Can apps play by the COPPA Rules? (Englisch)
- Neue Suche nach: Liccardi, Ilaria
- Neue Suche nach: Bulger, Monica
- Neue Suche nach: Abelson, Hal
- Neue Suche nach: Weitzner, Daniel J.
- Neue Suche nach: Mackay, Wendy
- Neue Suche nach: Liccardi, Ilaria
- Neue Suche nach: Bulger, Monica
- Neue Suche nach: Abelson, Hal
- Neue Suche nach: Weitzner, Daniel J.
- Neue Suche nach: Mackay, Wendy
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:Can apps play by the COPPA Rules?
-
Beteiligte:Liccardi, Ilaria ( Autor:in ) / Bulger, Monica ( Autor:in ) / Abelson, Hal ( Autor:in ) / Weitzner, Daniel J. ( Autor:in ) / Mackay, Wendy ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.07.2014
-
Format / Umfang:1931069 byte
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Welcome message from the general chairMiri, Ali et al. | 2014
- 1
-
Can apps play by the COPPA Rules?Liccardi, Ilaria / Bulger, Monica / Abelson, Hal / Weitzner, Daniel J. / Mackay, Wendy et al. | 2014
- 1
-
Cover spine| 2014
- 1
-
Table of contents| 2014
- 1
-
[Copyright notice]| 2014
- 1
-
[Title page]| 2014
- 10
-
Privacy-preserving mobility-casting in opportunistic networksCostantino, Gianpiero / Martinelli, Fabio / Santi, Paolo et al. | 2014
- 19
-
Undetectable communication: The Online Social Networks caseBeato, Filipe / De Cristofaro, Emiliano / Rasmussen, Kasper B. et al. | 2014
- 27
-
Building privacy-preserving location-based appsSweatt, Brian / Paradesi, Sharon / Liccardi, Ilaria / Kagal, Lalana / Pentlandz, Alex et al. | 2014
- 31
-
“You are what you play”: Breaching privacy and identifying users in online gamingMartinovic, Dragana / Ralevich, Victor / McDougall, Joshua / Perklin, Michael et al. | 2014
- 40
-
Inferring social relationships from technology-level device connectionsNurse, Jason R. C. / Pumphrey, Jess / Gibson-Robinson, Thomas / Goldsmith, Michael / Creese, Sadie et al. | 2014
- 48
-
MindYourPrivacy: Design and implementation of a visualization system for third-party Web trackingTakano, Yuuki / Ohta, Satoshi / Takahashi, Takeshi / Ando, Ruo / Inoue, Tomoya et al. | 2014
- 57
-
A secure two-party bartering protocol using privacy-preserving interval operationsForg, Fabian / Mayer, Daniel / Wetzel, Susanne / Wuller, Stefan / Meyer, Ulrike et al. | 2014
- 67
-
Direct Anonymous Attestation in practice: Implementation and efficient revocationXi, Li / Feng, Dengguo / Qin, Yu / Wei, Feng / Shao, Jianxiong / Yang, Bo et al. | 2014
- 75
-
Using biometric key commitments to prevent unauthorized lending of cryptographic credentialsBissessar, David / Adams, Carlisle / Liu, Dong et al. | 2014
- 84
-
Mining YouTube metadata for detecting privacy invading harassment and misdemeanor videosAggarwal, Nisha / Agrawal, Swati / Sureka, Ashish et al. | 2014
- 94
-
Who Uses Bitcoin? An exploration of the Bitcoin communityBohr, Jeremiah / Bashir, Masooda et al. | 2014
- 102
-
Desperately seeking assurances: Segmenting users by their information-seeking preferencesMorton, Anthony / Sasse, M. Angela et al. | 2014
- 112
-
Private intersection of regular languagesGuanciale, Roberto / Gurov, Dilian / Laud, Peeter et al. | 2014
- 121
-
Enabling privacy through transparencySeneviratne, Oshani / Kagal, Lalana et al. | 2014
- 129
-
Privacy-respecting digital investigationDehghantanha, Ali / Franke, Katrin et al. | 2014
- 139
-
ZARATHUSTRA: Extracting Webinject signatures from banking trojansCriscione, Claudio / Bosatelli, Fabio / Zanero, Stefano / Maggi, Federico et al. | 2014
- 149
-
Quantifying the financial impact of it security breaches on business processesMartin, Clemens / Kadry, Amina / Abu-Shady, Ghada et al. | 2014
- 156
-
Semi-synthetic data set generation for security software evaluationSkopik, Florian / Settanni, Giuseppe / Fiedler, Roman / Friedberg, Ivo et al. | 2014
- 164
-
Towards efficient evaluation of XACML policiesMourad, Azzam / Jebbaoui, Hussein et al. | 2014
- 172
-
A forensic analysis framework for recovering encryption keys and BB10 backup decryptionAl Shehhi, Halima / Abu Hamdi, Dua'a / Asad, IzzEddin / Iqbal, Farkhund et al. | 2014
- 179
-
Continuous authentication using micro-messagesBrocardo, Marcelo Luiz / Traore, Issa et al. | 2014
- 189
-
Improving usability of passphrase authenticationNielsen, Glen / Vedel, Michael / Jensen, Christian D. et al. | 2014
- 199
-
