TrustBus B

20 papers

YearTitle / Authors
2008A Generic Intrusion Detection Game Model in IT Security.
Ioanna Kantzavelou, Sokratis K. Katsikas
2008A Map of Trust between Trading Partners.
John K. Debenham, Carles Sierra
2008A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony.
Dimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis
2008A Model for Trust Metrics Analysis.
Isaac Agudo, M. Carmen Fernández Gago, Javier López
2008A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications.
Indrakshi Ray, Manachai Toahchoodee
2008A User-Centric Protocol for Conditional Anonymity Revocation.
Suriadi Suriadi, Ernest Foo, Jason Smith
2008Biometrics - How to Put to Use and How Not at All?.
Andreas Pfitzmann
2008BusiROLE: A Model for Integrating Business Roles into Identity Management.
Ludwig Fuchs, Anton Preis
2008Combining Trust and Reputation Management for Web-Based Services.
Audun Jøsang, Touhid Bhuiyan, Yue Xu, Clive Cox
2008Controlling Usage in Business Process Workflows through Fine-Grained Security Policies.
Benjamin Aziz, Alvaro Arenas, Fabio Martinelli, Ilaria Matteucci, Paolo Mori
2008Fairness Emergence through Simple Reputation.
Adam Wierzbicki, Radoslaw Nielek
2008Implementation of a TCG-Based Trusted Computing in Mobile Device.
SuGil Choi, Jin-Hee Han, Jeong-Woo Lee, Jongpil Kim, Sungik Jun
2008Multilateral Secure Cross-Community Reputation Systems for Internet Communities.
Franziska Pingel, Sandra Steinbrecher
2008Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing.
Susana Alcalde Bagüés, Jelena Mitic, Andreas Zeidler, Marta Tejada, Ignacio R. Matías, Carlos Fernández-Valdivielso
2008On the Design Dilemma in Dining Cryptographer Networks.
Jens O. Oberender, Hermann de Meer
2008Patterns and Pattern Diagrams for Access Control.
Eduardo B. Fernández, Günther Pernul, María M. Larrondo-Petrie
2008Preservation of Privacy in Thwarting the Ballot Stuffing Scheme.
Wesley Brandi, Martin S. Olivier, Alf Zugenmaier
2008Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy.
Subhendu Aich, Shamik Sural, Arun K. Majumdar
2008The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset.
Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke
2008Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings
Steven Furnell, Sokratis K. Katsikas, Antonio Lioy