Analyzing Information Security Awareness through Networks of Association (English)
- New search for: Tsohou, Aggeliki
- New search for: Karyda, Maria
- New search for: Kokolakis, Spyros
- New search for: Kiountouzis, Evangelos
- New search for: Tsohou, Aggeliki
- New search for: Karyda, Maria
- New search for: Kokolakis, Spyros
- New search for: Kiountouzis, Evangelos
In:
Trust, Privacy and Security in Digital Business
7
;
227-237
;
2010
- Article/Chapter (Book) / Electronic Resource
-
Title:Analyzing Information Security Awareness through Networks of Association
-
Contributors:Tsohou, Aggeliki ( author ) / Karyda, Maria ( author ) / Kokolakis, Spyros ( author ) / Kiountouzis, Evangelos ( author )
-
Published in:Trust, Privacy and Security in Digital Business , 7 ; 227-237Lecture Notes in Computer Science ; 6264, 7 ; 227-237
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2010-01-01
-
Size:11 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Usage Control, Risk and TrustKrautsevich, Leanid / Lazouski, Aliaksandr / Martinelli, Fabio / Mori, Paolo / Yautsiukhin, Artsiom et al. | 2010
- 13
-
Attacking Image Recognition CaptchasFritsch, Christoph / Netter, Michael / Reisser, Andreas / Pernul, Günther et al. | 2010
- 26
-
An Insider Threat Prediction ModelKandias, Miltiadis / Mylonas, Alexios / Virvilis, Nikos / Theoharidou, Marianthi / Gritzalis, Dimitris et al. | 2010
- 38
-
A Call Conference Room Interception Attack and Its DetectionVrakas, Nikos / Geneiatakis, Dimitris / Lambrinoudakis, Costas et al. | 2010
- 45
-
Safe and Efficient Strategies for Updating Firewall PoliciesAhmed, Zeeshan / Imine, Abdessamad / Rusinowitch, Michaël et al. | 2010
- 58
-
A Privacy-Preserving Architecture for the Semantic Web Based on Tag SuppressionParra-Arnau, Javier / Rebollo-Monedero, David / Forné, Jordi et al. | 2010
- 69
-
Context-Aware Privacy Design Pattern SelectionPearson, Siani / Shen, Yun et al. | 2010
- 81
-
Real-Time Remote Attestation with Privacy ProtectionYu, Aimin / Feng, Dengguo et al. | 2010
- 93
-
Private Searching on MapReduceZhu, Huafei / Bao, Feng et al. | 2010
- 102
-
In Search of Search PrivacyBrandi, Wesley / Olivier, Martin S. et al. | 2010
- 117
-
Untraceability and Profiling Are Not Mutually ExclusiveCanard, Sébastien / Jambert, Amandine et al. | 2010
- 129
-
Privacy Policy ReferencingJøsang, Audun / Fritsch, Lothar / Mahler, Tobias et al. | 2010
- 141
-
Formal Proof of Cooperativeness in a Multi–Party P2P Content Authentication ProtocolAlcaide, Almudena / Palomar, Esther / González–Tablas, Ana I. / Ribagorda, Arturo et al. | 2010
- 153
-
Extending XACML Access Control Architecture for Allowing Preference-Based AuthorisationKounga, Gina / Mont, Marco Casassa / Bramhall, Pete et al. | 2010
- 165
-
An Agent Based Back-End RFID Tag Management SystemRekleitis, Evangelos / Rizomiliotis, Panagiotis / Gritzalis, Stefanos et al. | 2010
- 177
-
Assessing the Usability of End-User Security SoftwareIbrahim, Tarik / Furnell, Steven M. / Papadaki, Maria / Clarke, Nathan L. et al. | 2010
- 190
-
Building ISMS through the Reuse of KnowledgeSánchez, Luis Enrique / Santos-Olmo, Antonio / Fernández-Medina, Eduardo / Piattini, Mario et al. | 2010
- 202
-
Mechanizing Social Trust-Aware Recommenders with T-Index Augmented TrustworthinessFazeli, Soude / Zarghami, Alireza / Dokoohaki, Nima / Matskin, Mihhail et al. | 2010
- 214
-
Security for Dynamic Service-Oriented eCollaborationFritsch, Christoph / Pernul, Günther et al. | 2010
- 227
-
Analyzing Information Security Awareness through Networks of AssociationTsohou, Aggeliki / Karyda, Maria / Kokolakis, Spyros / Kiountouzis, Evangelos et al. | 2010
- 238
-
Efficiency Improvement of Homomorphic E-AuctionPeng, Kun / Bao, Feng et al. | 2010