{"title":"A Decision Support System for IT Security Incident Management","authors":"Gerhard Rauchecker, Emrah Yasasin, G. Schryen","doi":"10.1007/978-3-319-09770-1_4","DOIUrl":"https://doi.org/10.1007/978-3-319-09770-1_4","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121422055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Mohammadi, Torsten Bandyszak, Micha Moffie, Xiaoyu Chen, Thorsten Weyer, Costas Kalogiros, B. Nasser, M. Surridge
{"title":"Maintaining Trustworthiness of Socio-Technical Systems at Run-Time","authors":"N. Mohammadi, Torsten Bandyszak, Micha Moffie, Xiaoyu Chen, Thorsten Weyer, Costas Kalogiros, B. Nasser, M. Surridge","doi":"10.1007/978-3-319-09770-1_1","DOIUrl":"https://doi.org/10.1007/978-3-319-09770-1_1","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"7 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131251497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Normal-Distribution Based Reputation Model","authors":"A. Abdel-Hafez, Yue Xu, A. Jøsang","doi":"10.1007/978-3-319-09770-1_13","DOIUrl":"https://doi.org/10.1007/978-3-319-09770-1_13","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133316164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust Relationships in Privacy-ABCs' Ecosystems","authors":"Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg","doi":"10.1007/978-3-319-09770-1_2","DOIUrl":"https://doi.org/10.1007/978-3-319-09770-1_2","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133994865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hash-Based Index Method for Securing Biometric Fuzzy Vaults","authors":"Thi-Thuy Linh-Vo, T. K. Dang, J. Küng","doi":"10.1007/978-3-319-09770-1_6","DOIUrl":"https://doi.org/10.1007/978-3-319-09770-1_6","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124438583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differences between Android and iPhone Users in Their Security and Privacy Awareness","authors":"Lena Reinfelder, Z. Benenson, Freya Gassmann","doi":"10.1007/978-3-319-09770-1_14","DOIUrl":"https://doi.org/10.1007/978-3-319-09770-1_14","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"66 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126015330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Closing the Gap between the Specification and Enforcement of Security Policies","authors":"J. Horcas, M. Pinto, L. Fuentes","doi":"10.1007/978-3-319-09770-1_10","DOIUrl":"https://doi.org/10.1007/978-3-319-09770-1_10","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116422886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nagham Alhadad, Patricia Serrano-Alvarado, Yann Busnel, Philippe Lamarre
{"title":"Trust Evaluation of a System for an Activity","authors":"Nagham Alhadad, Patricia Serrano-Alvarado, Yann Busnel, Philippe Lamarre","doi":"10.1007/978-3-642-40343-9_3","DOIUrl":"https://doi.org/10.1007/978-3-642-40343-9_3","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114847914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing the Feasibility of Security Metrics","authors":"Bernhard Heinzle, S. Furnell","doi":"10.1007/978-3-642-40343-9_13","DOIUrl":"https://doi.org/10.1007/978-3-642-40343-9_13","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131569148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preserving the User's Privacy in Social Networking Sites","authors":"Alexandre Viejo, Jordi Castellà-Roca, Guillem Rufián","doi":"10.1007/978-3-642-40343-9_6","DOIUrl":"https://doi.org/10.1007/978-3-642-40343-9_6","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134060901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}