


Остановите войну!
for scientists:


default search action
TrustBus 2009: Linz, Austria
- Simone Fischer-Hübner, Costas Lambrinoudakis, Günther Pernul:
Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings. Lecture Notes in Computer Science 5695, Springer 2009, ISBN 978-3-642-03747-4
User Profiling and Privacy in Digital Business
- Marek Kumpost, Vashek Matyas:
User Profiling and Re-identification: Case of University-Wide Network Analysis. 1-10 - Eleni Kosta, Christos Kalloniatis, Lilian Mitrou, Evangelia Kavakli:
Search Engines: Gateway to a New "Panopticon"? 11-21
Privacy Enhancing Technologies and Identity Management
- Elke Franz, Katja Liesebach:
Supporting Local Aliases as Usable Presentation of Secure Pseudonyms. 22-31 - Dominik Herrmann, Florian Scheuer, Philipp Feustel, Thomas Nowey, Hannes Federrath:
A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking. 32-41 - Elli Androulaki, Steven M. Bellovin:
An Anonymous Credit Card System. 42-51
Security and Privacy in Real Life Applications
- Eleni Klaoudatou, Elisavet Konstantinou, Georgios Kambourakis
, Stefanos Gritzalis
:
A Cluster-Based Framework for the Security of Medical Sensor Environments. 52-62 - Alessandro Armando
, Enrico Giunchiglia
, Serena Elisa Ponta:
Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: An Action-Based Approach. 63-72 - Peifung E. Lam, John C. Mitchell, Sharada Sundaram:
A Formalization of HIPAA for a Medical Messaging System. 73-85
Reputation and Security Measurements
- Cristina Alcaraz
, Isaac Agudo
, M. Carmen Fernández Gago, Rodrigo Roman, Gerardo Fernandez, Javier López
:
Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems. 86-94 - José Manuel Torres, Jose M. Sarriegi, Josune Hernantes
, Ana Laugé:
Steering Security through Measurement. 95-104 - Audun Jøsang
, Walter Quattrociocchi
:
Advanced Features in Bayesian Reputation Systems. 105-114
Access Control
- Heiko Klarl, Florian Marmé, Christian Wolff
, Christian Emig, Sebastian Abeck:
An MDA-Based Environment for Generating Access Control Policies. 115-126 - Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula:
An Extended Role-Based Access Control Model for Delegating Obligations. 127-137 - Christopher Alm, Ruben Wolf, Joachim Posegga:
The OPL Access Control Policy Language. 138-148
Authentication and Authorisation
- Yuri Gurevich, Arnab Roy:
Operational Semantics for DKAL: Application and Analysis. 149-158 - Panagiotis Rizomiliotis:
HB - MAC: Improving the Random - HB# Authentication Protocol. 159-168

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.