researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
Filter by Tag
[+]
OR
AND
NOT
1
C++
Meta-Environment
access control
analysis
architecture
certification
context-aware
data-flow
design
e-science
meta-model
mobile
object-role modeling
protocol
reputation
role-based access control
rule-based
search
security
systematic-approach
Filter by Author
[+]
OR
AND
NOT
1
Aggeliki Tsohou
Christoph Ruland
Christos Kalloniatis
Christos Xenakis
Costas Lambrinoudakis
Dimitris Geneiatakis
Dimitris Gritzalis
Georgios Kambourakis
Günther Pernul
Haralambos Mouratidis
Marco Casassa Mont
Maria Karyda
Maritta Heisel
Martin S. Olivier
Michalis Pavlidis
Nathan L. Clarke
Nikolaos Pitropakis
Sokratis K. Katsikas
Stefanos Gritzalis
Steven Furnell
Filter by Top terms
[+]
OR
AND
NOT
1
access
analysis
business
cloud
conference
control
data
digital
international
management
model
preserving
privacy
proceedings
secure
security
systems
towards
trust
trustbus
TrustBus (trustbus)
Editions
Publications
Viewing Publication 1 - 100 from 371
2022
Closing the Gap Between Privacy Policies and Privacy Preferences with Privacy Interfaces
Stefan Becher
,
Felix Bölz
,
Armin Gerl
.
trustbus 2022
:
17-32
[doi]
Trust, Privacy and Security in Digital Business - 19th International Conference, TrustBus 2022, Vienna, Austria, August 24, 2022, Proceedings
Sokratis K. Katsikas
,
Steven Furnell
, editors,
Volume 13582 of
Lecture Notes in Computer Science
, Springer,
2022.
[doi]
PriPoCoG: Guiding Policy Authors to Define GDPR-Compliant Privacy Policies
Jens Leicht
,
Maritta Heisel
,
Armin Gerl
.
trustbus 2022
:
1-16
[doi]
A Constructive Approach for Raising Information Privacy Competences: The Case of Escape Room Games
Thanos Papaioannou
,
Aggeliki Tsohou
,
Georgios Bounias
,
Stylianos Karagiannis
.
trustbus 2022
:
33-49
[doi]
Mitigating Sovereign Data Exchange Challenges: A Mapping to Apply Privacy- and Authenticity-Enhancing Technologies
Kaja Schmidt
,
Gonzalo Munilla Garrido
,
Alexander Mühle
,
Christoph Meinel
.
trustbus 2022
:
50-65
[doi]
Threat Detection and Mitigation with Honeypots: A Modular Approach for IoT
Simão Silva
,
Patrícia R. Sousa
,
João S. Resende
,
Luis Filipe Coelho Antunes
.
trustbus 2022
:
66-80
[doi]
Homomorphic Encryption in Manufacturing Compliance Checks
Aikaterini Triakosia
,
Panagiotis Rizomiliotis
,
Konstantinos Tserpes
,
Cecilia Tonelli
,
Valerio Senni
,
Fabio Federici
.
trustbus 2022
:
81-95
[doi]
2021
Car Drivers' Privacy Concerns and Trust Perceptions
Giampaolo Bella
,
Pietro Biondi
,
Giuseppe Tudisco
.
trustbus 2021
:
143-154
[doi]
Components and Architecture for the Implementation of Technology-Driven Employee Data Protection
Florian Dehling
,
Denis Feth
,
Svenja Polst
,
Bianca Steffes
,
Jan Tolsdorf
.
trustbus 2021
:
99-111
[doi]
Impact of False Positives and False Negatives on Security Risks in Transactions Under Threat
Doncho S. Donchev
,
Vassil Vassilev
,
Demir Tonchev
.
trustbus 2021
:
50-66
[doi]
Trust, Privacy and Security in Digital Business - 18th International Conference, TrustBus 2021, Virtual Event, September 27-30, 2021, Proceedings
Simone Fischer-Hübner
,
Costas Lambrinoudakis
,
Gabriele Kotsis
,
A Min Tjoa
,
Ismail Khalil
, editors,
Volume 12927 of
Lecture Notes in Computer Science
, Springer,
2021.
