Accepted papers

TrustBus 2013 : 10th International Conference on Trust, Privacy & Security in Digital Business

  1. A better time approximation scheme for e-passports
    Charalambos Petrou, Christoforos Ntantogian, Christos Xenakis,
  2. A classification of factors influencing low adoption of PETs among SNS users
    Konstantina Vemou, Maria Karyda,
  3. A qualitative metrics vector for the awareness of smartphone security users
    Dimitris Gritzalis, Alexios Mylonas, Bill Tsoumas, Theodore Apostolopoulos,
  4. Assessing the Feasibility of Security Metrics
    Bernhard Heinzle, Steven Furnell,
  5. Defining a Trust Framework Design Process
    Mark Vinkovits, Andreas Zimmermann,
  6. Executable Model-Based Risk Analysis Method for Identity Management Systems:Using Hierarchical Colored Petri Nets
    Ebenezer Paintsil, Lothar Fritsch,
  7. Improving Kerberos Ticket Acquisition during Application Service Access Control
    Fernando Pereñíguez-García, Rafael Marin-Lopez, Antonio F. Skarmeta-Gomez,
  8. Preservation of Utility Through Hybrid k-Anonymization
    Mehmet Ercan Nergiz, Muhammed Zahit Gök, Ufuk Özkanli,
  9. Preserving the User's Privacy in Social Networking Sites
    Alexandre Viejo, Jordi Castellà-Roca, Guillem Rufián,
  10. PRoCAVE: Privacy-preserving Collection and Authenticity Validation of online Evidence
    Efthymios Lalas, Lilian Mitrou, Costas Lambrinoudakis,
  11. Risk Acceptance and Rejection for Threat and Opportunity Risks in Conflicting Incentives Risk Analysis
    Lisa Rajbhandari, Einar Snekkenes,
  12. The influence of social media use on willingness to share location information
    Bjørnar Tessem, Lars Nyre,
  13. The security of information systems in Greek hospitals
    George Aggelinos, Sokratis Katsikas,
  14. Towards Privacy-by-Design Peer-to-Peer Cloud Computing
    Leucio Antonio Cutillo, Antonio Lioy,
  15. Trust Evaluation of a System for an Activity
    Nagham Alhadad, Patricia Serrano-Alvarado, Yann Busnel, Philippe Lamarre,
  16. Trustworthy Selection of Cloud Providers based on Security and Privacy Requirements: Justifying Trust Assumptions
    Michalis Pavlidis, Haralambos Mouratidis, Christos Kalloniatis, Shareeful Islam, Stefanos Gritzalis,