default search action
TrustBus 2012: Vienna, Austria
- Simone Fischer-Hübner, Sokratis K. Katsikas, Gerald Quirchmayr:
Trust, Privacy and Security in Digital Business - 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedings. Lecture Notes in Computer Science 7449, Springer 2012, ISBN 978-3-642-32286-0
Web Security
- Tobias Hirsch, Luigi Lo Iacono, Ina Wechsung:
How Much Network Security Must Be Visible in Web Browsers? 1-16 - Bastian Braun, Stefan Kucher, Martin Johns, Joachim Posegga:
A User-Level Authentication Scheme to Mitigate Web Session-Based Vulnerabilities. 17-29 - Matteo Maria Casalino, Romuald Thion, Mohand-Said Hacid:
Access Control Configuration for J2EE Web Applications: A Formal Perspective. 30-35
Secure Management Processes and Procedures
- Waldo Delport, Martin S. Olivier:
Cloud Separation: Stuck Inside the Cloud. 36-49 - Kashif Syed, Pavol Zavarsky, Dale Lindskog, Ron Ruhl, Shaun Aghili:
Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process. 50-64
Access Control
- Michael Netter, Sabri Hassan, Günther Pernul:
An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control. 65-78 - Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori:
A Prototype for Enforcing Usage Control Policies Based on XACML. 79-92
Intrusion Detection - Trust
- Francisco Moyano, M. Carmen Fernández Gago, Javier López:
A Conceptual Framework for Trust Models. 93-104 - Vit Bukac, Pavel Tucek, Martin Deutsch:
Advances and Challenges in Standalone Host-Based Intrusion Detection Systems. 105-117
Applied Cryptography
- Marcin Gorawski, Michal Lorek, Michal Gorawski:
Encrypted Adaptive Storage Model - Analysis and Performance Tests. 118-128 - Michael Dorn, Peter Wackersreuther, Christian Böhm:
Efficient Comparison of Encrypted Biometric Templates. 129-142 - Rouzbeh Behnia, Swee-Huay Heng, Che-Sheng Gan:
Short and Efficient Identity-Based Undeniable Signature Scheme. 143-148
Privacy
- Giuseppe D'Acquisto, Marta Flamini, Maurizio Naldi:
Damage Sharing May Not Be Enough: An Analysis of an Ex-ante Regulation Policy for Data Breaches. 149-160 - Hanno Langweg, Lisa Rajbhandari:
Flexible Regulation with Privacy Points. 161-166
Secure Services, Databases and Data Warehouses
- Rainer Schick, Christoph Ruland:
On the Security of the Non-Repudiation of Forwarding Service. 167-178 - Hisain Elshaafi, Jimmy McGibney, Dmitri Botvich:
Profitability and Cost Management of Trustworthy Composite Services. 179-191 - Ta Vinh Thong, Levente Buttyán:
Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases. 192-206 - Ali Salem, Salah Triki, Hanêne Ben-Abdallah, Nouria Harbi, Omar Boussaid:
Verification of Security Coherence in Data Warehouse Designs. 207-213
Presentation of EU Projects (Extended Abstracts)
- Luca Viganò:
Towards the Secure Provision and Consumption in the Internet of Services. 214-215 - Martin Johns, Joachim Posegga:
WebSand: Server-Driven Outbound Web-Application Sandboxing. 216-217 - Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg:
Attribute-Based Credentials for Trust (ABC4Trust). 218-219 - Christina Hochleitner, Cornelia Graf, Peter Wolkerstorfer, Manfred Tscheligi:
uTRUSTit - Usable Trust in the Internet of Things. 220-221 - Roland Rieke, Elsa Prieto, Rodrigo Diaz, Hervé Debar, Andrew Hutchison:
Challenges for Advanced Security Monitoring - The MASSIF Project. 222-223 - Sathya Rao:
Decentralized, Cooperative, Secure and Privacy - Aware Monitoring for Trustworthiness. 224-226 - Panagiotis Rizomiliotis, Charalambos Skianis:
PASSIVE: Policy-Assessed System-Level Security of Sensitive Information Processing in Virtualised Environments. 227-228 - Henrik Plate:
Policy and Security Configuration Management. 229-231 - Markus Wehner, Sven Zeisberg, Nouha Oualha, Alexis Olivereau, Mike Ludwig, Dan Tudose, Laura Gheorghe, Emil Slusanschi, Basil Hess, Felix von Reischach, David Bateman:
Challenges and Current Results of the TWISNet FP7 Project - (Extended Abstract). 232-233 - Miguel Ponce de Leon, Richard Sanders, Per Håkon Meland, Marina Egea, Zeta Dooly:
Aniketos: Challenges and Results. 234-235 - Aggeliki Tsohou, Habin Lee, Yacine Rebahi, Mateusz Khalil, Simon Hohberg:
Ubiquitous Participation Platform for POLicy Making (UbiPOL): Security and Identity Management Considerations. 236-237 - Marc-Michael Bergfeld, Holger Bock, Roderick Bloem, Jan Blonk, Gregory Conti, Kurt Dietrich, Matthias Junk, Florian Schreiner, Stephan Spitz, Johannes Winter:
Secure Embedded Platform with Advanced Process Isolation and Anonymity Capabilities. 238-239
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.