Information Technology Reference
In-Depth Information
7. Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine.
Comput. Netw. ISDN Syst. 30(1-7), 107-117 (1998)
8. Dorfner, M.: Evaluation und Weiterentwicklung von Zertifizierungsverfahren für
biometrische Systeme: Eine exemplarische Betrachtung von Zertifizierungsver-
fahren
mit
dem
Schwerpunkt
IT-Sicherheit.
Schriftenreihe
Studien
zur
Wirtschaftsinformatik, Kovač (2012)
9. Dotzler, F.: Datenschutzrechtliche Aspekte und der Einsatz biometrischer Systeme
in Unternehmen: Eine exemplarische Betrachtung von Systemen auf der Grund-
lage des biometrischen Merkmals Tippverhalten. Kölner Wissenschaftsverlag, Köln
(2010)
10. Eckert, C.: IT-Sicherheit: Konzepte, Verfahren, Protokolle, 6th edn. Oldenbourg,
München (2009)
11. Gómez Mármol, F., Martínez Pérez, G.: State of the art in trust and reputation
models in P2P networks. In: Handbook of Peer-to-Peer Networking, pp. 761-784.
Springer (2010)
12. Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Com-
munications Surveys Tutorials 3(4), 2-16 (2000)
13. Herzig, A., Lorini, E., Huebner, J.F., Vercouter, L.: A logic of trust and reputation.
Logic Journal of IGPL 18(1), 214-244 (2010)
14. Huang, J., Fox, M.S.: An ontology of trust: formal semantics and transitivity. In:
Proceedings of the 8th International Conference on Electronic Commerce: The New
e-commerce: Innovations for Conquering Current Barriers, Obstacles and Limita-
tions to Conducting Successful Business on the Internet, ICEC 2006, pp. 259-270.
ACM, New York (2006)
15. Jain, A., Flynn, P., Ross, A. (eds.): Handbook of Biometrics. Springer, New York
(2007)
16. Janakiraman, R., Sim, T.: Keystroke Dynamics in a General Setting. In: Lee, S.-
W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 584-593. Springer, Heidelberg
(2007)
17. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for
online service provision. Decis. Support Syst. 43(2), 618-644 (2007)
18. Mather, T., Kumaraswamy, S., Latif, S.: Cloud security and privacy (an enter-
prise perspective on risks and compliance), 1st edn. Theory in practice. O'Reilly,
Sebastopol (2009)
19. Oxford Dictionaries (visited on April 15, 2012)
20. Senk, C., Dotzler, F.: Biometric Authentication as a Service for Enterprise Identity
Management Deployment: A Data Protection Perspective. In: Sixth International
Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria,
pp. 43-50. IEEE (2011)
21. Wang, Y.D., Emurian, H.H.: An overview of online trust: Concepts, elements, and
implications. Computers in Human Behavior 21, 105-125 (2005)
22. Work, F., Bonatti, P.A., Shahmehri, N., Duma, C., Olmedilla, D., Nejdl, W., Bal-
doni, M., Baroglio, C., Martelli, A., Coraggio, P., Antoniou, G., Peer, J., Fuchs,
N.E.: Rule-based policy specification: State of the art and future work (2004)
 
Search WWH ::




Custom Search