Linked e-resources

Details

Reputation
from Social Perception to Internet Security
Mathematical Modelling of Trust Issues in Federated Identity Management
Simple and Practical Integrity Models for Binaries and Files
Enabling NAME-Based Security and Trust
Trust Driven Strategies for Privacy by Design
Lightweight Practical Private One-Way Anonymous Messaging
Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings
Obscuring Provenance Confidential Information via Graph Transformation
Social Network Culture Needs the Lens of Critical Trust Research
Predicting Quality of Crowd sourced Annotations Using Graph Kernels
An Architecture for Trustworthy Open Data Services
1,2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space
Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation
The Detail of Trusted Messages: Retweets in a Context of Health and Fitness
Reusable Defense Components for Online Reputation Systems
Continuous Context-Aware Device Comfort Evaluation Method
Special Session: Toward Trusted Cloud Ecosystems
Foreword: Towards Trusted Cloud Ecosystems
A Cloud Orchestrator for Deploying Public Services on the Cloud {u2013} The Case of STRATEGIC Project
Integrating Security Services in Cloud Service Stores
Building an Eco-System of Trusted Services via User Control and Transparency on Personal Data
Security-as-a-Service in Multi-cloud and Federated Cloud Environments
The Role of SLAs in Building a Trusted Cloud for Europe.

Browse Subjects

Show more subjects...

Statistics

from
to
Export