


default search action
TrustBus 2014: Munich, Germany
- Claudia Eckert, Sokratis K. Katsikas, Günther Pernul:

Trust, Privacy, and Security in Digital Business - 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings. Lecture Notes in Computer Science 8647, Springer 2014, ISBN 978-3-319-09769-5
Trust Management
- Nazila Gol Mohammadi, Torsten Bandyszak, Micha Moffie, Xiaoyu Chen, Thorsten Weyer, Costas Kalogiros, Bassem I. Nasser, Mike Surridge:

Maintaining Trustworthiness of Socio-Technical Systems at Run-Time. 1-12 - Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg:

Trust Relationships in Privacy-ABCs' Ecosystems. 13-23
Trust Metrics and Evaluation Models
- Mykola Protsenko, Tilo Müller:

Android Malware Detection Based on Software Complexity Metrics. 24-35 - Gerhard Rauchecker, Emrah Yasasin, Guido Schryen:

A Decision Support System for IT Security Incident Management. 36-47 - Nagham Alhadad, Yann Busnel

, Patricia Serrano-Alvarado, Philippe Lamarre:
Trust Evaluation of a System for an Activity with Subjective Logic. 48-59 - Thi-Thuy Linh-Vo, Tran Khanh Dang

, Josef Küng:
A Hash-Based Index Method for Securing Biometric Fuzzy Vaults. 60-71
Privacy and Trust in Cloud Computing
- Youngbae Song, Hyoungshick Kim, Aziz Mohaisen:

A Private Walk in the Clouds: Using End-to-End Encryption between Cloud Applications in a Personal Domain. 72-82 - Marc Walterbusch, Frank Teuteberg

:
Towards an Understanding of the Formation and Retention of Trust in Cloud Computing: A Research Agenda, Proposed Research Methods and Preliminary Results. 83-93 - Kristian Beckers, Stephan Faßbender, Stefanos Gritzalis

, Maritta Heisel, Christos Kalloniatis, Rene Meis
:
Privacy-Aware Cloud Deployment Scenario Selection. 94-105
Security Management
- José Miguel Horcas

, Mónica Pinto
, Lidia Fuentes
:
Closing the Gap between the Specification and Enforcement of Security Policies. 106-118 - Vasilis Stavrou, Miltiadis Kandias, Georgios Karoulas, Dimitris Gritzalis:

Business Process Modeling for Insider Threat Monitoring and Handling. 119-131 - Samuel Paul Kaluvuri, Michele Bezzi, Yves Roudier:

A Quantitative Analysis of Common Criteria Certification Practice. 132-143
Security, Trust and Privacy in Mobile and Pervasive Environments
- Ahmad Abdel-Hafez

, Yue Xu
, Audun Jøsang
:
A Normal-Distribution Based Reputation Model. 144-155 - Lena Reinfelder, Zinaida Benenson, Freya Gassmann

:
Differences between Android and iPhone Users in Their Security and Privacy Awareness. 156-167 - Alfred Kobsa

:
User Acceptance of Footfall Analytics with Aggregated and Anonymized Mobile Phone Data. 168-179 - Jirí Kur, Vashek Matyás:

A Protocol for Intrusion Detection in Location Privacy-Aware Wireless Sensor Networks. 180-190

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














