![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
TrustBus 2010: Bilbao, Spain
- Sokratis K. Katsikas
, Javier López
, Miguel Soriano
:
Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings. Lecture Notes in Computer Science 6264, Springer 2010, ISBN 978-3-642-15151-4
Invited Talk
- Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori
, Artsiom Yautsiukhin
:
Usage Control, Risk and Trust. 1-12
Prevention Systems
- Christoph Fritsch, Michael Netter, Andreas Reisser, Günther Pernul:
Attacking Image Recognition Captchas - A Naive but Effective Approach. 13-25 - Miltiadis Kandias, Alexios Mylonas
, Nikos Virvilis, Marianthi Theoharidou
, Dimitris Gritzalis:
An Insider Threat Prediction Model. 26-37 - Nikos Vrakas, Dimitris Geneiatakis, Costas Lambrinoudakis
:
A Call Conference Room Interception Attack and Its Detection. 38-44 - Zeeshan Ahmed, Abdessamad Imine, Michaël Rusinowitch:
Safe and Efficient Strategies for Updating Firewall Policies. 45-57
Privacy I
- Javier Parra-Arnau, David Rebollo-Monedero
, Jordi Forné
:
A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression. 58-68 - Siani Pearson
, Yun Shen:
Context-Aware Privacy Design Pattern Selection. 69-80 - Aimin Yu, Dengguo Feng:
Real-Time Remote Attestation with Privacy Protection. 81-92 - Huafei Zhu, Feng Bao:
Private Searching on MapReduce. 93-101
Privacy II
- Wesley Brandi, Martin S. Olivier
:
In Search of Search Privacy. 102-116 - Sébastien Canard, Amandine Jambert:
Untraceability and Profiling Are Not Mutually Exclusive. 117-128 - Audun Jøsang
, Lothar Fritsch, Tobias Mahler:
Privacy Policy Referencing. 129-140
Access Control
- Almudena Alcaide, Esther Palomar, Ana Isabel González-Tablas Ferreres
, Arturo Ribagorda:
Formal Proof of Cooperativeness in a Multi-Party P2P Content Authentication Protocol. 141-152 - Gina Kounga, Marco Casassa Mont
, Pete Bramhall:
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation. 153-164 - Evangelos Rekleitis
, Panagiotis Rizomiliotis, Stefanos Gritzalis
:
An Agent Based Back-End RFID Tag Management System. 165-176
Security and Trust Concepts
- Tarik Ibrahim, Steven Furnell
, Maria Papadaki
, Nathan L. Clarke
:
Assessing the Usability of End-User Security Software. 177-189 - Luis Enrique Sánchez
, Antonio Santos-Olmo
, Eduardo Fernández-Medina
, Mario Piattini
:
Building ISMS through the Reuse of Knowledge. 190-201 - Soude Fazeli, Alireza Zarghami, Nima Dokoohaki
, Mihhail Matskin:
Mechanizing Social Trust-Aware Recommenders with T-Index Augmented Trustworthiness. 202-213
Security for Dynamic Collaborations
- Christoph Fritsch, Günther Pernul:
Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution. 214-226 - Aggeliki Tsohou, Maria Karyda
, Spyros Kokolakis, Evangelos A. Kiountouzis:
Analyzing Information Security Awareness through Networks of Association. 227-237 - Kun Peng, Feng Bao:
Efficiency Improvement of Homomorphic E-Auction. 238-249
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.