default search action
TrustBus 2013: Prague, Czech Republic
- Steven Furnell, Costas Lambrinoudakis, Javier López:
Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings. Lecture Notes in Computer Science 8058, Springer 2013, ISBN 978-3-642-40342-2
Session 1: Access Control and Authentication
- Fernando Pereñíguez-Garcia, Rafael Marín López, Antonio Fernandez Gómez-Skarmeta:
Improving Kerberos Ticket Acquisition during Application Service Access Control. 1-12 - Charalampos Petrou, Christoforos Ntantogian, Christos Xenakis:
A Better Time Approximation Scheme for e-Passports. 13-23
Session 2: Identity and Trust Management
- Nagham Alhadad, Patricia Serrano-Alvarado, Yann Busnel, Philippe Lamarre:
Trust Evaluation of a System for an Activity. 24-36 - Mark Vinkovits, Andreas Zimmermann:
Defining a Trust Framework Design Process. 37-47 - Ebenezer Paintsil, Lothar Fritsch:
Executable Model-Based Risk Analysis Method for Identity Management Systems: Using Hierarchical Colored Petri Nets. 48-61
Session 3: Pivacy and Confidentiality Management
- Alexandre Viejo, Jordi Castellà-Roca, Guillem Rufián:
Preserving the User's Privacy in Social Networking Sites. 62-73 - Konstantina Vemou, Maria Karyda:
A Classification of Factors Influencing Low Adoption of PETs Among SNS Users. 74-84 - Leucio Antonio Cutillo, Antonio Lioy:
Towards Privacy-by-Design Peer-to-Peer Cloud Computing. 85-96 - Mehmet Ercan Nergiz, Muhammed Zahit Gök, Ufuk Özkanli:
Preservation of Utility through Hybrid k-Anonymization. 97-111
Session 4: Information Systems Security
- George Aggelinos, Sokratis K. Katsikas:
The Security of Information Systems in Greek Hospitals. 112-123 - Lisa Rajbhandari, Einar Snekkenes:
Risk Acceptance and Rejection for Threat and Opportunity Risks in Conflicting Incentives Risk Analysis. 124-136
Session 5: Security Policies/Legal Issues
- Efthymios Lalas, Lilian Mitrou, Costas Lambrinoudakis:
ProCAVE: Privacy-Preserving Collection and Authenticity Validation of Online Evidence. 137-148 - Bernhard Heinzle, Steven Furnell:
Assessing the Feasibility of Security Metrics. 149-160
Session 6: Trust and Privacy in Mobile and Pervasive Environments
- Bjørnar Tessem, Lars Nyre:
The Influence of Social Media Use on Willingness to Share Location Information. 161-172 - Alexios Mylonas, Dimitris Gritzalis, Bill Tsoumas, Theodore K. Apostolopoulos:
A Qualitative Metrics Vector for the Awareness of Smartphone Security Users. 173-184 - Michalis Pavlidis, Haralambos Mouratidis, Christos Kalloniatis, Shareeful Islam, Stefanos Gritzalis:
Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions. 185-198
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.