派博傳思國(guó)際中心

標(biāo)題: Titlebook: Collaborative, Trusted and Privacy-Aware e/m-Services; 12th IFIP WG 6.11 Co Christos Douligeris,Nineta Polemi,Winfried Lamersd Conference p [打印本頁(yè)]

作者: 哪能仁慈    時(shí)間: 2025-3-21 16:52
書(shū)目名稱Collaborative, Trusted and Privacy-Aware e/m-Services影響因子(影響力)




書(shū)目名稱Collaborative, Trusted and Privacy-Aware e/m-Services影響因子(影響力)學(xué)科排名




書(shū)目名稱Collaborative, Trusted and Privacy-Aware e/m-Services網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱Collaborative, Trusted and Privacy-Aware e/m-Services網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱Collaborative, Trusted and Privacy-Aware e/m-Services被引頻次




書(shū)目名稱Collaborative, Trusted and Privacy-Aware e/m-Services被引頻次學(xué)科排名




書(shū)目名稱Collaborative, Trusted and Privacy-Aware e/m-Services年度引用




書(shū)目名稱Collaborative, Trusted and Privacy-Aware e/m-Services年度引用學(xué)科排名




書(shū)目名稱Collaborative, Trusted and Privacy-Aware e/m-Services讀者反饋




書(shū)目名稱Collaborative, Trusted and Privacy-Aware e/m-Services讀者反饋學(xué)科排名





作者: 流利圓滑    時(shí)間: 2025-3-21 23:56
Order Effects in Observations of Stated and Revealed Privacy Preferencesks, doubts about sustainability of trusted relationships remain. Surveying consumers about their preferences reveals severe concerns about the fate of their personal data. In stark contrast to privacy concerns (stated preferences), however, consumers generously disclose personal data in exchange for
作者: 裁決    時(shí)間: 2025-3-22 03:57
A User Privacy Protection Technique for Executing SQL over Encrypted Data in Database Outsourcing Senificant research questions relate to data confidentiality and user privacy. Encryption was regarded as a solution for data confidentiality. The privacy of a user is characterized by the query he poses to the server and its result. We explore the techniques to execute the SQL query over the encrypte
作者: 隱士    時(shí)間: 2025-3-22 07:44
Assessing Emotions Related to Privacy and Trust in Personalized Servicesess and anxiety were chosen. A sample of 182 online shoppers was used to assess the effect of privacy and trust on their emotions through personalized services, and how these emotions ultimately affect their purchase intentions. The findings indicate that privacy affects anxiety while trust affects
作者: 伸展    時(shí)間: 2025-3-22 11:10
Trust and Privacy in the Shift from E-Commerce to M-Commerce: A Comparative Approachpts and re-examining their antecedents in the mobile context. This paper attempts a comparative approach to the issues of trust and privacy in e-commerce and m-commerce. It investigates how trust and privacy are differentiated with the shift from the context of e-commerce to the context of m-commerc
作者: SCORE    時(shí)間: 2025-3-22 16:25
A Cloud Provider Description Schema for Meeting Legal Requirements in Cloud Federation Scenarios Clouds and federated Clouds. Existing legislation currently creates constraints and boundaries in the free usage of external Cloud providers. The aim of this paper is to provide a schema definition and usage mechanism (CPDS) that includes various levels of legal information that is necessary for au
作者: SCORE    時(shí)間: 2025-3-22 20:18

作者: Overstate    時(shí)間: 2025-3-22 21:49
A Methodology for the Development and Verification of Access Control Systems in Cloud Computingd computing has a great impact on different type of users from individual consumers and businesses to small and medium size (SMBs) and enterprise businesses. Although there are many benefits to adopting Cloud computing, there are significant barriers to adoption, viz. security and privacy. In this p
作者: fodlder    時(shí)間: 2025-3-23 03:11
Simple Mail Delivery Protocolh both origin and destination email servers. Messages are kept to the origin email server until a confirmation from the recipient is issued though the destination email server. Therefore, spam email doesn’t travel the Internet and doesn’t overload the destination email server and recipient’s mailbox
作者: conduct    時(shí)間: 2025-3-23 06:21
Why Are Users of Social Media Inclined to Word-of-Mouth?d services. However, there is much debate in the academic and business community about the effectiveness of social media as a platform for marketing. Specifically, practitioners are concerned with how Word-of-Mouth (WOM) is spread through these sites, and what aspects facilitate users in doing so. T
作者: Carcinoma    時(shí)間: 2025-3-23 10:11

