{"title":"A Middleware Enforcing Location Privacy in Mobile Platform","authors":"Asma Patel, Esther Palomar","doi":"10.1007/978-3-319-64483-7_3","DOIUrl":"https://doi.org/10.1007/978-3-319-64483-7_3","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122615382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Hatamian, Jetzabel M. Serna, Kai Rannenberg, Bodo Igler
{"title":"FAIR: Fuzzy Alarming Index Rule for Privacy Analysis in Smartphone Apps","authors":"M. Hatamian, Jetzabel M. Serna, Kai Rannenberg, Bodo Igler","doi":"10.1007/978-3-319-64483-7_1","DOIUrl":"https://doi.org/10.1007/978-3-319-64483-7_1","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116325804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Sharing Paradigm for the Personal Cloud","authors":"Paul Tran-Van, N. Anciaux, P. Pucheral","doi":"10.1007/978-3-319-64483-7_12","DOIUrl":"https://doi.org/10.1007/978-3-319-64483-7_12","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115805894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Personal Identity Provider Based on OpenID Connect","authors":"Luigi Lo Iacono, Nils Gruschka, Peter Nehren","doi":"10.1007/978-3-319-64483-7_2","DOIUrl":"https://doi.org/10.1007/978-3-319-64483-7_2","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134198988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kristian Beckers, Daniel Schosser, Sebastian Pape, Peter Schaab
{"title":"A Structured Comparison of Social Engineering Intelligence Gathering Tools","authors":"Kristian Beckers, Daniel Schosser, Sebastian Pape, Peter Schaab","doi":"10.1007/978-3-319-64483-7_15","DOIUrl":"https://doi.org/10.1007/978-3-319-64483-7_15","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114358417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Security Expressiveness of REST-Based API Definition Languages","authors":"Hoai Viet Nguyen, Jan Tolsdorf, Luigi Lo Iacono","doi":"10.1007/978-3-319-64483-7_14","DOIUrl":"https://doi.org/10.1007/978-3-319-64483-7_14","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130219768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Enforcement of Security Properties","authors":"J. Horcas, M. Pinto, L. Fuentes","doi":"10.1007/978-3-319-44341-6_2","DOIUrl":"https://doi.org/10.1007/978-3-319-44341-6_2","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128573935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Far Side of Mobile Application Integrated Development Environments","authors":"Christos Lyvas, N. Pitropakis, C. Lambrinoudakis","doi":"10.1007/978-3-319-44341-6_8","DOIUrl":"https://doi.org/10.1007/978-3-319-44341-6_8","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131096645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a Log Management Infrastructure Using Meta-Network Analysis","authors":"V. Anastopoulos, S. Katsikas","doi":"10.1007/978-3-319-44341-6_7","DOIUrl":"https://doi.org/10.1007/978-3-319-44341-6_7","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133417126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stavros Simou, Christos Kalloniatis, H. Mouratidis, S. Gritzalis
{"title":"Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems","authors":"Stavros Simou, Christos Kalloniatis, H. Mouratidis, S. Gritzalis","doi":"10.1007/978-3-319-44341-6_3","DOIUrl":"https://doi.org/10.1007/978-3-319-44341-6_3","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121122555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}