[doi]
Monitoring Access Reviews by Crowd Labelling
Sebastian Groll
,
Sascha Kern
,
Ludwig Fuchs
,
Günther Pernul
.
trustbus 2021
:
3-17
[doi]
Neither Good nor Bad: A Large-Scale Empirical Analysis of HTTP Security Response Headers
Georgios Karopoulos
,
Dimitris Geneiatakis
,
Georgios Kambourakis
.
trustbus 2021
:
83-95
[doi]
Launching Adversarial Label Contamination Attacks Against Malicious URL Detection
Bruno Marchand
,
Nikolaos Pitropakis
,
William J. Buchanan
,
Costas Lambrinoudakis
.
trustbus 2021
:
69-82
[doi]
A Category-Based Framework for Privacy-Aware Collaborative Access Control
Denis Obrezkov
,
Karsten Sohr
,
Rainer Malaka
.
trustbus 2021
:
126-139
[doi]
AuthGuide: Analyzing Security, Privacy and Usability Trade-Offs in Multi-factor Authentication
Davy Preuveneers
,
Sander Joos
,
Wouter Joosen
.
trustbus 2021
:
155-170
[doi]
Automating the Evaluation of Trustworthiness
Marc Sel
,
Chris J. Mitchell
.
trustbus 2021
:
18-31
[doi]
At Your Service 24/7 or Not? Denial of Service on ESInet Systems
Zisis Tsiatsikas
,
Georgios Kambourakis
,
Dimitrios Geneiatakis
.
trustbus 2021
:
35-49
[doi]
Towards an Information Privacy and Personal Data Protection Competency Model for Citizens
Aggeliki Tsohou
.
trustbus 2021
:
112-125
[doi]
2020
A Distributed Trust Framework for Privacy-Preserving Machine Learning
Will Abramson
,
Adam James Hall
,
Pavlos Papadopoulos
,
Nikolaos Pitropakis
,
William J. Buchanan
.
trustbus 2020
:
205-220
[doi]
Employment of Secure Enclaves in Cheat Detection Hardening
André Brandão
,
João S. Resende
,
Rolando Martins
.
trustbus 2020
:
48-62
[doi]
On the Suitability of Using SGX for Secure Key Storage in the Cloud
Joakim Brorsson
,
Pegah Nikbakht Bideh
,
Alexander Nilsson
,
Martin Hell
.
trustbus 2020
:
32-47
[doi]
An Empirical Investigation of the Right to Explanation Under GDPR in Insurance
Jacob Dexe
,
Jonas Ledendal
,
Ulrik Franke
.
trustbus 2020
:
125-139
[doi]
SECONDO: A Platform for Cybersecurity Investments and Cyber Insurance Decisions
Aristeidis Farao
,
Sakshyam Panda
,
Sofia-Anna Menesidou
,
Entso Veliou
,
Nikolaos Episkopos
,
George Kalatzantonakis
,
Farnaz Mohammadi
,
Nikolaos Georgopoulos
,
Michael Sirivianos
,
Nikos Salamanos
,
Spyros Loizou
,
Michalis Pingos
,
John Polley
,
Andrew Fielder
,
Emmanouil Panaousis
,
Christos Xenakis
.
trustbus 2020
:
65-74
[doi]
Cloud Computing Framework for e-Health Security Requirements and Security Policy Rules Case Study: A European Cloud-Based Health System
Dimitra Georgiou
,
Costas Lambrinoudakis
.
trustbus 2020
:
17-31
[doi]
Trust, Privacy and Security in Digital Business - 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14-17, 2020, Proceedings
Stefanos Gritzalis
,
Edgar R. Weippl
,
Gabriele Anderst-Kotsis
,
A Min Tjoa
,
Ismail Khalil
, editors,
Volume 12395 of
Lecture Notes in Computer Science
, Springer,
2020.
