標(biāo)題: Titlebook: Cyber Security and Privacy; Trust in the Digital Massimo Felici Conference proceedings 2013 Springer-Verlag Berlin Heidelberg 2013 data pri [打印本頁(yè)] 作者: Carter 時(shí)間: 2025-3-21 17:41
書(shū)目名稱(chēng)Cyber Security and Privacy影響因子(影響力)
書(shū)目名稱(chēng)Cyber Security and Privacy影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Cyber Security and Privacy網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Cyber Security and Privacy網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Cyber Security and Privacy被引頻次
書(shū)目名稱(chēng)Cyber Security and Privacy被引頻次學(xué)科排名
書(shū)目名稱(chēng)Cyber Security and Privacy年度引用
書(shū)目名稱(chēng)Cyber Security and Privacy年度引用學(xué)科排名
書(shū)目名稱(chēng)Cyber Security and Privacy讀者反饋
書(shū)目名稱(chēng)Cyber Security and Privacy讀者反饋學(xué)科排名
作者: BARK 時(shí)間: 2025-3-21 22:28
Bringing Accountability to the Cloud: Addressing Emerging Threats and Legal Perspectives vulnerabilities. This paper discusses how accountability addresses emerging issues and legal perspectives in cloud ecosystems. In particular, it introduces an accountability model tailored to the cloud. It presents on-going work within the Cloud Accountability Project, highlighting both legal and technical aspects of accountability.作者: 生氣的邊緣 時(shí)間: 2025-3-22 01:59 作者: 斜谷 時(shí)間: 2025-3-22 04:41 作者: 清澈 時(shí)間: 2025-3-22 09:16
Modelling of Integrated Trust, Governance and Accessnd in sharing between the police and their community partners. The research aims to abstract the relationships between domains, organisations and units, into a formal definition, and then implement these as governance rules, and using the trust relationship definition, and the rules.作者: aptitude 時(shí)間: 2025-3-22 15:24 作者: aptitude 時(shí)間: 2025-3-22 17:46 作者: Pepsin 時(shí)間: 2025-3-22 23:16
Hypoxic and Anoxic Brain Damages; the afternoon session looked in further detail at options and possibilities for the structure and modus operandi for a project cluster, ways forward towards a NIS Platform, and extending participation, influence, and effect to projects outside the immediate ICT trust and security community.作者: Dorsal-Kyphosis 時(shí)間: 2025-3-23 01:32 作者: LIMIT 時(shí)間: 2025-3-23 07:20
Coordination of Trust and Security Project Clusterings; the afternoon session looked in further detail at options and possibilities for the structure and modus operandi for a project cluster, ways forward towards a NIS Platform, and extending participation, influence, and effect to projects outside the immediate ICT trust and security community.作者: Introduction 時(shí)間: 2025-3-23 10:23 作者: 我悲傷 時(shí)間: 2025-3-23 16:17
Die Untersuchung der Milch auf Fettgehalt speaking mobile smart devices, to access the Cloud, introduced recently in the area the concept of Mobile Cloud. Scope of this paper is to address the security and privacy aspects of the mobile cloud phenomenon, under the citizen perspective, taking as driving example the context of commercial mobile transactions.作者: headlong 時(shí)間: 2025-3-23 19:54 作者: outset 時(shí)間: 2025-3-23 22:50 作者: CURL 時(shí)間: 2025-3-24 04:49 作者: graphy 時(shí)間: 2025-3-24 06:49
The Origins of Creative Personalityun-time without user intervention. The mechanism unifies the verification of imported properties and the digital signing and storage of properties associated with both atomic and composed services. These integrated capabilities form a novel approach discussed and situated in the context of the case study.作者: Manifest 時(shí)間: 2025-3-24 12:43
B. Levyant,B. Stuchebrukov,Y. Loginovg their tools and practices towards society and its citizens. We further propose enhancements of eVoting techniques that address these aspects, based on a new privacy preserving authentication technology, the . or ABCs.作者: 天氣 時(shí)間: 2025-3-24 18:06 作者: 親屬 時(shí)間: 2025-3-24 20:43 作者: Cumbersome 時(shí)間: 2025-3-25 02:23
Attribute Based Credentials Towards Refined Public Consultation Results and Effective eGovernanceg their tools and practices towards society and its citizens. We further propose enhancements of eVoting techniques that address these aspects, based on a new privacy preserving authentication technology, the . or ABCs.作者: 頑固 時(shí)間: 2025-3-25 06:53 作者: Lobotomy 時(shí)間: 2025-3-25 11:27
Towards Trustworthiness Assurance in the Clouderns about aspects like security, compliance, dependability can arise. Therefore, users have to make trust decisions with respect to software providers, with the hope that there will not be any detrimental consequences. To contrast this situation, the paper proposes a framework to define, assess, mo作者: zonules 時(shí)間: 2025-3-25 14:17 作者: 耕種 時(shí)間: 2025-3-25 18:47
Bringing Accountability to the Cloud: Addressing Emerging Threats and Legal Perspectives cloud consumers and providers increases the complexity of data governance in cloud ecosystems, a problem which is exacerbated by emerging threats and vulnerabilities. This paper discusses how accountability addresses emerging issues and legal perspectives in cloud ecosystems. In particular, it intr作者: 雀斑 時(shí)間: 2025-3-25 23:09
Introducing Life Management Platforms and Collaborative Service Fusion to Contextual Environmentst of People, Things, and Services (IoPTS). Our approach connects dynamic gathering of user requirements and feedback with community based service fusion in any phase of a service life cycle. These highly adaptive services allow agile service creation and exploitation embedding the users by fusing hi作者: GEM 時(shí)間: 2025-3-26 02:22 作者: LAIR 時(shí)間: 2025-3-26 04:25 作者: 鉤針織物 時(shí)間: 2025-3-26 11:35 作者: 闖入 時(shí)間: 2025-3-26 15:42
