Trust and Privacy in Digital Business最新文献

筛选
英文 中文
A Decision Support System for IT Security Incident Management 资讯科技安全事件管理决策支援系统
Trust and Privacy in Digital Business Pub Date : 2014-09-02 DOI: 10.1007/978-3-319-09770-1_4
Gerhard Rauchecker, Emrah Yasasin, G. Schryen
{"title":"A Decision Support System for IT Security Incident Management","authors":"Gerhard Rauchecker, Emrah Yasasin, G. Schryen","doi":"10.1007/978-3-319-09770-1_4","DOIUrl":"https://doi.org/10.1007/978-3-319-09770-1_4","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121422055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Maintaining Trustworthiness of Socio-Technical Systems at Run-Time 在运行时维护社会技术系统的可信度
Trust and Privacy in Digital Business Pub Date : 2014-09-02 DOI: 10.1007/978-3-319-09770-1_1
N. Mohammadi, Torsten Bandyszak, Micha Moffie, Xiaoyu Chen, Thorsten Weyer, Costas Kalogiros, B. Nasser, M. Surridge
{"title":"Maintaining Trustworthiness of Socio-Technical Systems at Run-Time","authors":"N. Mohammadi, Torsten Bandyszak, Micha Moffie, Xiaoyu Chen, Thorsten Weyer, Costas Kalogiros, B. Nasser, M. Surridge","doi":"10.1007/978-3-319-09770-1_1","DOIUrl":"https://doi.org/10.1007/978-3-319-09770-1_1","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"7 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131251497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Normal-Distribution Based Reputation Model 基于正态分布的声誉模型
Trust and Privacy in Digital Business Pub Date : 2014-09-02 DOI: 10.1007/978-3-319-09770-1_13
A. Abdel-Hafez, Yue Xu, A. Jøsang
{"title":"A Normal-Distribution Based Reputation Model","authors":"A. Abdel-Hafez, Yue Xu, A. Jøsang","doi":"10.1007/978-3-319-09770-1_13","DOIUrl":"https://doi.org/10.1007/978-3-319-09770-1_13","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133316164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Trust Relationships in Privacy-ABCs' Ecosystems 隐私abc生态系统中的信任关系
Trust and Privacy in Digital Business Pub Date : 2014-09-02 DOI: 10.1007/978-3-319-09770-1_2
Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg
{"title":"Trust Relationships in Privacy-ABCs' Ecosystems","authors":"Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg","doi":"10.1007/978-3-319-09770-1_2","DOIUrl":"https://doi.org/10.1007/978-3-319-09770-1_2","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133994865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Hash-Based Index Method for Securing Biometric Fuzzy Vaults 一种基于哈希的生物特征模糊保险库安全索引方法
Trust and Privacy in Digital Business Pub Date : 2014-09-02 DOI: 10.1007/978-3-319-09770-1_6
Thi-Thuy Linh-Vo, T. K. Dang, J. Küng
{"title":"A Hash-Based Index Method for Securing Biometric Fuzzy Vaults","authors":"Thi-Thuy Linh-Vo, T. K. Dang, J. Küng","doi":"10.1007/978-3-319-09770-1_6","DOIUrl":"https://doi.org/10.1007/978-3-319-09770-1_6","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124438583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Differences between Android and iPhone Users in Their Security and Privacy Awareness Android和iPhone用户安全与隐私意识的差异
Trust and Privacy in Digital Business Pub Date : 2014-09-02 DOI: 10.1007/978-3-319-09770-1_14
Lena Reinfelder, Z. Benenson, Freya Gassmann
{"title":"Differences between Android and iPhone Users in Their Security and Privacy Awareness","authors":"Lena Reinfelder, Z. Benenson, Freya Gassmann","doi":"10.1007/978-3-319-09770-1_14","DOIUrl":"https://doi.org/10.1007/978-3-319-09770-1_14","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"66 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126015330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Closing the Gap between the Specification and Enforcement of Security Policies 缩小安全策略的规范和执行之间的差距
Trust and Privacy in Digital Business Pub Date : 2014-09-02 DOI: 10.1007/978-3-319-09770-1_10
J. Horcas, M. Pinto, L. Fuentes
{"title":"Closing the Gap between the Specification and Enforcement of Security Policies","authors":"J. Horcas, M. Pinto, L. Fuentes","doi":"10.1007/978-3-319-09770-1_10","DOIUrl":"https://doi.org/10.1007/978-3-319-09770-1_10","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116422886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Trust Evaluation of a System for an Activity 系统对某一活动的信任评估
Trust and Privacy in Digital Business Pub Date : 2013-08-28 DOI: 10.1007/978-3-642-40343-9_3
Nagham Alhadad, Patricia Serrano-Alvarado, Yann Busnel, Philippe Lamarre
{"title":"Trust Evaluation of a System for an Activity","authors":"Nagham Alhadad, Patricia Serrano-Alvarado, Yann Busnel, Philippe Lamarre","doi":"10.1007/978-3-642-40343-9_3","DOIUrl":"https://doi.org/10.1007/978-3-642-40343-9_3","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114847914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Assessing the Feasibility of Security Metrics 评估安全度量的可行性
Trust and Privacy in Digital Business Pub Date : 2013-08-28 DOI: 10.1007/978-3-642-40343-9_13
Bernhard Heinzle, S. Furnell
{"title":"Assessing the Feasibility of Security Metrics","authors":"Bernhard Heinzle, S. Furnell","doi":"10.1007/978-3-642-40343-9_13","DOIUrl":"https://doi.org/10.1007/978-3-642-40343-9_13","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131569148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Preserving the User's Privacy in Social Networking Sites 在社交网站中保护用户隐私
Trust and Privacy in Digital Business Pub Date : 2013-08-28 DOI: 10.1007/978-3-642-40343-9_6
Alexandre Viejo, Jordi Castellà-Roca, Guillem Rufián
{"title":"Preserving the User's Privacy in Social Networking Sites","authors":"Alexandre Viejo, Jordi Castellà-Roca, Guillem Rufián","doi":"10.1007/978-3-642-40343-9_6","DOIUrl":"https://doi.org/10.1007/978-3-642-40343-9_6","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134060901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信