A Socio-technical Understanding of TLS Certificate Validation (Englisch)
- Neue Suche nach: Bella, G.
- Neue Suche nach: Giustolisi, R.
- Neue Suche nach: Lenzini, G.
- Neue Suche nach: Bella, G.
- Neue Suche nach: Giustolisi, R.
- Neue Suche nach: Lenzini, G.
- Neue Suche nach: Fernandez-Gago, Carmen
- Neue Suche nach: Martinelli, Fabio
- Neue Suche nach: Pearson, Siani
In:
Trust management
401
;
281-288
;
2013
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:A Socio-technical Understanding of TLS Certificate Validation
-
Beteiligte:Bella, G. ( Autor:in ) / Giustolisi, R. ( Autor:in ) / Lenzini, G. ( Autor:in ) / Fernandez-Gago, Carmen / Martinelli, Fabio / Pearson, Siani
-
Kongress:International conference; 7th, Trust management ; 2013 ; Malaga, Spain
-
Erschienen in:Trust management , 401 ; 281-288
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Heidelberg
-
Erscheinungsdatum:01.01.2013
-
Format / Umfang:8 pages
-
Anmerkungen:Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Symbolic Privacy Analysis through Linkability and DetectabilityVeeningen, M. / de Weger, B. / Zannone, N. et al. | 2013
- 17
-
Middleware-Based Security and Privacy for In-car Integration of Third-Party ApplicationsBouard, A. / Graf, M. / Burgkhardt, D. et al. | 2013
- 33
-
Towards Automated Trust Establishment in Federated Identity ManagementChadwick, D.W. / Hibbert, M. et al. | 2013
- 49
-
On Beta Models with Trust ChainsMuller, T. / Schweitzer, P. et al. | 2013
- 66
-
Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive ReviewAlzaid, H. / Alfaraj, M. / Ries, S. / Josang, A. / Albabtain, M. / Abuhaimed, A. et al. | 2013
- 83
-
Understanding Trust within Online Discussion Boards: Trust Formation in the Absence of Reputation SystemsTalboom, S. / Pierson, J. et al. | 2013
- 100
-
In Cloud We Trust: Risk-Assessment-as-a-ServiceTheoharidou, M. / Tsalis, N. / Gritzalis, D. et al. | 2013
- 111
-
An Empirical Test of How Events Turn the Cognitive Gears of TrustMcKnight, D.H. / Liu, P. et al. | 2013
- 127
-
Reflections on Measuring the Trust Empowerment Potential of a Digital EnvironmentDwyer, N. / Basu, A. / Marsh, S. et al. | 2013
- 136
-
Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak IntegrityPohls, H.C. et al. | 2013
- 151
-
Securing Identity Assignment Using Implicit Certificates in P2P OverlaysCaubet, J. / Esparza, O. / Alins, J. / Mata-Diaz, J. / Soriano, M. et al. | 2013
- 166
-
Impact of Dataset Representation on Smartphone Malware Detection PerformanceAmamra, A. / Talhi, C. / Robert, J.-M. et al. | 2013
- 177
-
Sensor Enhanced Access Control: Extending Traditional Access Control Models with Context-AwarenessJensen, C.D. / Geneser, K. / Willemoes-Wissing, I.C. et al. | 2013
- 193
-
Noninterference Analysis of Delegation Subterfuge in Distributed Authorization SystemsFoley, S.N. et al. | 2013
- 208
-
An Automatic Trust Calculation Based on the Improved Kalman Filter Detection AlgorithmYe, B. / Ghavami, M. / Pervez, A. / Nekovee, M. et al. | 2013
- 223
-
The Method of Trust and Reputation Systems Based on Link Prediction and ClusteringSeo, J. / Choi, S. / Han, S. et al. | 2013
- 231
-
Network-Aware Evaluation Environment for Reputation SystemsCelestini, A. / De Nicola, R. / Tiezzi, F. et al. | 2013
- 239
-
Trust Model for Cloud Based on Cloud CharacteristicsPawar, P.S. / Rajarajan, M. / Dimitrakos, T. / Zisman, A. et al. | 2013
- 247
-
Modeling Reactive Trust Acquisition Using State Transition SystemsGladysh, S. / Herrmann, P. et al. | 2013
- 255
-
Towards Trust-Aware and Self-adaptive SystemsMoyano, F. / Baudry, B. / Lopez, J. et al. | 2013
- 263
-
An Attack-Resistant Hybrid Data-Privatization Method with Low Information LossSingh, K. / Batten, L. et al. | 2013
- 272
-
PERSONA - A Personalized Data Protection FrameworkEgea, M. / Paci, F. / Petrocchi, M. / Zannone, N. et al. | 2013
- 281
-
A Socio-technical Understanding of TLS Certificate ValidationBella, G. / Giustolisi, R. / Lenzini, G. et al. | 2013