Correcting a Delegation Protocol for Grids (English)
- New search for: Aziz, B.
- New search for: Aziz, B.
- New search for: Furnell, Steven
- New search for: Lambrinoudakis, Costas
- New search for: Pernul, G.
In:
Trust, privacy and security in digital business: 8th International Conference, TrustBus 2011
6863
;
198-209
;
2011
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Correcting a Delegation Protocol for Grids
-
Contributors:
-
Conference:International conference; 8th, Trust, privacy and security in digital business: 8th International Conference, TrustBus 2011 ; 2011 ; Toulouse, France
-
Published in:Trust, privacy and security in digital business: 8th International Conference, TrustBus 2011 , 6863 ; 198-209LECTURE NOTES IN COMPUTER SCIENCE , 6863 ; 198-209
-
Publisher:
- New search for: Springer
-
Place of publication:Heidelberg
-
Publication date:2011-01-01
-
Size:12 pages
-
Remarks:Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Electrostatic Force Method: Trust Management Method Inspired by the Laws of PhysicsLeszczynski, K. / Zakrzewicz, M. et al. | 2011
- 13
-
Exploiting Proxy-Based Federated Identity Management in Wireless Roaming AccessBerbecaru, D. / Lioy, A. / Aime, M.D. et al. | 2011
- 24
-
Privacy-Preserving Statistical Analysis on Ubiquitous Health DataDrosatos, G. / Efraimidis, P.S. et al. | 2011
- 37
-
A Safety-Preserving Mix Zone for VANETsScheuer, F. / Fuchs, K.-P. / Federrath, H. et al. | 2011
- 49
-
A Secure Smartphone Applications Roll-out SchemeMylonas, A. / Tsoumas, B. / Dritsas, S. / Gritzalis, D. et al. | 2011
- 62
-
Privacy Preserving Tree Augmented Naive Bayesian Multi-party Implementation on Horizontally Partitioned DatabasesSkarkala, M.E. / Maragoudakis, M. / Gritzalis, S. / Mitrou, L. et al. | 2011
- 74
-
Secure Cloud Storage: Available Infrastructures and Architectures Review and EvaluationVirvilis, N. / Dritsas, S. / Gritzalis, D. et al. | 2011
- 86
-
TRAP: Open Decentralized Distributed Spam FilteringShahmehri, N. / Byers, D. / Hiran, R. et al. | 2011
- 98
-
Best Effort and Practice Activation Codesde Koning Gans, G. / Verheul, E.R. et al. | 2011
- 113
-
Decentralized Generation of Multiple, Uncorrelatable Pseudonyms without Trusted Third PartiesLehnhardt, J. / Spalka, A. et al. | 2011
- 125
-
Mining Roles from Web Application Usage PatternsGal-Oz, N. / Gonen, Y. / Yahalom, R. / Gudes, E. / Rozenberg, B. / Shmueli, E. et al. | 2011
- 138
-
A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc NetworksDarra, E. / Ntantogian, C. / Xenakis, C. / Katsikas, S. et al. | 2011
- 150
-
An Evaluation of Anomaly-Based Intrusion Detection Engines for Mobile Ad Hoc NetworksPanos, C. / Xenakis, C. / Stavrakakis, I. et al. | 2011
- 161
-
Privacy Measures for Free Text Documents: Bridging the Gap between Theory and PracticeGeng, L. / You, Y. / Wang, Y. / Liu, H. et al. | 2011
- 174
-
Towards Legal Privacy Risk Assessment and SpecificationPaintsil, E. et al. | 2011
- 186
-
Privacy-Preserving Storage and Access of Medical Data through Pseudonymization and EncryptionHeurix, J. / Neubauer, T. et al. | 2011
- 198
-
Correcting a Delegation Protocol for GridsAziz, B. et al. | 2011
- 210
-
Risk Assessment for Mobile DevicesLedermuller, T. / Clarke, N.L. et al. | 2011