back into Control: A New Paradigm for Usability in Highly Dynamic Systems. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:114-122 [Conf]
  13. Wynand van Staden, Martin S. Olivier
    Extending SQL to Allow the Active Usage of Purposes. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:123-131 [Conf]
  14. Guoqiang Zhan, Zude Li, Xiaojun Ye, Jianmin Wang
    FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:132-141 [Conf]
  15. Muhammad Alam, Michael Hafner, Ruth Breu, Stefan Unterthiner
    A Framework for Modeling Restricted Delegation in Service Oriented Architecture. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:142-151 [Conf]
  16. Eleni Koutrouli, Aphrodite Tsalgatidou
    Reputation-Based Trust Systems for P2P Applications: Design Issues and Comparison Framework. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:152-161 [Conf]
  17. Jürgen Nützel, Anja Beyer
    Towards Trust in Digital Rights Management Systems. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:162-171 [Conf]
  18. Mikolaj Morzy, Juliusz Jezierski
    Cluster-Based Analysis and Recommendation of Sellers in Online Auctions. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:172-181 [Conf]
  19. M. Wojcik, Jan H. P. Eloff, H. S. Venter
    Trust Model Architecture: Defining Prejudice by Learning. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:182-191 [Conf]
  20. Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks
    How to Protect a Signature from Being Shown to a Third Party. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:192-202 [Conf]
  21. Saeran Kwon, Sang-Ho Lee
    Security Analysis and Improvement for Key Issuing Schemes in ID-Based Cryptography. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:203-212 [Conf]
  22. Rong Du, Colin Boyd, Ernest Foo
    A Secure E-Tender Submission Protocol. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:213-222 [Conf]
  23. René Neumerkel, Stephan Groß
    A Sophisticated Solution for Revealing Attacks on Wireless LAN. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:223-232 [Conf]
  24. Thorsten Neumann, Heiko Tillwick, Martin S. Olivier
    Information Leakage in Ubiquitous Voice-over-IP Communications. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:233-242 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002