Abstract is missing.
- Digital identity management and protectionElisa Bertino. 1 [doi]
- Topological analysis of network attack vulnerabilitySushil Jajodia. 2 [doi]
- Paths to creativity in security careersGregory B. Newby. 3 [doi]
- Role-based access control: past, present and futureSylvia L. Osborn. 4 [doi]
- From concept to commercialiazed product: the challenges of privacy technologiesMike Gurski. 5 [doi]
- Deep packet inspection comes to the desktopBrian O Higgins. 6 [doi]
- Label-based access control (LBAC) in DB2 LUWWalid Rjaibi. 7 [doi]
- Computing trust from revision historyHonglei Zeng, Maher A. Alhossaini, Li Ding, Richard Fikes, Deborah L. McGuinness. 8 [doi]
- Analyzing trust in technology strategiesJennifer Horkoff, Eric S. K. Yu, Lin Liu. 9 [doi]
- Requirements of federated trust management for service-oriented architecturesZhengping Wu, Alfred C. Weaver. 10 [doi]
- Trust modelling for online transactions: a phishing scenarioPonnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor. 11 [doi]
- A comparison of reputation-based trust systemsJohn B. Folkerts, Hans-Peter Bischof. 12 [doi]
- A constraint based role based access control in the SECTET a model-driven approachMuhammad Alam, Michael Hafner, Ruth Breu. 13 [doi]
- Protected data paths: delivering sensitive data via untrusted proxiesJiantao Kong, Karsten Schwan, Patrick Widener. 14 [doi]
- Architecture-based refinements for secure computer systems designJie Zhou, Jim Alves-Foss. 15 [doi]
- A new fair non-repudiation protocol for secure negotiation and contract signingAntonio Ruiz-Martínez, C. Inmaculada Marín-López, L. Baño-López, Antonio F. Gómez-Skarmeta. 16 [doi]
- Detecting low-profile scans in TCP anomaly event dataJ. Treurniet. 17 [doi]
- Towards a precise semantics for authenticity and trustReto Kohlas, Jacek Jonczy, Rolf Haenni. 18 [doi]
- An improved familiarity measurement for formalization of trust in e-commerce based multiagent systemsJie Zhang, Ali A. Ghorbani, Robin Cohen. 19 [doi]
- Trust and security in spatial messaging: FoxyTag, the speed camera case studyMichel Deriaz, Jean-Marc Seigneur. 20 [doi]
- Modeling trust using transactional, numerical unitsReid Kerr, Robin Cohen. 21 [doi]
- Building online trust through privacy policiesThomas W. Lauer, Xiaodong Deng. 22 [doi]
- Approximate autoregressive modeling for network attack detectionHarshit Nayyar, Ali A. Ghorbani. 23 [doi]
- Dynamic inference control in privacy preference enforcementXiangdong An, Dawn N. Jutla, Nick Cercone. 24 [doi]
- Privacy policy enforcement in enterprises with identity management solutionsMarco Casassa Mont, Robert Thyne. 25 [doi]
- Formal consistency verification between BPEL process and privacy policyYin Hua Li, Hye-Young Paik, Boualem Benatallah. 26 [doi]
- A privacy-preserving UBICOMP architectureGeorge Yee. 27 [doi]
- Query rewriting for detection of privacy violation through inferencingVikram Goyal, Shyam K. Gupta, Shobhit Saxena. 28 [doi]
- Privacy in video surveilled areasTorsten Spindler, Christoph Wartmann, Ludger Hovestadt, Daniel Roth, Luc J. Van Gool, Andreas Steffen. 29 [doi]
- Is workplace surveillance legal in Canada?Avner Levin. 30 [doi]
- Bridging the gap: software specification meets intrusion detectorMathew Graves, Mohammad Zulkernine. 31 [doi]
- Phishing defense against IDN address spoofing attacksViktor Krammer. 32 [doi]
- Using self-organizing maps to build an attack map for forensic analysisHilmi Günes Kayacik, A. Nur Zincir-Heywood. 33 [doi]
- An efficient traitor tracing scheme based on MDS codeYang Bo, Wang Qin. 34 [doi]
- Using web service enhancements to bridge business trust relationshipsZhengping Wu, Alfred C. Weaver. 35 [doi]
- An incentive compatible reputation mechanism for ubiquitous computing environmentsJinshan Liu, Valérie Issarny. 36 [doi]
- Alert correlation survey: framework and techniquesReza Sadoddin, Ali A. Ghorbani. 37 [doi]
- Execution monitoring enforcement for limited-memory systemsChamseddine Talhi, Nadia Tawbi, Mourad Debbabi. 38 [doi]
- Embedding verifiable information flow analysisDorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl. 39 [doi]
- Behavior analysis through reputation propagation in a multi-context environmentEbrahim Bagheri, Ali A. Ghorbani. 40 [doi]
- Achieving privacy and security in radio frequency identificationAaditeshwar Seth, Mirza Beg. 41 [doi]
