A flexible approach to alliances of complex applications
Proceedings of the 21st international conference on Software engineering
Communications of the ACM
Initial trust, perceived risk, and the adoption of internet banking
ICIS '00 Proceedings of the twenty first international conference on Information systems
Trust and epistemic communities in biodiversity data sharing
Proceedings of the 2nd ACM/IEEE-CS joint conference on Digital libraries
Support for teaching formal methods
ACM SIGCSE Bulletin
Support for teaching formal methods
Working group reports from ITiCSE on Innovation and technology in computer science education
Journal of Network and Systems Management
Guest Editor's Introduction: High-Confidence Distributed Systems
IEEE Internet Computing
Building Trustworthy Systems: Lessons from the PTN and Internet
IEEE Internet Computing
Quality Attributes of Web Software Applications
IEEE Software
MFCS '99 Proceedings of the 24th International Symposium on Mathematical Foundations of Computer Science
Security Protocols and Specifications
FoSSaCS '99 Proceedings of the Second International Conference on Foundations of Software Science and Computation Structure, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99
Encapsulating Rules of Prudent Security Engineering
Revised Papers from the 9th International Workshop on Security Protocols
A Language-Based Approach to Security
Informatics - 10 Years Back. 10 Years Ahead.
Enhancing Survivability of Security Services Using Redundanc
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
Modelling Trust for System Design Using the i* Strategic Actors Framework
Proceedings of the workshop on Deception, Fraud, and Trust in Agent Societies held during the Autonomous Agents Conference: Trust in Cyber-societies, Integrating the Human and Artificial Perspectives
Human values, ethics, and design
The human-computer interaction handbook
Public telephone network vulnerabilities
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Protection against Indirect Overflow Attacks on Pointers
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Initial trust and the adoption of B2C e-commerce: The case of internet banking
ACM SIGMIS Database
Proceedings of the 4th ACM workshop on Digital rights management
Tolerating denial-of-service attacks using overlay networks: impact of topology
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
Exploring the effects of dependability on enterprise applications success in e-business
Proceedings of the 2006 ACM SIGMIS CPR conference on computer personnel research: Forty four years of computer personnel research: achievements, challenges & the future
Contracting over the quality aspect of security in software product markets
Proceedings of the 2nd ACM workshop on Quality of protection
Trustworthy software systems: a discussion of basic concepts and terminology
ACM SIGSOFT Software Engineering Notes
A metadata-based architectural model for dynamically resilient systems
Proceedings of the 2007 ACM symposium on Applied computing
Modeling trust in e-commerce: an approach based on user requirements
Proceedings of the ninth international conference on Electronic commerce
Automated Analysis of Java Methods for Confidentiality
CAV '09 Proceedings of the 21st International Conference on Computer Aided Verification
ER '09 Proceedings of the 28th International Conference on Conceptual Modeling
Model checking on trees with path equivalences
TACAS'07 Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems
The verifying compiler: a grand challenge for computing research
CC'03 Proceedings of the 12th international conference on Compiler construction
Proceedings of the 2007 conference on Human interface: Part II
Computer Networks: The International Journal of Computer and Telecommunications Networking
Precedence, preemption and the IETF
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Trustworthy organic computing systems: challenges and perspectives
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
Message race detection for web services by an SMT-based analysis
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
Using ELECTRE TRI outranking method to evaluate trustworthy software
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
System adaptation as a trust response in tactical ad hoc networks
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume I
Trust in human-computer interactions as measured by frustration, surprise, and workload
FAC'11 Proceedings of the 6th international conference on Foundations of augmented cognition: directing the future of adaptive systems
Preserving secrecy under refinement
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
SP'04 Proceedings of the 12th international conference on Security Protocols
Towards a comprehensive framework for secure systems development
CAiSE'06 Proceedings of the 18th international conference on Advanced Information Systems Engineering
Parsimony-Based approach for obtaining resource-efficient and trustworthy execution
LADC'05 Proceedings of the Second Latin-American conference on Dependable Computing
An idea of an independent validation of vulnerability discovery models
ESSoS'12 Proceedings of the 4th international conference on Engineering Secure Software and Systems
Decentralized governance of distributed systems via interaction control
Logic Programs, Norms and Action
Hi-index | 0.02 |
From the Publisher:This book provides an assessment of the current state of the art for building trustworthy networked information systems. It proposes directions for research in computer and network security, software technology, and system architecture. In addition, it assesses current technical and market trends in order to better inform public policy as to where progress is likely and where incentives could help.