作者: oxidize    時(shí)間: 2025-3-23 16:14
Evaluation of Spectrum Rights for Radio Broadcasting Operatorsf the most tightly regulated resources of all time, since every wireless device, from mobile phones to traditional radio devices, depends on access to the radio frequency wireless spectrum. Due to the scarcity of radio spectrum, the available number of radio broadcasting licenses is limited, therefo
作者: LATE    時(shí)間: 2025-3-23 18:54
Using the NETC@RDS Approach as a Basis for Cross-Border Electronic Authenticationfor different purposes and applications. However, a major characteristic of all these systems is that they are basically available in a national context. For example, European citizens that move freely through the Member-States face the problem that their eIDs from their home state do not allow acce
作者: Nonflammable    時(shí)間: 2025-3-24 01:54

作者: 詞根詞綴法    時(shí)間: 2025-3-24 04:55
Discovering Authentication Credentials in Volatile Memory of Android Mobile Devicesools. The experiments that we carried out for each application included two different sets: In the first set, our goal was to check if we could recover our own submitted credentials from the memory dump of the mobile device. In the second set of experiments, the goal was to find patterns that can in
作者: Focus-Words    時(shí)間: 2025-3-24 09:43
Conceptualizing Perceived Benefits and Investigating Its Role in Adoption of Tablet Computers among or user acceptance of tablet computers. The model was tested among newspaper subscribers (n = 904) in one of the Nordic countries using Structural Equation Modeling (SEM)..The findings suggest that attitude toward tablet devices is predicted by eco-consciousness, ease of use, social prestige, and ex
作者: motivate    時(shí)間: 2025-3-24 14:32

作者: 杠桿    時(shí)間: 2025-3-24 17:17

作者: Gerontology    時(shí)間: 2025-3-24 22:26
Coupons as Monetary Incentives in Participatory Sensingns as incentives in order to stimulate users participation, especially in applications that rely on real-time data. We argue that coupons do not only function as incentives to increase user participation, but they can also direct more people to the targeted sensing area, increasing the overall utili
作者: Plaque    時(shí)間: 2025-3-25 03:00
Charlotte Croft,Altricia Dawsonsponse of legislation to technological evolution is unlikely to allow law keeping up pace with and responding to the needs of society for technology regulation. This is likely to create a rift between on one hand the perceived need of society for technology regulation and on the other, the ability o
作者: 俗艷    時(shí)間: 2025-3-25 04:03

作者: dainty    時(shí)間: 2025-3-25 10:20
Xu Han,Niam Yaraghi,Ram D. Gopalnificant research questions relate to data confidentiality and user privacy. Encryption was regarded as a solution for data confidentiality. The privacy of a user is characterized by the query he poses to the server and its result. We explore the techniques to execute the SQL query over the encrypte
作者: 勉勵(lì)    時(shí)間: 2025-3-25 12:22

作者: 冒煙    時(shí)間: 2025-3-25 17:18
https://doi.org/10.1007/978-3-319-92780-0pts and re-examining their antecedents in the mobile context. This paper attempts a comparative approach to the issues of trust and privacy in e-commerce and m-commerce. It investigates how trust and privacy are differentiated with the shift from the context of e-commerce to the context of m-commerc
作者: 小爭(zhēng)吵    時(shí)間: 2025-3-25 20:43
Gisèle Sapiro,Eric Brun,Clarisse Fordant Clouds and federated Clouds. Existing legislation currently creates constraints and boundaries in the free usage of external Cloud providers. The aim of this paper is to provide a schema definition and usage mechanism (CPDS) that includes various levels of legal information that is necessary for au
作者: 實(shí)施生效    時(shí)間: 2025-3-26 02:05

作者: 沙漠    時(shí)間: 2025-3-26 08:22

作者: 軌道    時(shí)間: 2025-3-26 09:56
The Institutions and the Ideologyh both origin and destination email servers. Messages are kept to the origin email server until a confirmation from the recipient is issued though the destination email server. Therefore, spam email doesn’t travel the Internet and doesn’t overload the destination email server and recipient’s mailbox
作者: 表狀態(tài)    時(shí)間: 2025-3-26 14:26

作者: ticlopidine    時(shí)間: 2025-3-26 18:50

作者: mechanism    時(shí)間: 2025-3-26 22:57

作者: 讓空氣進(jìn)入    時(shí)間: 2025-3-27 02:14

作者: Nuance    時(shí)間: 2025-3-27 06:11
Francisco J. Medina,Nuria Gamerohospital information system, it is extremely important to ensure that it offers the best functionalities and that users are satisfied. With this analysis it is intended to gather information about the system, in order to improve the EHR implemented in the hospital. In the end, and appending to the r
作者: ALLEY    時(shí)間: 2025-3-27 10:32
Discussion Topics of Internet Governance,ools. The experiments that we carried out for each application included two different sets: In the first set, our goal was to check if we could recover our own submitted credentials from the memory dump of the mobile device. In the second set of experiments, the goal was to find patterns that can in
作者: 濕潤(rùn)    時(shí)間: 2025-3-27 14:08

