TrustBus B

25 papers

YearTitle / Authors
2006A Framework for Exploiting Security Expertise in Application Development.
Theodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis K. Katsikas
2006A Framework for Modeling Restricted Delegation in Service Oriented Architecture.
Muhammad Alam, Michael Hafner, Ruth Breu, Stefan Unterthiner
2006A Generic Privacy Enhancing Technology for Pervasive Computing Environments.
Stelios Dritsas, John Tsaparas, Dimitris Gritzalis
2006A New User-Centric Identity Management Infrastructure for Federated Systems.
Vassilis Poursalidis, Christos Nikolaou
2006A Secure E-Tender Submission Protocol.
Rong Du, Colin Boyd, Ernest Foo
2006A Sophisticated Solution for Revealing Attacks on Wireless LAN.
René Neumerkel, Stephan Groß
2006A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises.
Marco Casassa Mont, Siani Pearson, Robert Thyne
2006Bringing the User Back into Control: A New Paradigm for Usability in Highly Dynamic Systems.
Sebastian Höhn
2006Cluster-Based Analysis and Recommendation of Sellers in Online Auctions.
Mikolaj Morzy, Juliusz Jezierski
2006Extending P3P to Facilitate Proxies Which Pose as a Potential Threat to Privacy.
Wesley Brandi, Martin S. Olivier
2006Extending SQL to Allow the Active Usage of Purposes.
Wynand van Staden, Martin S. Olivier
2006FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy.
Guoqiang Zhan, Zude Li, Xiaojun Ye, Jianmin Wang
2006How to Protect a Signature from Being Shown to a Third Party.
Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks
2006Information Leakage in Ubiquitous Voice-over-IP Communications.
Thorsten Neumann, Heiko Tillwick, Martin S. Olivier
2006Information Security Risk Assessment Model for Risk Management.
Dariusz Wawrzyniak
2006On Diffusion and Confusion - Why Electronic Signatures Have Failed.
Heiko Roßnagel
2006On the Limits of Cyber-Insurance.
Rainer Böhme, Gaurav Kataria
2006Reputation-Based Trust Systems for P2P Applications: Design Issues and Comparison Framework.
Eleni Koutrouli, Aphrodite Tsalgatidou
2006Security Analysis and Improvement for Key Issuing Schemes in ID-Based Cryptography.
Saeran Kwon, Sang-Ho Lee
2006Towards Scalable Management of Privacy Obligations in Enterprises.
Marco Casassa Mont
2006Towards Trust in Digital Rights Management Systems.
Jürgen Nützel, Anja Beyer
2006Towards a Risk Management Perspective on AAIs.
Christian Schläger, Thomas Nowey
2006Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes.
Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
2006Trust Model Architecture: Defining Prejudice by Learning.
Marika Wojcik, Jan H. P. Eloff, H. S. Venter
2006Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings
Simone Fischer-Hübner, Steven Furnell, Costas Lambrinoudakis