Sign in
CSE (3)
2009
2009
2009
Keyphrases
Publications
2009
Dimitri do B. DeFigueiredo
,
Earl T. Barr
,
Shyhtsun Felix Wu
Trust Is in the Eye of the Beholder.
CSE (3)
(2009)
Samuel Oladapo
,
Pavol Zavarsky
,
Ron Ruhl
,
Dale Lindskog
,
Andy Igonor
Managing Risk of IT Security Outsourcing in the Decision-Making Stage.
CSE (3)
(2009)
Ghassan Jabbour
,
Daniel A. Menascé
The Insider Threat Security Architecture: A Framework for an Integrated, Inseparable, and Uninterrupted Self-Protection Mechanism.
CSE (3)
(2009)
Ruilin Liu
,
Wendy Hui Wang
Integrity Verification of Outsourced XML Databases.
CSE (3)
(2009)
Kambiz Ghazinour
,
Maryam Majedi
,
Ken Barker
A Lattice-Based Privacy Aware Access Control Model.
CSE (3)
(2009)
Anthony Stell
,
Richard O. Sinnott
,
Oluwafemi O. Ajayi
,
Jipu Jiang
Designing Privacy for Scalable Electronic Healthcare Linkage.
CSE (3)
(2009)
Florian Kerschbaum
Adapting Privacy-Preserving Computation to the Service Provider Model.
CSE (3)
(2009)
André van Cleeff
,
Wolter Pieters
,
Roel J. Wieringa
Security Implications of Virtualization: A Literature Study.
CSE (3)
(2009)
Yun Yang
,
Juhua Chen
A Dynamic Trust Evaluation Model on C2C Marketplaces.
CSE (3)
(2009)
Daniel Trivellato
,
Fred Spiessens
,
Nicola Zannone
,
Sandro Etalle
Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control.
CSE (3)
(2009)
Xiaoli Lin
,
Pavol Zavarsky
,
Ron Ruhl
,
Dale Lindskog
Threat Modeling for CSRF Attacks.
CSE (3)
(2009)
Takao Okubo
,
Kenji Taguchi
,
Nobukazu Yoshioka
Misuse Cases + Assets + Security Goals.
CSE (3)
(2009)
Wanying Luo
,
Qi Xie
,
Urs Hengartner
FaceCloak: An Architecture for User Privacy on Social Networking Sites.
CSE (3)
(2009)
Seiji Shibaguchi
,
Yuki Nakayama
,
Ken-ichi Okada
Worm Path Identification Using Visualization System.
CSE (3)
(2009)
Muhammad Umair Ahmed Khan
,
Mohammad Zulkernine
Activity and Artifact Views of a Secure Software Development Process.
CSE (3)
(2009)
Saeed Samet
,
Ali Miri
Privacy-Preserving Bayesian Network for Horizontally Partitioned Data.
CSE (3)
(2009)
Harold van Heerde
,
Maarten M. Fokkinga
,
Nicolas Anciaux
A Framework to Balance Privacy and Data Usability Using Data Degradation.
CSE (3)
(2009)
Florian Schaub
,
Zhendong Ma
,
Frank Kargl
Privacy Requirements in Vehicular Communication Systems.
CSE (3)
(2009)
Wei Jiang
,
Mummoorthy Murugesan
,
Chris Clifton
,
Luo Si
t-Plausibility: Semantic Preserving Text Sanitization.
CSE (3)
(2009)
Girma Nigusse
,
Bart De Decker
,
Vincent Naessens
Specification of Fair Data Practice Principles Using Privacy Policy Languages.
CSE (3)
(2009)
Martin Neubauer
Modelling of Pseudonymity under Probabilistic Linkability Attacks.
CSE (3)
(2009)
Wael Kanoun
,
Nora Cuppens-Boulahia
,
Frédéric Cuppens
,
Samuel Dubus
,
Antony Martin
Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems.
CSE (3)
(2009)
Markus Huber
,
Stewart Kowalski
,
Marcus Nohlberg
,
Simon Tjoa
Towards Automating Social Engineering Using Social Networking Sites.
CSE (3)
(2009)
Michele Barletta
,
Silvio Ranise
,
Luca Viganò
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures.
CSE (3)
(2009)
Hendrik J. G. Oberholzer
,
Martin S. Olivier
Emergency Privacy Measures.
