Evaluating Trustworthiness through Monitoring: The Foot, the Horse and the Elephant (English)
- New search for: Bui, Vinh
- New search for: Verhoeven, Richard
- New search for: Lukkien, Johan
- New search for: Bui, Vinh
- New search for: Verhoeven, Richard
- New search for: Lukkien, Johan
In:
TRUST, International Conference on Trust and Trustworthy Computing, 7
;
188-205
;
2014
-
ISSN:
- Conference paper / Print
-
Title:Evaluating Trustworthiness through Monitoring: The Foot, the Horse and the Elephant
-
Contributors:
-
Published in:Lecture Notes in Computer Science ; 8564 ; 188-205
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2014
-
Size:18 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
DAA-Related APIs in TPM 2.0 RevisitedXi, L. / Yang, K. / Zhang, Z. / Feng, D. et al. | 2014
- 19
-
Continuous Tamper-Proof Logging Using TPM 2.0Sinha, A. / Jia, L. / England, P. / Lorch, J.R. et al. | 2014
- 37
-
Affordable Separation on Embedded Platforms: Soft Reboot Enabled Virtualization on a Dual Mode SystemSchwarz, O. / Gehrmann, C. / Do, V. et al. | 2014
- 55
-
Owner-Centric Protection of Unstructured Data on SmartphonesZhou, Y. / Singh, K. / Jiang, X. et al. | 2014
- 74
-
On Usable Location Privacy for Android with Crowd-RecommendationsHenne, B. / Kater, C. / Smith, M. et al. | 2014
- 83
-
Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFsSchaller, A. / Arul, T. / van der Leest, V. / Katzenbeisser, S. et al. | 2014
- 101
-
Evaluation of Bistable Ring PUFs Using Single Layer Neural NetworksSchuster, D. / Hesselbarth, R. et al. | 2014
- 110
-
Large-Scale Security Analysis of the Web: Challenges and Findingsvan Goethem, T. / Chen, P. / Nikiforakis, N. / Desmet, L. / Joosen, W. et al. | 2014
- 127
-
Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical ArchitectureFall, D. / Okuda, T. / Kadobayashi, Y. / Yamaguchi, S. et al. | 2014
- 143
-
PrivLoc: Preventing Location Tracking in Geofencing ServicesBohli, J.M. / Dobre, D. / Karame, G.O. / Li, W. et al. | 2014
- 161
-
Hiding Transaction Amounts and Balances in BitcoinAndroulaki, E. / Karame, G.O. et al. | 2014
- 179
-
Integration of Data-Minimising Authentication into Authorisation SystemsAyed, D. / Bichsel, P. / Camenisch, J. / Hartog, J.d. et al. | 2014
- 188
-
Evaluating Trustworthiness through Monitoring: The Foot, the Horse and the ElephantBui, V. / Verhoeven, R. / Lukkien, J. et al. | 2014
- 206
-
Extending Development Methodologies with Trustworthiness-By-Design for Socio-Technical Systems (Extended Abstract)Mohammadi, N.G. / Bandyszak, T. / Paulus, S. / Meland, P.H. / Weyer, T. / Pohl, K. et al. | 2014
- 208
-
Challenges in Establishing Trustworthy Collaborations for Timely Responses to Emergency Animal Disease Incidents (Extended Abstract)Zic, J. et al. | 2014
- 210
-
Authentication System Using Encrypted Discrete Biometrics DataOhzeki, K. / Wei, Y. / Kajihara, M. / Takatsuka, M. / Hirakawa, Y. / Sugimoto, T. et al. | 2014
- 212
-
On the Development of Automated Forensic Analysis Methods for Mobile DevicesAndriotis, P. / Tryfonas, T. / Oikonomou, G. / Li, S. / Tzermias, Z. / Xynos, K. / Read, H. / Prevelakis, V. et al. | 2014
- 214
-
A Trusted Knowledge Management System for Multi-layer Threat AnalysisPetsas, T. / Okada, K. / Tazaki, H. / Blanc, G. / Pawlinski, P. et al. | 2014
- 216
-
Diagraming Approach to Structure the Security Lessons: Evaluation Using Cognitive DimensionsHe, Y. / Johnson, C. / Evangelopoulou, M. / Lin, Z.-S. et al. | 2014
- 218
-
TRACER: A Platform for Securing Legacy CodeStroggylos, K. / Mitropoulos, D. / Tzermias, Z. / Papadopoulos, P. / Rafailidis, F. / Spinellis, D. / Ioannidis, S. / Katsaros, P. et al. | 2014
- 220
-
Facilitating Trust on Data through ProvenanceStamatogiannakis, M. / Groth, P. / Bos, H. et al. | 2014
- 222
-
Early Warning Intrusion Detection SystemChatziadam, P. / Askoxylakis, I.G. / Petroulakis, N.E. / Fragkiadakis, A.G. et al. | 2014