Trust and Privacy in Digital Business最新文献

筛选
英文 中文
An Enhanced Cyber Attack Attribution Framework 一个增强的网络攻击归因框架
Trust and Privacy in Digital Business Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98385-1_15
N. Pitropakis, E. Panaousis, Alkiviadis Giannakoulias, George Kalpakis, Rodrigo Diaz Rodriguez, P. Sarigiannidis
{"title":"An Enhanced Cyber Attack Attribution Framework","authors":"N. Pitropakis, E. Panaousis, Alkiviadis Giannakoulias, George Kalpakis, Rodrigo Diaz Rodriguez, P. Sarigiannidis","doi":"10.1007/978-3-319-98385-1_15","DOIUrl":"https://doi.org/10.1007/978-3-319-98385-1_15","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121694025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Evaluating the Privacy Properties of Secure VoIP Metadata 评估安全VoIP元数据的隐私属性
Trust and Privacy in Digital Business Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98385-1_5
João S. Resende, Patrícia R. Sousa, L. Antunes
{"title":"Evaluating the Privacy Properties of Secure VoIP Metadata","authors":"João S. Resende, Patrícia R. Sousa, L. Antunes","doi":"10.1007/978-3-319-98385-1_5","DOIUrl":"https://doi.org/10.1007/978-3-319-98385-1_5","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122560141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Access Control Requirements for Physical Spaces Protected by Virtual Perimeters 虚拟周界保护物理空间的访问控制需求
Trust and Privacy in Digital Business Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98385-1_13
B. Greaves, M. Coetzee, W. S. Leung
{"title":"Access Control Requirements for Physical Spaces Protected by Virtual Perimeters","authors":"B. Greaves, M. Coetzee, W. S. Leung","doi":"10.1007/978-3-319-98385-1_13","DOIUrl":"https://doi.org/10.1007/978-3-319-98385-1_13","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123433008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Assessment 迈向有效的私隐影响及风险评估方法:风险评估
Trust and Privacy in Digital Business Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98385-1_7
Majed Alshammari, A. Simpson
{"title":"Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Assessment","authors":"Majed Alshammari, A. Simpson","doi":"10.1007/978-3-319-98385-1_7","DOIUrl":"https://doi.org/10.1007/978-3-319-98385-1_7","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128239972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Three Tales of Disillusion: Benchmarking Property Preserving Encryption Schemes 幻灭的三个故事:对保属性加密方案进行基准测试
Trust and Privacy in Digital Business Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98385-1_4
Frank Pallas, M. Grambow
{"title":"Three Tales of Disillusion: Benchmarking Property Preserving Encryption Schemes","authors":"Frank Pallas, M. Grambow","doi":"10.1007/978-3-319-98385-1_4","DOIUrl":"https://doi.org/10.1007/978-3-319-98385-1_4","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126236246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
PERSUADED: Fighting Social Engineering Attacks with a Serious Game 说服:用一个严肃的游戏对抗社会工程攻击
Trust and Privacy in Digital Business Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98385-1_8
Dina Aladawy, Kristian Beckers, Sebastian Pape
{"title":"PERSUADED: Fighting Social Engineering Attacks with a Serious Game","authors":"Dina Aladawy, Kristian Beckers, Sebastian Pape","doi":"10.1007/978-3-319-98385-1_8","DOIUrl":"https://doi.org/10.1007/978-3-319-98385-1_8","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128386308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Towards the Definition of a Security Incident Response Modelling Language 安全事件响应建模语言的定义探讨
Trust and Privacy in Digital Business Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98385-1_14
Myrsini Athinaiou, H. Mouratidis, Theo Fotis, Michalis Pavlidis, E. Panaousis
{"title":"Towards the Definition of a Security Incident Response Modelling Language","authors":"Myrsini Athinaiou, H. Mouratidis, Theo Fotis, Michalis Pavlidis, E. Panaousis","doi":"10.1007/978-3-319-98385-1_14","DOIUrl":"https://doi.org/10.1007/978-3-319-98385-1_14","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129584491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Biometrically Linking Document Leakage to the Individuals Responsible 通过生物识别技术将文件泄露与责任人联系起来
Trust and Privacy in Digital Business Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98385-1_10
Abdulrahman Alruban, N. Clarke, Fudong Li, S. Furnell
{"title":"Biometrically Linking Document Leakage to the Individuals Responsible","authors":"Abdulrahman Alruban, N. Clarke, Fudong Li, S. Furnell","doi":"10.1007/978-3-319-98385-1_10","DOIUrl":"https://doi.org/10.1007/978-3-319-98385-1_10","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133303168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Towards Blockchain-Based Identity and Access Management for Internet of Things in Enterprises 基于区块链的企业物联网身份与访问管理
Trust and Privacy in Digital Business Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98385-1_12
M. Nuss, A. Puchta, Michael Kunz
{"title":"Towards Blockchain-Based Identity and Access Management for Internet of Things in Enterprises","authors":"M. Nuss, A. Puchta, Michael Kunz","doi":"10.1007/978-3-319-98385-1_12","DOIUrl":"https://doi.org/10.1007/978-3-319-98385-1_12","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133418092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
The General Data Protection Regulation (GDPR) Era: Ten Steps for Compliance of Data Processors and Data Controllers 通用数据保护条例(GDPR)时代:数据处理者和数据控制者的十个合规步骤
Trust and Privacy in Digital Business Pub Date : 2018-09-05 DOI: 10.1007/978-3-319-98385-1_1
C. Lambrinoudakis
{"title":"The General Data Protection Regulation (GDPR) Era: Ten Steps for Compliance of Data Processors and Data Controllers","authors":"C. Lambrinoudakis","doi":"10.1007/978-3-319-98385-1_1","DOIUrl":"https://doi.org/10.1007/978-3-319-98385-1_1","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133448910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信