


default search action
STA Workshops 2011: Loutraki, Greece
- Changhoon Lee, Jean-Marc Seigneur, James J. Park, Roland R. Wagner:

Secure and Trust Computing, Data Management, and Applications - STA 2011 Workshops: IWCS 2011 and STAVE 2011, Loutraki, Greece, June 28-30, 2011. Proceedings. Communications in Computer and Information Science 187, Springer 2011, ISBN 978-3-642-22364-8 - Anna Felkner

, Adam Kozakiewicz:
Time Validity in Role-Based Trust Management Inference System. 7-15 - Hervé Chabanne, Céline Chevalier:

Vaudenay's Privacy Model in the Universal Composability Framework: A Case Study. 16-24 - Huiying Duan:

Trust Building and Management for Online File Storage Service. 31-40 - Hai-Cheng Chu, Li-Wei Wu, Hsiang-Ming Yu, Jong Hyuk Park:

Digital Trails Discovering of a GPS Embedded Smart Phone - Take Nokia N78 Running Symbian S60 Ver 3.2 for Example. 41-49 - Kyung Soo Cho, Ji Yeon Lim, Jae Yeol Yoon, Younghee Kim, Seung Kwan Kim, Ung-Mo Kim:

Opinion Mining in MapReduce Framework. 50-55 - Eunjung Lee, Hyung-Ju Joo, Kyong-Jin Seo:

Deterministic Data Binding for Dynamic Service Compositions. 64-70 - Seungwoo Jeon, Gihong Kim, Bonghee Hong, Joonho Kwon:

Integration Retrieval of History Data and Sensing Information Using SGLN Code in Extended RFID Application. 71-76 - Woon Jeung Park:

An Improved Active Learning in Unbalanced Data Classification. 84-93 - Dong-Hwa Park, Hyo-Dal Park:

A Study on Aircraft Position Calculation Algorithm in Compliance with the Wind Parameter. 94-102 - Deok-Gyu Lee, Jong Wook Han:

For Aviation Security Using Surveillance System. 103-115 - Adrian Waller, Ian Sandy, Eamonn Power, Efthimia Aivaloglou

, Charalambos Skianis, Antonio Muñoz, Antonio Maña
:
Policy Based Management for Security in Cloud Computing. 130-137 - Michael Gissing, Ronald Toegl, Martin Pirker

:
Management of Integrity-Enforced Virtual Applications. 138-145 - Siani Pearson

, Marco Casassa Mont
, Gina Kounga:
Enhancing Accountability in the Cloud via Sticky Policies. 146-155 - Hisain Elshaafi

, Jimmy McGibney, Barry P. Mulcahy, Dmitri Botvich:
Enhancement of Critical Financial Infrastructure Protection Using Trust Management. 156-165 - Nick Papanikolaou, Siani Pearson

, Marco Casassa Mont
:
Towards Natural-Language Understanding and Automated Enforcement of Privacy Rules and Regulations in the Cloud: Survey and Bibliography. 166-173 - Antonio Muñoz, Rajesh Harjani, Antonio Maña

, Rodrigo Díaz:
Dynamic Security Monitoring and Accounting for Virtualized Environments. 182-189 - Isaac Agudo

, David Nuñez
, Gabriele Giammatteo, Panagiotis Rizomiliotis, Costas Lambrinoudakis
:
Cryptography Goes to the Cloud. 190-197

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














