-
2
-
-
33750066953
-
Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers
-
Proc. of the International Conference on E-Commerce and Web Technologies EC-Web, Springer, pp
-
C. Schläger, M. Sojer, B. Muschall, and G. Pernul, "Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers," Proc. of the International Conference on E-Commerce and Web Technologies (EC-Web 2006), Lecture Notes in Computer Science (LNCS), Vol. 4082, Springer, pp. 132-141.
-
(2006)
Lecture Notes in Computer Science (LNCS
, vol.4082
, pp. 132-141
-
-
Schläger, C.1
Sojer, M.2
Muschall, B.3
Pernul, G.4
-
4
-
-
26844545857
-
Towards an Ontology of Trust
-
Proc. of the International Conference on Trust, Privacy & Security in Digital Business TrustBus, Springer, pp
-
L. Viljanen, "Towards an Ontology of Trust.," Proc. of the International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2005), Lecture Notes in Computer Science (LNCS), Vol. 3592, Springer, pp. 175-184.
-
(2005)
Lecture Notes in Computer Science (LNCS
, vol.3592
, pp. 175-184
-
-
Viljanen, L.1
-
6
-
-
33750945474
-
Supporting Attribute-based Access Control with Ontologies
-
IEEE, pp
-
T. Priebe, W. Dobmeier, and N. Kamprath., "Supporting Attribute-based Access Control with Ontologies," Proc. of the 1st International Conference on Availability, Reliability, and Security (ARES 2006), IEEE, pp. 465-472.
-
(2006)
Proc. of the 1st International Conference on Availability, Reliability, and Security (ARES
, pp. 465-472
-
-
Priebe, T.1
Dobmeier, W.2
Kamprath, N.3
-
7
-
-
0009925685
-
Initial Trust Formation in New Organizational Relationships
-
D.H. McKnight, L.L. Cummings, and N.L. Chervany, "Initial Trust Formation in New Organizational Relationships," The Academy of Management Review, vol. 23, no. 3, 1998, pp. 473-490.
-
(1998)
The Academy of Management Review
, vol.23
, Issue.3
, pp. 473-490
-
-
McKnight, D.H.1
Cummings, L.L.2
Chervany, N.L.3
-
8
-
-
85076417348
-
Trust in E-Commerce Vendors: A Two-Stage Model
-
AIS, pp
-
D.H. McKnight, V. Choudhury, and C. Kacmar, "Trust in E-Commerce Vendors: A Two-Stage Model," Proc. of the 21st International Conference on Information Systems (ICIS 2000), AIS, pp. 532-536.
-
(2000)
Proc. of the 21st International Conference on Information Systems (ICIS
, pp. 532-536
-
-
McKnight, D.H.1
Choudhury, V.2
Kacmar, C.3
-
9
-
-
0022578592
-
Fuzzy Cognitive Maps
-
B. Kosko, "Fuzzy Cognitive Maps," International Journal of Man-Machine Studies, vol. 24, no. 1, 1986, pp. 65-75.
-
(1986)
International Journal of Man-Machine Studies
, vol.24
, Issue.1
, pp. 65-75
-
-
Kosko, B.1
-
11
-
-
26844573387
-
Authentication and Authorisation Infrastructures in b2c E-Commerce
-
Proc. of the International Conference on E-Commerce and Web Technologies EC-Web, Springer, pp
-
C. Schläger, and G. Pernul, "Authentication and Authorisation Infrastructures in b2c E-Commerce," Proc. of the International Conference on E-Commerce and Web Technologies (EC-Web 2005), Lecture Notes in Computer Science (LNCS), Vol. 3590, Springer, pp. 306-315.
-
(2005)
Lecture Notes in Computer Science (LNCS
, vol.3590
, pp. 306-315
-
-
Schläger, C.1
Pernul, G.2
-
14
-
-
84969498792
-
The Conceptualization of Trust, Risk and Their Relationship in Electronic Commerce: The Need for Clarifications
-
IEEE, pp
-
D. Gefen, V.S. Rao, and N. Tractinsky, "The Conceptualization of Trust, Risk and Their Relationship in Electronic Commerce: The Need for Clarifications," Proc. of the 36th Annual Hawaii International Conference on System Sciences (HICSS 2003), IEEE, pp. 192b.