[doi]
Utility Requirement Description for Utility-Preserving and Privacy-Respecting Data Pseudonymization
Saffija Kasem-Madani
,
Michael Meier 0001
.
trustbus 2020
:
171-185
[doi]
Microtargeting or Microphishing? Phishing Unveiled
Bridget Khursheed
,
Nikolaos Pitropakis
,
Sean McKeown
,
Costas Lambrinoudakis
.
trustbus 2020
:
89-105
[doi]
Measuring Users' Socio-contextual Attributes for Self-adaptive Privacy Within Cloud-Computing Environments
Angeliki Kitsiou
,
Eleni Tzortzaki
,
Christos Kalloniatis
,
Stefanos Gritzalis
.
trustbus 2020
:
140-155
[doi]
A Fuzzy Trust Model for Autonomous Entities Acting in Pervasive Computing
Kostas Kolomvatsos
,
Maria Kalouda
,
Panagiota Papadopoulou
,
Stathes Hadjiefthymiades
.
trustbus 2020
:
223-233
[doi]
Analysis of uPort Open, an Identity Management Blockchain-Based Solution
Andreea-Elena Panait
,
Ruxandra F. Olimid
,
Alin Stefanescu
.
trustbus 2020
:
3-13
[doi]
DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance
Luca Piras
,
Mohammed Ghazi Al-Obeidallah
,
Michalis Pavlidis
,
Haralambos Mouratidis
,
Aggeliki Tsohou
,
Emmanouil Magkos
,
Andrea Praitano
,
Annarita Iodice
,
Beatriz Gallego-Nicasio Crespo
.
trustbus 2020
:
186-201
[doi]
Are Sensor-Based Business Models a Threat to Privacy? The Case of Pay-How-You-Drive Insurance Models
Christian Roth
,
Sebastian Aringer
,
Johannes Petersen
,
Mirja Nitschke
.
trustbus 2020
:
75-85
[doi]
Empowering Users Through a Privacy Middleware Watchdog
Patrícia R. Sousa
,
Rolando Martins
,
Luis Antunes 0002
.
trustbus 2020
:
156-170
[doi]
Privacy-Preserving Service Composition with Enhanced Flexibility and Efficiency
Kevin Theuermann
,
Felix Hörandner
,
Andreas Abraham
,
Dominik Ziegler
.
trustbus 2020
:
109-124
[doi]
2019
Gender Inference for Facebook Picture Owners
Bizhan Alipour
,
Abdessamad Imine
,
Michaël Rusinowitch
.
trustbus 2019
:
145-160
[doi]
General Data Protection Regulation and ISO/IEC 27001: 2013: Synergies of Activities Towards Organisations' Compliance
Vasiliki Diamantopoulou
,
Aggeliki Tsohou
,
Maria Karyda
.
trustbus 2019
:
94-109
[doi]
I Agree: Customize Your Personal Data Processing with the CoRe User Interface
Olha Drozd
,
Sabrina Kirrane
.
trustbus 2019
:
17-32
[doi]
Trust, Privacy and Security in Digital Business - 16th International Conference, TrustBus 2019, Linz, Austria, August 26-29, 2019, Proceedings
Stefanos Gritzalis
,
Edgar R. Weippl
,
Sokratis K. Katsikas
,
Gabriele Anderst-Kotsis
,
A Min Tjoa
,
Ismail Khalil
, editors,
Volume 11711 of
Lecture Notes in Computer Science
, Springer,
2019.
[doi]
I Did Not Accept That: Demonstrating Consent in Online Collection of Personal Data
Vitor Jesus
,
Shweta Mustare
.
trustbus 2019
:
33-45
[doi]
The Interrelation of Game Elements and Privacy Requirements for the Design of a System: A Metamodel
Aikaterini-Georgia Mavroeidi
,
Angeliki Kitsiou
,
Christos Kalloniatis
.
trustbus 2019
:
110-125
[doi]
Unifying Cyber Threat Intelligence
Florian Menges
,
Christine Sperl
,
Günther Pernul
.
trustbus 2019
:
161-175
[doi]
Privacy Policy Specification Framework for Addressing End-Users' Privacy Requirements
Nazila Gol Mohammadi
,
Jens Leicht
,
Nelufar Ulfat-Bunyadi
,
Maritta Heisel
.
trustbus 2019
:
46-62
[doi]
Decentralised and Collaborative Auditing of Workflows
Antonio Nehme
,
Vitor Jesus
,
Khaled Mahbub
,
Ali E. Abdallah
.
