Trust, privacy, and security in digital business : 10th international conference ; proceedings (English)
- New search for: TrustBus
- Further information on TrustBus:
- http://d-nb.info/gnd/103851603X
- New search for: Furnell, Steven
- Further information on Furnell, Steven:
- http://d-nb.info/gnd/1038562899
- New search for: Lambrinoudakis, Costas
- Further information on Lambrinoudakis, Costas:
- http://d-nb.info/gnd/133547922
- New search for: Lopez, Javier
- New search for: TrustBus
- Further information on TrustBus:
- http://d-nb.info/gnd/103851603X
2013
-
ISBN:
- Conference Proceedings / Print
-
Title:Trust, privacy, and security in digital business : 10th international conference ; proceedings
-
Contributors:
-
Conference:Trust, privacy, and security in digital business ; 10 ; 2013 ; Prague
TrustBus 2013 ; 10 ; 2013 ; Prague -
Published in:
-
Publisher:
- New search for: Springer
-
Place of publication:Heidelberg , Dordrecht , London , New York, NY , Berlin
-
Publication date:2013
-
Size:X, 198 S.
-
Remarks:24 cm, 332 g
graph. Darst.
Literaturangaben
Digital preservation by Badische Landesbibliothek -
ISBN:
-
Type of media:Conference Proceedings
-
Type of material:Print
-
Language:English
-
Contract number:86303797
- New search for: 85.20 / 54.38 / 54.62
- Further information on Basic classification
- New search for: 381.142
- Further information on Dewey Decimal Classification
-
Keywords:
-
Classification:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Improving Kerberos Ticket Acquisition during Application Service Access ControlPereniguez-Garcia, F. / Marin-Lopez, R. / Skarmeta-Gomez, A.F. et al. | 2013
- 13
-
A Better Time Approximation Scheme for e-PassportsPetrou, C. / Ntantogian, C. / Xenakis, C. et al. | 2013
- 24
-
Trust Evaluation of a System for an ActivityAlhadad, N. / Serrano-Alvarado, P. / Busnel, Y. / Lamarre, P. et al. | 2013
- 37
-
Defining a Trust Framework Design ProcessVinkovits, M. / Zimmermann, A. et al. | 2013
- 48
-
Executable Model-Based Risk Analysis Method for Identity Management Systems: Using Hierarchical Colored Petri NetsPaintsil, E. / Fritsch, L. et al. | 2013
- 62
-
Preserving the User's Privacy in Social Networking SitesViejo, A. / Castella-Roca, J. / Rufian, G. et al. | 2013
- 74
-
A Classification of Factors Influencing Low Adoption of PETs Among SNS UsersVemou, K. / Karyda, M. et al. | 2013
- 85
-
Towards Privacy-by-Design Peer-to-Peer Cloud ComputingCutillo, L.A. / Lioy, A. et al. | 2013
- 97
-
Preservation of Utility through Hybrid k-AnonymizationNergiz, M.E. / Gok, M.Z. / Ozkanli, U. et al. | 2013
- 112
-
The Security of Information Systems in Greek HospitalsAggelinos, G. / Katsikas, S.K. et al. | 2013
- 124
-
Risk Acceptance and Rejection for Threat and Opportunity Risks in Conflicting Incentives Risk AnalysisRajbhandari, L. / Snekkenes, E. et al. | 2013
- 137
-
ProCAVE: Privacy-Preserving Collection and Authenticity Validation of Online EvidenceLalas, E. / Mitrou, L. / Lambrinoudakis, C. et al. | 2013
- 149
-
Assessing the Feasibility of Security MetricsHeinzle, B. / Furnell, S. et al. | 2013
- 161
-
The Influence of Social Media Use on Willingness to Share Location InformationTessem, B. / Nyre, L. et al. | 2013
- 173
-
A Qualitative Metrics Vector for the Awareness of Smartphone Security UsersMylonas, A. / Gritzalis, D. / Tsoumas, B. / Apostolopoulos, T. et al. | 2013
- 185
-
Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust AssumptionsPavlidis, M. / Mouratidis, H. / Kalloniatis, C. / Islam, S. / Gritzalis, S. et al. | 2013