Modelling of Integrated Trust, Governance and Access Binary Decision Diagrams (BDDs), and outlines how this integrates with an information sharing architecture known as safi.re (Structured Analysis and Filtering Engine). This architecture has been used on a number of information sharing projects, including within health and social care integration, a作者: 珠寶 時(shí)間: 2025-3-26 20:00
A Marketplace for Business Software with Certified Security Propertiesdependent Software Vendors (ISVs). ISVs, in turn develop applications and services on these platforms and sell these software products to customers, through the marketplace..While these products are usually accompanied with descriptions of their functionality, it is hard for customers to reliably de作者: 網(wǎng)絡(luò)添麻煩 時(shí)間: 2025-3-26 23:57 作者: misanthrope 時(shí)間: 2025-3-27 01:42
Extending Attribute Based Access Control to Facilitate Trust in eHealth and Other Applicationsmechanism. The model lends itself to the generation of explanations and permissions review, which can be used to foster end-user trust and confidence in the authorization system. We illustrate using a scenario in which a patient, with the assistance of an information specialist, develops consent dir作者: Monotonous 時(shí)間: 2025-3-27 07:24
Coordination of Trust and Security Project ClusteringPrivacy EU Forum (CSP 2013) to collectively address their roles, and, in particular, how they might work together within a Project Cluster framework to the advantage of the research and innovation projects and to the programme as a whole, and particularly in the context of significant recent EU init作者: 藝術(shù) 時(shí)間: 2025-3-27 13:05
Electronic Identity Adoption: Online Surveyd an online survey on the use of electronic identity (eID) in 2012. The fundamental goal of the survey was to collect the information on the use of electronic identity by the wider European public and its opinions on eID regulation, use, and privacy issues. The 2012 eID Adoption Survey is a continua作者: Venules 時(shí)間: 2025-3-27 16:38
Anti-War Era: The Need for Proactive Cyber Securityin the cyber domain. Those strategies mitigate conflicts through direct, non-lethal and . means. This paper argues that the international arena, with all its stakeholders, is entering a new era, creating an intense need for a holistic and proactive cyber security behaviour to counter the increasing 作者: 不成比例 時(shí)間: 2025-3-27 18:03 作者: Extricate 時(shí)間: 2025-3-27 22:59 作者: mastoid-bone 時(shí)間: 2025-3-28 03:25
A Marketplace for Business Software with Certified Security Propertiesh specific security and regulatory requirements..Building on recent research results on service security certification, which are available as part of the . framework, in this paper we present a certification-aware Business-Software marketplace where software products have explicit, transparent, and作者: 支柱 時(shí)間: 2025-3-28 10:06 作者: 笨拙的我 時(shí)間: 2025-3-28 12:30
Electronic Identity Adoption: Online Surveyjor findings of the survey according to the research topics: use of electronic identity, use of e-signature, opinions on eID regulation and policy, privacy issues, eID federation, and secure electronic document exchange.作者: conduct 時(shí)間: 2025-3-28 18:10 作者: CLAY 時(shí)間: 2025-3-28 19:44 作者: Intruder 時(shí)間: 2025-3-28 23:33
B. V. Levyant,A. L. Bavikin,S. L. Bavikinh specific security and regulatory requirements..Building on recent research results on service security certification, which are available as part of the . framework, in this paper we present a certification-aware Business-Software marketplace where software products have explicit, transparent, and作者: 碳水化合物 時(shí)間: 2025-3-29 03:46
Kashirskaya Metro Station Mall, A permission consists of a set of classifier values, and permissions review/determining an individual’s risk exposure is carried out by database querying. The model has general applicability to areas where tightly-controlled sharing of data and applications, with well-defined overrides, is required作者: gene-therapy 時(shí)間: 2025-3-29 09:18 作者: 永久 時(shí)間: 2025-3-29 11:36 作者: MUTED 時(shí)間: 2025-3-29 18:08
https://doi.org/10.1007/978-3-642-41205-9data privacy; electronic identity; information sharing; mobile devices; service composition作者: Odyssey 時(shí)間: 2025-3-29 20:45 作者: 生命 時(shí)間: 2025-3-30 01:07 作者: 脆弱吧 時(shí)間: 2025-3-30 07:36 作者: monogamy 時(shí)間: 2025-3-30 08:15 作者: ALB 時(shí)間: 2025-3-30 12:44 作者: aplomb 時(shí)間: 2025-3-30 18:48
https://doi.org/10.1007/978-3-319-29436-0t of People, Things, and Services (IoPTS). Our approach connects dynamic gathering of user requirements and feedback with community based service fusion in any phase of a service life cycle. These highly adaptive services allow agile service creation and exploitation embedding the users by fusing hi作者: Felicitous 時(shí)間: 2025-3-30 23:57
Directed Development of Systems. In this increasingly complex landscape, organizations and users are striving to deal with assurance in all phases of software life cycle: acquisition, installation, use and maintenance. In this paper, we start by describing the notion of machine-readable security certificates, and discuss how they