trustbus 2019
:
129-144
[doi]
DEFeND Architecture: A Privacy by Design Platform for GDPR Compliance
Luca Piras
,
Mohammed Ghazi Al-Obeidallah
,
Andrea Praitano
,
Aggeliki Tsohou
,
Haralambos Mouratidis
,
Beatriz Gallego-Nicasio Crespo
,
Jean Baptiste Bernard
,
Marco Fiorani
,
Emmanouil Magkos
,
Andrès Castillo Sanz
,
Michalis Pavlidis
,
Roberto D'Addario
,
Giuseppe Giovanni Zorzino
.
trustbus 2019
:
78-93
[doi]
A Data Utility-Driven Benchmark for De-identification Methods
Oleksandr Tomashchuk
,
Dimitri Van Landuyt
,
Daniel Pletea
,
Kim Wuyts
,
Wouter Joosen
.
trustbus 2019
:
63-77
[doi]
Do Identity and Location Data Interrelate? New Affiliations and Privacy Concerns in Social-Driven Sharing
Katerina Vgena
,
Angeliki Kitsiou
,
Christos Kalloniatis
,
Dimitris Kavroudakis
.
trustbus 2019
:
3-16
[doi]
2018
A Comprehensive Methodology for Deploying IoT Honeypots
Antonio Acien
,
Ana Nieto
,
Gerardo Fernandez
,
Javier López 0001
.
trustbus 2018
:
229-243
[doi]
PERSUADED: Fighting Social Engineering Attacks with a Serious Game
Dina Aladawy
,
Kristian Beckers
,
Sebastian Pape 0001
.
trustbus 2018
:
103-118
[doi]
Biometrically Linking Document Leakage to the Individuals Responsible
Abdulrahman Alruban
,
Nathan L. Clarke
,
Fudong Li
,
Steven Furnell
.
trustbus 2018
:
135-149
[doi]
Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Assessment
Majed Alshammari
,
Andrew Simpson
.
trustbus 2018
:
85-99
[doi]
Towards the Definition of a Security Incident Response Modelling Language
Myrsini Athinaiou
,
Haralambos Mouratidis
,
Theo Fotis
,
Michalis Pavlidis
,
Emmanouil Panaousis
.
trustbus 2018
:
198-212
[doi]
On the Hardness of Separation of Duties Problems for Cloud Databases
Ferdinand Bollwein
,
Lena Wiese
.
trustbus 2018
:
23-38
[doi]
Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings
Steven Furnell
,
Haralambos Mouratidis
,
Günther Pernul
, editors,
Volume 11033 of
Lecture Notes in Computer Science
, Springer,
2018.
[doi]
Access Control Requirements for Physical Spaces Protected by Virtual Perimeters
Brian Greaves
,
Marijke Coetzee
,
Wai Sze Leung
.
trustbus 2018
:
182-197
[doi]
The General Data Protection Regulation (GDPR) Era: Ten Steps for Compliance of Data Processors and Data Controllers
Costas Lambrinoudakis
.
trustbus 2018
:
3-8
[doi]
Trustworthiness Cases - Toward Preparation for the Trustworthiness Certification
Nazila Gol Mohammadi
,
Nelufar Ulfat-Bunyadi
,
Maritta Heisel
.
trustbus 2018
:
244-259
[doi]
Towards Blockchain-Based Identity and Access Management for Internet of Things in Enterprises
Martin Nuss
,
Alexander Puchta
,
Michael Kunz
.
trustbus 2018
:
167-181
[doi]
Three Tales of Disillusion: Benchmarking Property Preserving Encryption Schemes
Frank Pallas
,
Martin Grambow
.
trustbus 2018
:
39-54
[doi]
Can Spatial Transformation-Based Privacy Preservation Compromise Location Privacy?
