![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 31 matches
- 2007
- Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas:
Design and Implementation of Distributed Access Control Infrastructures for Federations of Autonomous Domains. TrustBus 2007: 125-134 - Thomas Buntrock, Hans-Christian Esperer, Claudia Eckert:
Situation-Based Policy Enforcement. TrustBus 2007: 190-200 - Marijke Coetzee, Jan H. P. Eloff:
A Trust and Context Aware Access Control Model for Web Services Conversations. TrustBus 2007: 115-124 - Tariq Ehsan Elahi, Siani Pearson
:
Privacy Assurance: Bridging the Gap Between Preference and Practice. TrustBus 2007: 65-74 - Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin
:
The Meaning of Logs. TrustBus 2007: 145-154 - Klaus Peter Fischer, Udo Bleimann, Steven Furnell:
Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes. TrustBus 2007: 178-189 - José Fonseca, Marco Vieira, Henrique Madeira:
Detecting Malicious SQL. TrustBus 2007: 259-268 - Christos Fragos, Maria Karyda, Evangelos A. Kiountouzis:
Using the Lens of Circuits of Power in Information Systems Security Management. TrustBus 2007: 228-236 - Sibylle Hick, Christoph Ruland:
Security Aspects for Secure Download of Regulated Software. TrustBus 2007: 219-227 - Detlef Hühnlein, Manuel Bach:
How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards. TrustBus 2007: 280-289 - Georgios Kambourakis, Stefanos Gritzalis:
On Device Authentication in Wireless Networks: Present Issues and Future Challenges. TrustBus 2007: 135-144 - Florian Kerschbaum, Rafael Deitos, Philip Robinson:
Securing VO Management. TrustBus 2007: 14-23 - Christos Kloukinas
, George Spanoudakis:
A Pattern-Driven Framework for Monitoring Security and Dependability. TrustBus 2007: 210-218 - Alfred Kobsa:
Trustbus'07 Keynote Talk: Privacy Enhanced Personalization. TrustBus 2007: 1 - Zhuowei Li, Amitabha Das, Jianying Zhou:
Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. TrustBus 2007: 54-64 - Antonio Maña
, Antonio Muñoz:
Trusted Code Execution in JavaCard. TrustBus 2007: 269-279 - Marco Casassa Mont, Boris Balacheff:
On Device-Based Identity Management in Enterprises. TrustBus 2007: 94-103 - Simon Samwel Msanjila, Hamideh Afsarmanesh:
Specification of the TrustMan System for Assisting Management of VBEs. TrustBus 2007: 34-43 - Tuan-Anh Nguyen, David W. Chadwick, Bassem Nasser:
Recognition of Authority in Virtual Organisations. TrustBus 2007: 3-13 - Keshnee Padayachee
, Jan H. P. Eloff:
Enhancing Optimistic Access Controls with Usage Control. TrustBus 2007: 75-82 - Günther Pernul, Marco Casassa Mont
, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger:
Panel Discussion: Managing Digital Identities - Challenges and Opportunities. TrustBus 2007: 2 - Quan Pham, Adrian McCullagh, Ed Dawson:
Consistency of User Attribute in Federated Systems. TrustBus 2007: 165-177 - Alexander Pretschner, Fabio Massacci, Manuel Hilty:
Usage Control in Service-Oriented Architectures. TrustBus 2007: 83-93 - Gerald Quirchmayr, Christopher C. Wills
:
Data Protection and Privacy Laws in the Light of RFID and Emerging Technologies. TrustBus 2007: 155-164 - Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini:
Analysis-Level Classes from Secure Business Processes Through Model Transformations. TrustBus 2007: 104-114 - Rachid Saadi, Jean-Marc Pierson
, Lionel Brunie:
X316 Security Toolbox for New Generation of Certificate. TrustBus 2007: 248-258 - Stefan Schmidt, Robert Steele, Tharam S. Dillon:
Fuzzy Service Selection and Interaction Review in Distributed Electronic Markets. TrustBus 2007: 237-247 - Min-Hua Shao:
A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third Party. TrustBus 2007: 44-53 - Wynand van Staden
, Martin S. Olivier
:
Using Purpose Lattices to Facilitate Customisation of Privacy Agreements. TrustBus 2007: 201-209 - Aggeliki Tsohou, Marianthi Theoharidou
, Spyros Kokolakis, Dimitris Gritzalis:
Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship. TrustBus 2007: 24-33
skipping 1 more match
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-20 07:37 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint