Access Control in Cyber-Physical Spaces Using Virtual Perimeters. | 0 | 0.34 | 2021 |
Simultaneous Deauthentication of Equals Attack. | 0 | 0.34 | 2020 |
Information and Cyber Security - 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings | 0 | 0.34 | 2020 |
Information Security - 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers | 0 | 0.34 | 2019 |
A Comparison of Indoor Positioning Systems for Access Control Using Virtual Perimeters. | 1 | 0.36 | 2019 |
Access Control Requirements for Physical Spaces Protected by Virtual Perimeters. | 2 | 0.38 | 2018 |
The Design of an Identity and Access Management Assurance Dashboard Model. | 0 | 0.34 | 2018 |
Access control for secure information sharing in smart content spaces. | 1 | 0.37 | 2017 |
Engineering Secure Adaptable Web Services Compositions. | 0 | 0.34 | 2016 |
The Design of a Configurable Reputation Service | 1 | 0.39 | 2015 |
Argumentation-Based Group Decision Support for Collectivist Communities. | 0 | 0.34 | 2014 |
Introduction | 0 | 0.34 | 2014 |
TrustCV: Reputation-based trust for collectivist digital business ecosystems | 0 | 0.34 | 2014 |
Context-aware RESTful services on mobile devices. | 0 | 0.34 | 2013 |
Towards Reputation-as-a-Service | 3 | 0.42 | 2013 |
Towards trust and reputation for e-commerce in collectivist rural Africa. | 0 | 0.34 | 2012 |
Towards a Holistic Information Security Governance Framework for SOA | 1 | 0.38 | 2012 |
Web Services Security Policy Assertion Trade-offs | 0 | 0.34 | 2011 |
Enhancing Digital Business Ecosystem Trust and Reputation with Centrality Measures. | 2 | 0.46 | 2011 |
Information Security for Service Oriented Computing: Ally or Antagonist | 0 | 0.34 | 2011 |
Towards Bluetooth multi-hop messaging | 0 | 0.34 | 2011 |
Towards an Information Security Framework for Service-Oriented Architecture. | 0 | 0.34 | 2010 |
Considering web services security policy compatibility. | 3 | 0.51 | 2010 |
A Web Services security policy assistant | 0 | 0.34 | 2010 |
Evaluating Information Security Controls Applied by Service-Oriented Architecture Governance Frameworks. | 2 | 0.53 | 2009 |
An Analysis of Authentication for Passive RFID Tags. | 0 | 0.34 | 2009 |
A Framework for Web Services Security Policy Negotiation. | 1 | 0.40 | 2009 |
BlueTrust in a Real World | 0 | 0.34 | 2008 |
The Information Security of a Bluetooth-Enabled Handheld Device | 0 | 0.34 | 2008 |
Analogue Fingerprinting for Passive RFID Tags | 0 | 0.34 | 2008 |
Web Services Access Control Architecture Incorporating Trust | 3 | 0.53 | 2007 |
A trust and context aware access control model for web services conversations | 9 | 0.71 | 2007 |
A Framework for Web Services Trust | 2 | 0.39 | 2006 |
Autonomous Trust For Web Services | 3 | 0.43 | 2005 |
Metadata for trust in service-oriented architectures | 0 | 0.34 | 2005 |
An access control framework for web services | 1 | 0.41 | 2005 |
A Logic-Based Access Control Approach For Web Services | 0 | 0.34 | 2004 |