Anand Paturi
,
Subhasish Mazumdar
.
trustbus 2018
:
69-84
[doi]
An Enhanced Cyber Attack Attribution Framework
Nikolaos Pitropakis
,
Emmanouil Panaousis
,
Alkiviadis Giannakoulias
,
George Kalpakis
,
Rodrigo Diaz Rodriguez
,
Panayiotis Sarigiannidis
.
trustbus 2018
:
213-228
[doi]
An Inquiry into Perception and Usage of Smartphone Permission Models
Lena Reinfelder
,
Andrea Schankin
,
Sophie Russ
,
Zinaida Benenson
.
trustbus 2018
:
9-22
[doi]
Evaluating the Privacy Properties of Secure VoIP Metadata
João S. Resende
,
Patrícia R. Sousa
,
Luís Antunes 0002
.
trustbus 2018
:
57-68
[doi]
A Decision-Making Approach for Improving Organizations' Cloud Forensic Readiness
Stavros Simou
,
Ioannis Troumpis
,
Christos Kalloniatis
,
Dimitris Kavroudakis
,
Stefanos Gritzalis
.
trustbus 2018
:
150-164
[doi]
Developing and Evaluating a Five Minute Phishing Awareness Video
Melanie Volkamer
,
Karen Renaud
,
Benjamin Reinheimer
,
Philipp Rack
,
Marco Ghiglieri
,
Peter Mayer
,
Alexandra Kunz
,
Nina Gerber
.
trustbus 2018
:
119-134
[doi]
2017
A Structured Comparison of Social Engineering Intelligence Gathering Tools
Kristian Beckers
,
Daniel Schosser
,
Sebastian Pape 0001
,
Peter Schaab
.
trustbus 2017
:
232-246
[doi]
Modeling Malware-driven Honeypots
Gerardo Fernandez
,
Ana Nieto
,
Javier Lopez
.
trustbus 2017
:
130-144
[doi]
Improving Fuzzy Searchable Encryption with Direct Bigram Embedding
Christian Göge
,
Tim Waage
,
Daniel Homann
,
Lena Wiese
.
trustbus 2017
:
115-129
[doi]
FAIR: Fuzzy Alarming Index Rule for Privacy Analysis in Smartphone Apps
Majid Hatamian
,
Jetzabel Serna
,
Kai Rannenberg
,
Bodo Igler
.
trustbus 2017
:
3-18
[doi]
Mobile Personal Identity Provider Based on OpenID Connect
Luigi Lo Iacono
,
Nils Gruschka
,
Peter Nehren
.
trustbus 2017
:
19-31
[doi]
Trust, Privacy and Security in Digital Business - 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings
Javier Lopez
,
Simone Fischer-Hübner
,
Costas Lambrinoudakis
, editors,
Volume 10442 of
Lecture Notes in Computer Science
, Springer,
2017.
[doi]
Pattern-Based Representation of Privacy Enhancing Technologies as Early Aspects
Rene Meis
,
Maritta Heisel
.
trustbus 2017
:
49-65
[doi]
Don't Be Deceived: The Message Might Be Fake
Stephan Neumann
,
Benjamin Reinheimer
,
Melanie Volkamer
.
trustbus 2017
:
199-214
[doi]
On the Security Expressiveness of REST-Based API Definition Languages
Hoai Viet Nguyen
,
Jan Tolsdorf
,
Luigi Lo Iacono
.
trustbus 2017
:
215-231
[doi]
A Middleware Enforcing Location Privacy in Mobile Platform
Asma Patel
,
Esther Palomar
.
trustbus 2017
:
32-45
[doi]
Selecting Security Mechanisms in Secure Tropos
Michalis Pavlidis
,
Haralambos Mouratidis
,
Emmanouil Panaousis
,
Nikolaos Argyropoulos
.
trustbus 2017
:
99-114
[doi]
Iron Mask: Trust-Preserving Anonymity on the Face of Stigmatization in Social Networking Sites
Hamman Samuel
,
Osmar R. Zaïane
.
trustbus 2017
:
66-80
[doi]
An Exploratory Analysis of the Security Risks of the Internet of Things in Finance
Carlton Shepherd
,
Fabien A. P. Petitcolas
,
Raja Naeem Akram
,
Konstantinos Markantonakis
.
trustbus 2017
:
164-179
[doi]
Modelling Cloud Forensic-Enabled Services
Stavros Simou
,
Christos Kalloniatis
,
Stefanos Gritzalis
.
trustbus 2017
:
147-163
[doi]
Modelling Metrics for Transparency in Medical Systems
Dayana Spagnuelo
,
Cesare Bartolini
,
Gabriele Lenzini
.
