Accepted Papers
3rd International Conference on Trust, Privacy, and Security in Digital Business - TrustBus '06- [#15] Reputation-based Trust Systems for P2P Applications: Design Issues and Classification Framework
Eleni Koutrouli, Aphrodite Tsalgatidou
- [#24] Towards Trust in Digital Rights Management Systems
Juergen Nuetzel, Anja Beyer
- [#25] Extending P3P to Facilitate Proxies which Pose as a Potential Threat to Privacy
Wesley Brandi, Martin Olivier
- [#28] FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy
Guoqiang Zhan, Zude Li, Xiaojun Ye, Jianmin Wang
- [#30] A Framework for Modeling Restricted Delegation in Service Oriented Architecture
Muhammad Alam, Michael Hafner, Ruth Breu, Steffan Unterthiner
- [#35] A Generic Privacy Enhancing Technology for Pervasive Computing Environments
Stelios Dritsas, John Tsaparas, Dimitris Gritzalis
- [#42] A Systemic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises
Marco Casassa Mont, Siani Pearson, Robert Thyne
- [#43] Towards Scalable Management of Privacy Obligations in Enterprises
Marco Casassa Mont
- [#47] A new User-centric Identity Management Infrastructure (IMI) for Federated Systems
V. Poursalidis, C. Nikolaou
- [#48] Information security risk assessment model for risk management
Dariusz Wawrzyniak
- [#51] A Secure E-tender Submission Protocol
Rong Du, Colin Boyd, Ernest Foo
- [#54] On the Limits of Cyber-Insurance
Rainer Boehme, Gaurav Kataria
- [#55] Extending SQL to Allow the Active Usage of Purposes
Wynand van Staden, Martin Olivier
- [#57] Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes
Alfonso Rodr?guez, Eduardo Fern?ndez-Medina, Mario Piattini
- [#58] Bringing the User Back Into Control -- A New Paradigm for Usability in Highly Dynamic Systems
Sebastian H?hn
- [#59] How to Protect a Signature for Being Shown to a Third Party
Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks
- [#68] On Diffusion and Confusion ? Why Electronic Signatures Have Failed.
Heiko Rossnagel
- [#69] A Framework for Exploiting Security Expertise in Application Development
Theodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis Katsikas
- [#75] A Sophisticated Solution for Revealing Attacks on Wireless LAN
René Neumerkel, Stephan Gro?
- [#76] Security Analysis and Improvement for Key Issuing Schemes in ID-based Cryptography
Saeran Kwon, Sang-Ho Lee
- [#77] Cluster-based Analysis and Recommendation of Sellers in Online Auctions
Mikolaj Morzy, Juliusz Jezierski
- [#78] Towards a Risk Management Perspective on AAIs
Christian Schläger, Thomas Nowey,
- [#79] Trust Model Architecture: Defining Prejudice by Learning
Marika Wojcik, Jan Eloff, Hendrik Venter
- [#83] Information leakage in ubiquitous Voice-over-IP
Thorsten Neumann, Heiko Tillwick, Prof M. Olivier
|