- Privacy enhanced personalization in e-learningMohd M. Anwar, Jim E. Greer, Christopher A. Brooks. 42 [doi]
- Security hardening of open source softwareAzzam Mourad, Marc-André Laverdière, Mourad Debbabi. 43 [doi]
- Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTETMuhammad Alam, Michael Hafner, Ruth Breu. 44 [doi]
- Security crosscutting concerns and AspectJDima Alhadidi, Nadia Belblidia, Mourad Debbabi. 45 [doi]
- Privacy-preserving OLAP based on output perturbation across multiple sitesYunhai Tong, Guohui Sun, Peng Zhang, Shiwei Tang. 46 [doi]
- A framework ensuring privacy in a distributed environmentDhiah el Diehn I. Abou-Tair. 47 [doi]
- An early release heuristic for k-anonymizationEdward Brown, Khandaker Ahamed. 48 [doi]
- Towards reliable trust establishment in grid: a pre-evaluating set based bias-tuned method for dishonest feedback filteringXuejun Yang, Xiangli Qu. 49 [doi]
- A trust framework model for situational contextsCarsten D. Schultz. 50 [doi]
- Trust-based contextual information filteringEugenia Kondratova, Stephen Marsh, Ali A. Ghorbani. 51 [doi]
- Trust determination in ad hoc networksJohnson P. Thomas, Sudha Chinni, George Ghinea. 52 [doi]
- MTRMS: mutual-trust-based reputation management system in community-based peer-to-peer environmentEunJoung Byun, SeokIn Kim, HongSoo Kim, SungJin Choi, JangWon Choi, Chong-Sun Hwang. 53 [doi]
- Towards a model for risk and consent management of personal health informationScott Buffett, T. A. Kosa. 54 [doi]
- A concept of intelligent biometric-based early detection and warning systemSvetlana N. Yanushkevich. 55 [doi]
- The how and why of persistent information securityMerv Matson, Mihaela Ulieru. 56 [doi]
- Virtual identities in authentication and authorization scenariosSantiago Zapata Hernandez, Antonio F. Gómez-Skarmeta. 57 [doi]
- AA-RR: working with authentication and authorization infrastructuresCandido Rodriguez, Ajay Daryanani, Diego R. Lopez, Jose M. Macias. 58 [doi]
- Persona concept for web-based identity managementKalman C. Toth. 59 [doi]
- Off-line verification of one-time ID in distributed environmentKenji Imamoto, Kouichi Sakurai. 60 [doi]
- Chinese text watermarking based on occlusive componentsZhang Wenyin, Jin Ningde. 61 [doi]
- User-credential based role mapping in multi-domain environmentAjith Kamath, Ramiro Liscano, Abdulmotaleb El-Saddik. 62 [doi]
- Privacy, traceability, and anonymity for content protectionHongxia Jin. 63 [doi]
- Cryptanalysis and improvement on Yang-Shieh authentication schemesJie Liu, Lei Fan, Jianhua Li. 64 [doi]
- Intelligent virus detection on mobile devicesDeepak Venugopal, Guoning Hu, Nicoleta Roman. 65 [doi]
- Towards an MDA-oriented UML profile for critical infrastructure modelingEbrahim Bagheri, Ali A. Ghorbani. 66 [doi]
- Using an improved C4.5 for imbalanced dataset of intrusionQuan Zhou, Lin-gang Gu, Chong-Jun Wang, Jun Wang, Shifu Chen. 67 [doi]
- Secure algorithm for finding K nearest neighbors in distributed databasesBarrington Young, Raj Bhatnagar. 68 [doi]
- Design and implementation of a behavioral difference analyzer for network intrusion detectionMehran Nadjarbashi-Noghani, Ali A. Ghorbani. 69 [doi]
- Towards believing answers from cyber-infrastructure-based applicationsGilbert Ornelas, Paulo Pinheiro da Silva. 70 [doi]
- Defining the security required for WAP based mobile ticket salesAlex Pandelidis. 71 [doi]
- The quantum nature of cryptography: problems of public-key cryptography and the prospect of quantum key distributionA. K. M. Harun-Ar-Rashid. 72 [doi]
- Is privacy an attainable goal?: a review of the privacy rights dilemmaAnasuya Bulkan. 73 [doi]
- Exploiting a buffer overflow using metasploit frameworkMustapha Refai. 74 [doi]
- Ontario healthcare privacy act: compliant ad hoc healthcare applicationsStephanie Chow. 75 [doi]
- Mobile access control policy for healthcare applications with XACMLJude Andrade. 76 [doi]
- Mobile healthcare applications: a study of access controlMichelle Watson. 77 [doi]
- Considering role-based conflicts of interest in analyzing and designing e-health systems with goal-oriented methodologiesVic Chung. 78 [doi]
- From stakeholder goals to product features: towards a role-based variability framework with decision boundaryCatalin Bidian. 79 [doi]