trustbus 2017
:
81-95
[doi]
A New Sharing Paradigm for the Personal Cloud
Paul Tran-Van
,
Nicolas Anciaux
,
Philippe Pucheral
.
trustbus 2017
:
180-196
[doi]
2016
Design of a Log Management Infrastructure Using Meta-Network Analysis
Vasileios Anastopoulos
,
Sokratis K. Katsikas
.
trustbus 2016
:
97-110
[doi]
Automatic Enforcement of Security Properties
José-Miguel Horcas
,
Mónica Pinto
,
Lidia Fuentes
.
trustbus 2016
:
19-31
[doi]
Bottom-Up Cell Suppression that Preserves the Missing-at-random Condition
Yoshitaka Kameya
,
Kentaro Hayashi
.
trustbus 2016
:
65-78
[doi]
Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings
Sokratis K. Katsikas
,
Costas Lambrinoudakis
,
Steven Furnell
, editors,
Volume 9830 of
Lecture Notes in Computer Science
, Springer,
2016.
[doi]
The Far Side of Mobile Application Integrated Development Environments
Christos Lyvas
,
Nikolaos Pitropakis
,
Costas Lambrinoudakis
.
trustbus 2016
:
111-122
[doi]
Understanding the Privacy Goal Intervenability
Rene Meis
,
Maritta Heisel
.
trustbus 2016
:
79-94
[doi]
A Framework for Systematic Analysis and Modeling of Trustworthiness Requirements Using i* and BPMN
Nazila Gol Mohammadi
,
Maritta Heisel
.
trustbus 2016
:
3-18
[doi]
Modelling Secure Cloud Computing Systems from a Security Requirements Perspective
Shaun Shei
,
Christos Kalloniatis
,
Haralambos Mouratidis
,
Aidan Delaney
.
trustbus 2016
:
48-62
[doi]
Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems
Stavros Simou
,
Christos Kalloniatis
,
Haralambos Mouratidis
,
Stefanos Gritzalis
.
trustbus 2016
:
35-47
[doi]
2015
A Privacy Preserving Framework for Big Data in e-Government Environments
Prokopios Drogkaris
,
Aristomenis Gritzalis
.
trustbus 2015
:
210-218
[doi]
Trust, Privacy and Security in Digital Business - 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings
Simone Fischer-Hübner
,
Costas Lambrinoudakis
,
Javier Lopez
, editors,
Volume 9264 of
Lecture Notes in Computer Science
, Springer,
2015.
[doi]
On the Efficacy of Static Features to Detect Malicious Applications in Android
Dimitris Geneiatakis
,
Riccardo Satta
,
Igor Nai Fovino
,
Ricardo Neisse
.
trustbus 2015
:
87-98
[doi]
The Design of a Configurable Reputation Service
Channel Hillebrand
,
Marijke Coetzee
.
trustbus 2015
:
60-70
[doi]
Designing Privacy-Aware Systems in the Cloud
Christos Kalloniatis
.
trustbus 2015
:
113-123
[doi]
Privacy Principles: Towards a Common Privacy Audit Methodology
Eleni-Laskarina Makri
,
Costas Lambrinoudakis
.
trustbus 2015
:
219-234
[doi]
Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software
Christoforos Ntantogian
,
Grigoris Valtas
,
Nikos Kapetanakis
,
Faidon Lalagiannis
,
Georgios Karopoulos
,
Christos Xenakis
.
trustbus 2015
:
73-86
[doi]
Protecting Android Apps Against Reverse Engineering by the Use of the Native Code
Mykola Protsenko
,
Tilo Müller
.
trustbus 2015
:
99-110
[doi]
Attributes Enhanced Role-Based Access Control Model
Qasim Mahmood Rajpoot
,
Christian Damsgaard Jensen
,
Ram Krishnan
.
trustbus 2015
:
3-17
[doi]
Identifying Factors that Influence Employees' Security Behavior for Enhancing ISP Compliance
Ioanna Topa
,
Maria Karyda
.
trustbus 2015
:
169-179
[doi]
Sign in
or
sign up
to see more results.