-
(2003)
Proc. of the 36th Annual Hawaii International Conference on System Sciences (HICSS
-
-
Gefen, D.1
Rao, V.S.2
Tractinsky, N.3
-
15
-
-
33646534622
-
Trust, Privacy and Security in E-Business: Requirements and Solutions
-
Proc. of the 10th Panhellenic Conference on Informatics PCI 2005, Volas, Greece, Springer, pp
-
S. Katsikas, J. Lopez, and G. Pernul, "Trust, Privacy and Security in E-Business: Requirements and Solutions," Proc. of the 10th Panhellenic Conference on Informatics (PCI 2005), Volas, Greece, Lecture Notes in Computer Science (LNCS), Vol. 3746, Springer, pp. 548-558.
-
Lecture Notes in Computer Science (LNCS
, vol.3746
, pp. 548-558
-
-
Katsikas, S.1
Lopez, J.2
Pernul, G.3
-
17
-
-
84969508865
-
Whoops... Did I Use the Wrong Concept to Predict E-Commerce Trust? Modeling the Risk-Related Effects of Trust versus Distrust Concepts
-
IEEE, pp
-
H.D. McKnight, C. Kacmar, and V. Choudhury, "Whoops... Did I Use the Wrong Concept to Predict E-Commerce Trust? Modeling the Risk-Related Effects of Trust versus Distrust Concepts," Proc. of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03), IEEE, pp. 182.
-
Proc. of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03)
, pp. 182
-
-
McKnight, H.D.1
Kacmar, C.2
Choudhury, V.3
-
19
-
-
38949174954
-
On the Effects of Authentication and Authorisation Infrastructures on E-Commerce Environments
-
To be published in the
-
C. Schläger, and T. Nowey, "On the Effects of Authentication and Authorisation Infrastructures on E-Commerce Environments," To be published in the International Journal of Computer Systems Science & Engineering (CSSE), vol. 22, 2007.
-
(2007)
International Journal of Computer Systems Science & Engineering (CSSE)
, vol.22
-
-
Schläger, C.1
Nowey, T.2
-
20
-
-
33646149431
-
-
OASIS Security Services Technical Committee
-
OASIS Security Services Technical Committee, "Security Assertion Markup Language (SAML)," 2005; http://www.oasis-open.org/committees/ security/.
-
(2005)
Security Assertion Markup Language (SAML)
-
-
-
21
-
-
33745883651
-
extensible Access Control Markup Language (XACML)
-
OASIS extensible Access Control Markup Language Technical Committee
-
OASIS extensible Access Control Markup Language Technical Committee, "extensible Access Control Markup Language (XACML)," 2005; http://www.oasis-open.org/committees/xacml/.
-
(2005)
-
-
-
22
-
-
26844534244
-
Privacy Enhanced Technologies: Methods, Markets, Misuse
-
Proc. of the International Conference on Trust, Privacy & Security in Digital Business TrustBus, Springer, pp
-
H. Federrath, "Privacy Enhanced Technologies: Methods, Markets, Misuse," Proc. of the International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2005), Lecture Notes in Computer Science (LNCS), Vol. 3592, Springer, pp. 1-9.
-
(2005)
Lecture Notes in Computer Science (LNCS
, vol.3592
, pp. 1-9
-
-
Federrath, H.1
-
23
-
-
49049089653
-
-
A. Anderson, and H. Lockhart, SAML 2.0 Profile of XACML v2.0 (OASIS Standard), 2005; http://docs.oasis-open.org/xacml/2.0/access_control- xacml-2.0-saml-profile-spec-os.pdf.
-
A. Anderson, and H. Lockhart, "SAML 2.0 Profile of XACML v2.0 (OASIS Standard)," 2005; http://docs.oasis-open.org/xacml/2.0/access_control- xacml-2.0-saml-profile-spec-os.pdf.
-
-
-
|