Accepted papers
TrustBus 2012 - accepted papers:
- A Conceptual Framework for Trust Models
Javier Lopez, Francisco Moyano, Carmen Fernandez-Gago, - A Prototype for Enforcing Usage Control Policies Based on XACML
Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, - A User-level Authentication Scheme to Mitigate Web Session-Based Vulnerabilities
Bastian Braun, Stefan Kucher, Martin Johns, Joachim Posegga, - Access Control Configuration for J2EE Web Applications: A Formal Perspective
Matteo Maria Casalino, Romuald Thion, Mohand-Said Hacid, - Advances and Challenges in Standalone Host-based Intrusion Detection Systems
Vit Bukac, Pavel Tucek, Martin Deutsch, - An Autonomous Social Web Privacy Infrastructure with Context-Aware Access Control
Michael Netter, Sabri Hassan, Günther Pernul, - Cloud Separation: Stuck inside the cloud.
Waldo Delport, Martin S. Olivier, - Damage sharing may not be enough: an analysis of an ex-ante regulation policy for data breaches
Giuseppe D'Acquisto, Marta Flamini, Maurizio Naldi, - Efficient Comparison of Encrypted Biometric Templates
Michael Dorn, Peter Wackersreuther, Christian Böhm, - Encrypted Adaptive Storage Model - Analysis and Performance Tests
Marcin Gorawski, Michal Lorek, Michal Gorawski, - Flexible regulation with privacy points
Hanno Langweg, Lisa Rajbhandari, - How much Network Security must be Visible in Web Browsers?
Tobias Hirsch, Luigi Lo Iacono, Ina Wechsung, - On the Security of the Non-Repudiation of Forwarding Service
Rainer Schick, Christoph Ruland, - Profitability and Cost Management of Trustworthy Composite Services
Hisain Elshaafi, Jimmy McGibney, Dmitri Botvich, - Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process
Kashif Syed, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Shaun Aghili, - Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases
Thong Ta Vinh, Levente Buttyán, - Short and Efficient Identity-Based Undeniable Signature Scheme
Rouzbeh Behnia, Swee-Huay Heng, Che-Sheng Gan, - Verification of Security Coherence in Data Warehouse Designs
Ali Salem, Salah Triki, Hanen Ben Abdallah, Nouria Harbi, Omar Boussaid,