CSE (3)
(2009)
Valentina Casola
,
Anna Rita Fasolino
,
Nicola Mazzocca
,
Porfirio Tramontana
An AHP-Based Framework for Quality and Security Evaluation.
CSE (3)
(2009)
John Aycock
,
Juan M. Gutiérrez Cárdenas
,
Daniel Medeiros Nunes de Castro
Code Obfuscation Using Pseudo-random Number Generators.
CSE (3)
(2009)
Eugen Staab
,
Thomas Engel
Tuning Evidence-Based Trust Models.
CSE (3)
(2009)
Benjamin Kellermann
,
Rainer Böhme
Privacy-Enhanced Event Scheduling.
CSE (3)
(2009)
Riham Hassan
,
Mohamed Eltoweissy
,
Shawn A. Bohner
,
Sherif El-Kassas
Goal-Oriented Software Security Engineering: The Electronic Smart Card Case Study.
CSE (3)
(2009)
Danesh Irani
,
Steve Webb
,
Kang Li
,
Calton Pu
Large Online Social Footprints - An Emerging Threat.
CSE (3)
(2009)
Ning Hu
,
Peidong Zhu
,
Huayang Cao
,
Kan Chen
Routing Policy Conflict Detection without Violating ISP's Privacy.
CSE (3)
(2009)
Sara Motahari
,
Sotirios G. Ziavras
,
Mor Naaman
,
Mohamed Ismail
,
Quentin Jones
Social Inference Risk Modeling in Mobile and Social Applications.
CSE (3)
(2009)
Mathias Kohler
,
Achim D. Brucker
,
Andreas Schaad
ProActive Caching: Generating Caching Heuristics for Business Process Environments.
CSE (3)
(2009)
Ram Krishnan
,
Ravi S. Sandhu
A Hybrid Enforcement Model for Group-centric Secure Information Sharing.
CSE (3)
(2009)
Mark Hoogendoorn
,
S. Waqar Jaffry
The Influence of Personalities Upon the Dynamics of Trust and Reputation.
CSE (3)
(2009)
Zhitao Huang
,
Pavol Zavarsky
,
Ron Ruhl
An Efficient Framework for IT Controls of Bill 198 (Canada Sarbanes-Oxley) Compliance by Aligning COBIT 4.1, ITIL v3 and ISO/IEC 27002.
CSE (3)
(2009)
Peter Schartner
,
Stefan Rass
How to overcome the 'Trusted Node Model' in Quantum Cryptography.
CSE (3)
(2009)
Thomas Léauté
,
Boi Faltings
Privacy-Preserving Multi-agent Constraint Satisfaction.
CSE (3)
(2009)
Richard Seymour
,
Gilbert L. Peterson
A Trust-Based Multiagent System.
CSE (3)
(2009)
Gelareh Taban
,
Virgil D. Gligor
Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks.
CSE (3)
(2009)
I-Cheng Wang
,
Chih-Hao Shen
,
Kung Chen
,
Tsan-sheng Hsu
,
Churn-Jung Liau
,
Da-Wei Wang
An Empirical Study on Privacy and Secure Multi-party Computation Using Exponentiation.
CSE (3)
(2009)
Hicham Tout
,
William Hafner
Phishpin: An Identity-Based Anti-phishing Approach.
CSE (3)
(2009)
Benjamin Wasser
,
Justin Zhan
Practical Values for Privacy.
CSE (3)
(2009)
Yasuyuki Tsukada
,
Ken Mano
,
Hideki Sakurada
,
Yoshinobu Kawabe
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach.
CSE (3)
(2009)
Xusen Cheng
,
Linda A. Macaulay
,
Alex Zarifis
A Case Study of Individual Trust Development in Computer Mediated Collaboration Teams.
CSE (3)
(2009)
David Evans
,
Robert H. Warren
Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans.
CSE (3)
(2009)
Pavel Minarík
,
Jan Vykopal
,
Vojtech Krmicek
Improving Host Profiling with Bidirectional Flows.
CSE (3)
(2009)
Yeni Yuqin Li Helgesson
Managing Risks on Critical IT Systems in Public Service Organizations.
CSE (3)
(2009)
Safaa Zaman
,
Fakhri Karray
Lightweight IDS Based on Features Selection and IDS Classification Scheme.
CSE (3)
(2009)