default search action
Search dblp for Publications
export results for "toc:db/conf/trustbus/trustbus2008.bht:"
@inproceedings{DBLP:conf/trustbus/AgudoFL08, author = {Isaac Agudo and M. Carmen Fern{\'{a}}ndez Gago and Javier L{\'{o}}pez}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {A Model for Trust Metrics Analysis}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {28--37}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_4}, doi = {10.1007/978-3-540-85735-8\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/AgudoFL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/AichSM08, author = {Subhendu Aich and Shamik Sural and Arun K. Majumdar}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {118--127}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_12}, doi = {10.1007/978-3-540-85735-8\_12}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/AichSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/AzizAMMM08, author = {Benjamin Aziz and Alvaro Arenas and Fabio Martinelli and Ilaria Matteucci and Paolo Mori}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {Controlling Usage in Business Process Workflows through Fine-Grained Security Policies}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {100--117}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_11}, doi = {10.1007/978-3-540-85735-8\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/AzizAMMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/BaguesMZTMV08, author = {Susana Alcalde Bag{\"{u}}{\'{e}}s and Jelena Mitic and Andreas Zeidler and Marta Tejada and Ignacio R. Mat{\'{\i}}as and Carlos Fern{\'{a}}ndez{-}Valdivielso}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {173--184}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_17}, doi = {10.1007/978-3-540-85735-8\_17}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/BaguesMZTMV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/BrandiOZ08, author = {Wesley Brandi and Martin S. Olivier and Alf Zugenmaier}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {Preservation of Privacy in Thwarting the Ballot Stuffing Scheme}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {195--204}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_19}, doi = {10.1007/978-3-540-85735-8\_19}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/BrandiOZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/ChoiHLKJ08, author = {SuGil Choi and Jin{-}Hee Han and Jeong{-}Woo Lee and Jongpil Kim and Sungik Jun}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {Implementation of a TCG-Based Trusted Computing in Mobile Device}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {18--27}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_3}, doi = {10.1007/978-3-540-85735-8\_3}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/ChoiHLKJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/DebenhamS08, author = {John K. Debenham and Carles Sierra}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {A Map of Trust between Trading Partners}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {8--17}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_2}, doi = {10.1007/978-3-540-85735-8\_2}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/DebenhamS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/FernandezPL08, author = {Eduardo B. Fern{\'{a}}ndez and G{\"{u}}nther Pernul and Mar{\'{\i}}a M. Larrondo{-}Petrie}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {Patterns and Pattern Diagrams for Access Control}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {38--47}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_5}, doi = {10.1007/978-3-540-85735-8\_5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/FernandezPL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/FuchsP08, author = {Ludwig Fuchs and Anton Preis}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {BusiROLE: {A} Model for Integrating Business Roles into Identity Management}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {128--138}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_13}, doi = {10.1007/978-3-540-85735-8\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/FuchsP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/GeneiatakisKL08, author = {Dimitris Geneiatakis and Georgios Kambourakis and Costas Lambrinoudakis}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in {IP} Telephony}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {59--68}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_7}, doi = {10.1007/978-3-540-85735-8\_7}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/GeneiatakisKL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/JosangBXC08, author = {Audun J{\o}sang and Touhid Bhuiyan and Yue Xu and Clive Cox}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {Combining Trust and Reputation Management for Web-Based Services}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {90--99}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_10}, doi = {10.1007/978-3-540-85735-8\_10}, timestamp = {Wed, 30 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/JosangBXC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/KantzavelouK08, author = {Ioanna Kantzavelou and Sokratis K. Katsikas}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {A Generic Intrusion Detection Game Model in {IT} Security}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {151--162}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_15}, doi = {10.1007/978-3-540-85735-8\_15}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/KantzavelouK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/OberenderM08, author = {Jens O. Oberender and Hermann de Meer}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {On the Design Dilemma in Dining Cryptographer Networks}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {163--172}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_16}, doi = {10.1007/978-3-540-85735-8\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/OberenderM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/Pfitzmann08, author = {Andreas Pfitzmann}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {Biometrics - How to Put to Use and How Not at All?}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {1--7}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_1}, doi = {10.1007/978-3-540-85735-8\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/Pfitzmann08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/PingelS08, author = {Franziska Pingel and Sandra Steinbrecher}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {Multilateral Secure Cross-Community Reputation Systems for Internet Communities}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {69--78}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_8}, doi = {10.1007/978-3-540-85735-8\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/PingelS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/RayT08, author = {Indrakshi Ray and Manachai Toahchoodee}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {48--58}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_6}, doi = {10.1007/978-3-540-85735-8\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/RayT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/SuriadiFS08, author = {Suriadi Suriadi and Ernest Foo and Jason Smith}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {A User-Centric Protocol for Conditional Anonymity Revocation}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {185--194}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_18}, doi = {10.1007/978-3-540-85735-8\_18}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/SuriadiFS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/TjhaiPFC08, author = {Gina C. Tjhai and Maria Papadaki and Steven Furnell and Nathan L. Clarke}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {The Problem of False Alarms: Evaluation with Snort and {DARPA} 1999 Dataset}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {139--150}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_14}, doi = {10.1007/978-3-540-85735-8\_14}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/TjhaiPFC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/WierzbickiN08, author = {Adam Wierzbicki and Radoslaw Nielek}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {Fairness Emergence through Simple Reputation}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {79--89}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_9}, doi = {10.1007/978-3-540-85735-8\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/WierzbickiN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2008, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8}, doi = {10.1007/978-3-540-85735-8}, isbn = {978-3-540-85734-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.