


default search action
TrustBus 2013: Prague, Czech Republic
- Steven Furnell  , Costas Lambrinoudakis , Costas Lambrinoudakis , Javier López , Javier López : :
 Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings. Lecture Notes in Computer Science 8058, Springer 2013, ISBN 978-3-642-40342-2
Session 1: Access Control and Authentication
- Fernando Pereñíguez-Garcia  , Rafael Marín López, Antonio Fernandez Gómez-Skarmeta: , Rafael Marín López, Antonio Fernandez Gómez-Skarmeta:
 Improving Kerberos Ticket Acquisition during Application Service Access Control. 1-12
- Charalampos Petrou, Christoforos Ntantogian  , Christos Xenakis , Christos Xenakis : :
 A Better Time Approximation Scheme for e-Passports. 13-23
Session 2: Identity and Trust Management
- Nagham Alhadad, Patricia Serrano-Alvarado, Yann Busnel  , Philippe Lamarre: , Philippe Lamarre:
 Trust Evaluation of a System for an Activity. 24-36
- Mark Vinkovits, Andreas Zimmermann: 
 Defining a Trust Framework Design Process. 37-47
- Ebenezer Paintsil, Lothar Fritsch: 
 Executable Model-Based Risk Analysis Method for Identity Management Systems: Using Hierarchical Colored Petri Nets. 48-61
Session 3: Pivacy and Confidentiality Management
- Alexandre Viejo  , Jordi Castellà-Roca, Guillem Rufián: , Jordi Castellà-Roca, Guillem Rufián:
 Preserving the User's Privacy in Social Networking Sites. 62-73
- Konstantina Vemou, Maria Karyda  : :
 A Classification of Factors Influencing Low Adoption of PETs Among SNS Users. 74-84
- Leucio Antonio Cutillo  , Antonio Lioy , Antonio Lioy : :
 Towards Privacy-by-Design Peer-to-Peer Cloud Computing. 85-96
- Mehmet Ercan Nergiz, Muhammed Zahit Gök, Ufuk Özkanli: 
 Preservation of Utility through Hybrid k-Anonymization. 97-111
Session 4: Information Systems Security
- George Aggelinos, Sokratis K. Katsikas  : :
 The Security of Information Systems in Greek Hospitals. 112-123
- Lisa Rajbhandari, Einar Snekkenes: 
 Risk Acceptance and Rejection for Threat and Opportunity Risks in Conflicting Incentives Risk Analysis. 124-136
Session 5: Security Policies/Legal Issues
- Efthymios Lalas, Lilian Mitrou, Costas Lambrinoudakis  : :
 ProCAVE: Privacy-Preserving Collection and Authenticity Validation of Online Evidence. 137-148
- Bernhard Heinzle, Steven Furnell  : :
 Assessing the Feasibility of Security Metrics. 149-160
Session 6: Trust and Privacy in Mobile and Pervasive Environments
- Bjørnar Tessem, Lars Nyre: 
 The Influence of Social Media Use on Willingness to Share Location Information. 161-172
- Alexios Mylonas  , Dimitris Gritzalis, Bill Tsoumas, Theodore K. Apostolopoulos: , Dimitris Gritzalis, Bill Tsoumas, Theodore K. Apostolopoulos:
 A Qualitative Metrics Vector for the Awareness of Smartphone Security Users. 173-184
- Michalis Pavlidis  , Haralambos Mouratidis , Haralambos Mouratidis , Christos Kalloniatis, Shareeful Islam, Stefanos Gritzalis , Christos Kalloniatis, Shareeful Islam, Stefanos Gritzalis : :
 Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions. 185-198

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