作者: 運(yùn)氣    時(shí)間: 2025-3-27 18:33

作者: reserve    時(shí)間: 2025-3-27 21:56
https://doi.org/10.1007/978-3-030-21118-9reasons. This work takes advantage of an experimental smart grid deployment scenario to propose the concept of Social Eco-feedback Technology. It aims at establishing this relation by promoting a new social affordance (behavior pattern), favoring a new way of perceiving energy. The concept of afford
作者: 難解    時(shí)間: 2025-3-28 03:09

作者: 單純    時(shí)間: 2025-3-28 07:21
Collaborative, Trusted and Privacy-Aware e/m-Services978-3-642-37437-1Series ISSN 1868-4238 Series E-ISSN 1868-422X
作者: Budget    時(shí)間: 2025-3-28 13:21
Christos Douligeris,Nineta Polemi,Winfried LamersdState-of-the-art research.Fast-track conference proceedings.Unique visibility
作者: CERE    時(shí)間: 2025-3-28 15:17
IFIP Advances in Information and Communication Technologyhttp://image.papertrans.cn/c/image/229491.jpg
作者: 骯臟    時(shí)間: 2025-3-28 21:36

作者: Incumbent    時(shí)間: 2025-3-29 00:12

作者: Kinetic    時(shí)間: 2025-3-29 06:55

作者: 牽連    時(shí)間: 2025-3-29 08:09
The Institutions and the Ideologyontrol models, and verification of access control systems against organizational security requirements using techniques that are based on formal methods. A proof of concept example is provided that demonstrates the application of the proposed methodology on Cloud computing systems.
作者: 假設(shè)    時(shí)間: 2025-3-29 14:52

作者: Obloquy    時(shí)間: 2025-3-29 17:14

作者: GONG    時(shí)間: 2025-3-29 23:45

作者: 下邊深陷    時(shí)間: 2025-3-30 00:55
A Methodology for the Development and Verification of Access Control Systems in Cloud Computingontrol models, and verification of access control systems against organizational security requirements using techniques that are based on formal methods. A proof of concept example is provided that demonstrates the application of the proposed methodology on Cloud computing systems.
作者: growth-factor    時(shí)間: 2025-3-30 06:58

作者: Commission    時(shí)間: 2025-3-30 12:04
Using the NETC@RDS Approach as a Basis for Cross-Border Electronic Authenticationve the cross-border interoperability of electronic identification and authentication systems. ENISA, the European agency for the security of computer systems and networks, recently published a report dealing with an important aspect of this problem: the security issues in cross-border electronic aut
作者: Esophagitis    時(shí)間: 2025-3-30 13:14
Collaborative, Trusted and Privacy-Aware e/m-Services12th IFIP WG 6.11 Co
作者: Mere僅僅    時(shí)間: 2025-3-30 19:27
https://doi.org/10.1007/978-3-031-24212-0happiness, while both emotions have significant influence on customers’ intention to buy through personalized services. The study concludes with theoretical and practical implications, limitations, and future research directions.
作者: committed    時(shí)間: 2025-3-30 23:28

作者: Left-Atrium    時(shí)間: 2025-3-31 00:58
Discussion Topics of Internet Governance,dicate where the credentials are located in a memory dump of an Android device. The results revealed that the majority of the Android applications are vulnerable to credentials discovery even in case of applications that their security is critical, such as web banking and password manager applications.
作者: rheumatism    時(shí)間: 2025-3-31 08:58
1868-4238 e 12th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2013, held in Athens, Greece, in April 2013. The 25 revised papers presented together with a keynote speech were carefully reviewed and selected from numerous submissions. They are organized in the following topical sections
作者: 壯麗的去    時(shí)間: 2025-3-31 12:01
https://doi.org/10.1007/978-3-319-92780-0rce and m-commerce. It investigates how trust and privacy are differentiated with the shift from the context of e-commerce to the context of m-commerce. Our analysis is supported by the results of an exploratory qualitative study in m-commerce.
作者: DEFER    時(shí)間: 2025-3-31 16:28

作者: CROAK    時(shí)間: 2025-3-31 19:43





歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
龙川县| 德安县| 普陀区| 宁乡县| 年辖:市辖区| 邢台县| 绵竹市| 福泉市| 资中县| 临沂市| 赣州市| 巴楚县| 乃东县| 南漳县| 柘荣县| 玛纳斯县| 汉源县| 攀枝花市| 乌恰县| 佳木斯市| 八宿县| 微山县| 环江| 永嘉县| 荔波县| 武安市| 广饶县| 南郑县| 盘山县| 大关县| 涿鹿县| 高平市| 曲水县| 祁连县| 盐山县| 苗栗县| 资兴市| 白玉县| 平和县| 安徽省| 卢湾区|