网络添麻烦 发表于 2025-3-26 23:57:37

http://reply.papertrans.cn/25/2418/241763/241763_31.png

misanthrope 发表于 2025-3-27 01:42:45

Extending Attribute Based Access Control to Facilitate Trust in eHealth and Other Applicationsmechanism. The model lends itself to the generation of explanations and permissions review, which can be used to foster end-user trust and confidence in the authorization system. We illustrate using a scenario in which a patient, with the assistance of an information specialist, develops consent dir

Monotonous 发表于 2025-3-27 07:24:34

Coordination of Trust and Security Project ClusteringPrivacy EU Forum (CSP 2013) to collectively address their roles, and, in particular, how they might work together within a Project Cluster framework to the advantage of the research and innovation projects and to the programme as a whole, and particularly in the context of significant recent EU init

艺术 发表于 2025-3-27 13:05:47

Electronic Identity Adoption: Online Surveyd an online survey on the use of electronic identity (eID) in 2012. The fundamental goal of the survey was to collect the information on the use of electronic identity by the wider European public and its opinions on eID regulation, use, and privacy issues. The 2012 eID Adoption Survey is a continua

Venules 发表于 2025-3-27 16:38:28

Anti-War Era: The Need for Proactive Cyber Securityin the cyber domain. Those strategies mitigate conflicts through direct, non-lethal and . means. This paper argues that the international arena, with all its stakeholders, is entering a new era, creating an intense need for a holistic and proactive cyber security behaviour to counter the increasing

不成比例 发表于 2025-3-27 18:03:05

http://reply.papertrans.cn/25/2418/241763/241763_36.png

Extricate 发表于 2025-3-27 22:59:48

http://reply.papertrans.cn/25/2418/241763/241763_37.png

mastoid-bone 发表于 2025-3-28 03:25:44

A Marketplace for Business Software with Certified Security Propertiesh specific security and regulatory requirements..Building on recent research results on service security certification, which are available as part of the . framework, in this paper we present a certification-aware Business-Software marketplace where software products have explicit, transparent, and

支柱 发表于 2025-3-28 10:06:47

http://reply.papertrans.cn/25/2418/241763/241763_39.png

笨拙的我 发表于 2025-3-28 12:30:25

Electronic Identity Adoption: Online Surveyjor findings of the survey according to the research topics: use of electronic identity, use of e-signature, opinions on eID regulation and policy, privacy issues, eID federation, and secure electronic document exchange.
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Cyber Security and Privacy; Trust in the Digital Massimo Felici Conference proceedings 2013 Springer-Verlag Berlin Heidelberg 2013 data pri