DEXA 2005 Poland Pictures

Accepted Papers

3rd International Conference on Trust, Privacy, and Security in Digital Business - TrustBus '06

  • [#15] Reputation-based Trust Systems for P2P Applications: Design Issues and Classification Framework
    Eleni Koutrouli, Aphrodite Tsalgatidou

  • [#24] Towards Trust in Digital Rights Management Systems
    Juergen Nuetzel, Anja Beyer

  • [#25] Extending P3P to Facilitate Proxies which Pose as a Potential Threat to Privacy
    Wesley Brandi, Martin Olivier

  • [#28] FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy
    Guoqiang Zhan, Zude Li, Xiaojun Ye, Jianmin Wang

  • [#30] A Framework for Modeling Restricted Delegation in Service Oriented Architecture
    Muhammad Alam, Michael Hafner, Ruth Breu, Steffan Unterthiner

  • [#35] A Generic Privacy Enhancing Technology for Pervasive Computing Environments
    Stelios Dritsas, John Tsaparas, Dimitris Gritzalis

  • [#42] A Systemic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises
    Marco Casassa Mont, Siani Pearson, Robert Thyne

  • [#43] Towards Scalable Management of Privacy Obligations in Enterprises
    Marco Casassa Mont

  • [#47] A new User-centric Identity Management Infrastructure (IMI) for Federated Systems
    V. Poursalidis, C. Nikolaou

  • [#48] Information security risk assessment model for risk management
    Dariusz Wawrzyniak

  • [#51] A Secure E-tender Submission Protocol
    Rong Du, Colin Boyd, Ernest Foo

  • [#54] On the Limits of Cyber-Insurance
    Rainer Boehme, Gaurav Kataria

  • [#55] Extending SQL to Allow the Active Usage of Purposes
    Wynand van Staden, Martin Olivier

  • [#57] Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes
    Alfonso Rodr?guez, Eduardo Fern?ndez-Medina, Mario Piattini

  • [#58] Bringing the User Back Into Control -- A New Paradigm for Usability in Highly Dynamic Systems
    Sebastian H?hn

  • [#59] How to Protect a Signature for Being Shown to a Third Party
    Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks

  • [#68] On Diffusion and Confusion ? Why Electronic Signatures Have Failed.
    Heiko Rossnagel

  • [#69] A Framework for Exploiting Security Expertise in Application Development
    Theodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis Katsikas

  • [#75] A Sophisticated Solution for Revealing Attacks on Wireless LAN
    René Neumerkel, Stephan Gro?

  • [#76] Security Analysis and Improvement for Key Issuing Schemes in ID-based Cryptography
    Saeran Kwon, Sang-Ho Lee

  • [#77] Cluster-based Analysis and Recommendation of Sellers in Online Auctions
    Mikolaj Morzy, Juliusz Jezierski

  • [#78] Towards a Risk Management Perspective on AAIs
    Christian Schläger, Thomas Nowey,

  • [#79] Trust Model Architecture: Defining Prejudice by Learning
    Marika Wojcik, Jan Eloff, Hendrik Venter

  • [#83] Information leakage in ubiquitous Voice-over-IP
    Thorsten Neumann, Heiko Tillwick, Prof M. Olivier