Secure VANET applications with a refined group signatureMamun, Mohammad Saiful Islam / Miyaji, Atsuko et al. | 2014
- 207
-
A study of mnemonic image passwordsChowdhury, Soumyadeb / Poet, Ron / Mackenzie, Lewis et al. | 2014
- 215
-
Data-centric phishing detection based on transparent virtualization technologiesBiedermann, Sebastian / Ruppenthal, Tobias / Katzenbeisser, Stefan et al. | 2014
- 224
-
Clickjuggler: Checking for incomplete defenses against clickjackingTakamatsu, Yusuke / Kono, Kenji et al. | 2014
- 232
-
Identifying users with application-specific command streamsEl Masri, Alaa / Wechsler, Harry / Likarish, Peter / Kang, Brent ByungHoon et al. | 2014
- 239
-
Granularity based flow controlAbahmane, Omar / Logrippo, Luigi et al. | 2014
- 249
-
Automated generation of models for fast and precise detection of HTTP-based malwareZarras, Apostolis / Papadogiannakis, Antonis / Gawlik, Robert / Holz, Thorsten et al. | 2014
- 257
-
P-SPADE: GPU accelerated malware packer detectionGupta, Neha / Naval, Smita / Laxmi, Vijay / Gaur, M.S. / Rajarajan, Muttukrishnan et al. | 2014
- 264
-
Detection and mitigation of malicious JavaScript using information flow controlSayed, Bassam / Traore, Issa / Abdelhalim, Amany et al. | 2014
- 274
-
Secure exams despite malicious managementBella, Giampaolo / Giustolisi, Rosario / Lenzini, Gabriele et al. | 2014
- 282
-
Another free app: Does it have the right intentions?Fazeen, Mohamed / Dantu, Ram et al. | 2014
- 290
-
Specifying and enforcing constraints in dynamic access control policiesEssaouini, Nada / Cuppens, Frederic / Cuppens-Boulahia, Nora / Abou El Kalam, Anas et al. | 2014
- 298
-
Design requirements to counter parallel session attacks in security protocolsJurcut, Anca D. / Coffey, Tom / Dojen, Reiner et al. | 2014
- 306
-
Automata-based approach to design and analyze security policiesKrombi, Wadie / Erradi, Mohammed / Khoumsi, Ahmed et al. | 2014
- 314
-
Efficient verification of data encryption on cloud serversHu, Keji / Zhang, Wensheng et al. | 2014
- 322
-
Assessing cryptographic signature schemes from a legal perspectiveChan, Dan T.F. / Hui, Lucas C.K. / Yiu, S.M. et al. | 2014
- 330
-
Distributed Searchable Symmetric EncryptionBosch, Christoph / Peter, Andreas / Leenders, Bram / Lim, Hoon Wei / Tang, Qiang / Wang, Huaxiong / Hartel, Pieter / Jonker, Willem et al. | 2014
- 338
-
Generalization of socio-rational secret sharing with a new utility functionNojoumian, Mehrdad et al. | 2014
- 342
-
Crypto-assistant: Towards facilitating developer's encryption of sensitive dataRodriguez Garcia, Ricardo / Thorpe, Julie / Vargas Martin, Miguel et al. | 2014
- 347
-
A trust based Information sharing model (TRUISM) in MANET in the presence of uncertaintyBijon, Khalid Zaman / Haque, Md Munirul / Hasan, Ragib et al. | 2014
- 355
-
Validating trust models against realworld data setsSardana, Noel / Cohen, Robin et al. | 2014
- 363
-
Demonstrating the value of credibility modeling for trust-based approaches to online message recommendationSardana, Noel / Cohen, Robin et al. | 2014
- 371
-
TRAAC: Trust and risk aware access controlBurnett, Chris / Chen, Liang / Edwards, Peter / Norman, Timothy J. et al. | 2014
- 379
-
A typed natural deduction calculus to reason about secure trustPrimiero, Giuseppe / Raimondi, Franco et al. | 2014
- 383
-
Two trust networks in one: Using bipolar structures to fuse trust and distrustBistarelli, Stefano / Santini, Francesco et al. | 2014
- 391
-
Communicating and visualising multicriterial trustworthiness under uncertaintyVolk, Florian / Hauke, Sascha / Dieth, Daniel / Muhlhauser, Max et al. | 2014
- 398
-
What can the hashtag #trust tell us about how users conceptualise trust?Dwyer, Natasha / Marsh, Stephen et al. | 2014
- 403
-
Analyzing trustworthiness of virtual machines in data-intensive cloud computingContractor, Dipen / Patel, Dhiren et al. | 2014
- 407
-
i/k-Contact: A context-aware user authentication using physical social trustArimura, Shiori / Fujita, Masahiro / Kobayashi, Shinya / Kani, Junya / Nishigaki, Masakatsu / Shiba, Akira et al. | 2014
- 414
-
Weighting peer reviewersSpalvieri, A. / Mandelli, S. / Magarini, M. / Bianchi, G. et al. | 2014
- 420
-
TrustCV: Reputation-based trust for collectivist digital business ecosystemsIsherwood, Donovan / Coetzee, Marijke et al. | 2014
- 425
-
Author index| 2014
- c1
-
Front cover| 2014