Academic literature on the topic 'Trust by the way of security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Trust by the way of security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Trust by the way of security"
Hungerford, Thomas. "A Better Way to Invest the Social Security Trust Fund." Challenge 49, no. 3 (2006): 90–104. http://dx.doi.org/10.2753/cha0577-5132490306.
Full textWang, Haoxiang. "Review on Trust Building Algorithms in IoT Security." Journal of ISMAC 3, no. 4 (2022): 326–37. http://dx.doi.org/10.36548/jismac.2021.4.004.
Full textBräunlich, Katharina, and Rüdiger Grimm. "Development of A Formal Security Model for Electronic Voting Systems." International Journal of Information Security and Privacy 7, no. 2 (2013): 1–28. http://dx.doi.org/10.4018/jisp.2013040101.
Full textGhazali, Osman, Chun Yang Leow, Shahzad Qaiser, et al. "Cloud-Based Global Online Marketplaces Review on Trust and Security." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 04 (2019): 96. http://dx.doi.org/10.3991/ijim.v13i04.10523.
Full textZhakshylykova, T. A. "Psychological trust in social networks." Social'naja politika i social'noe partnerstvo (Social Policy and Social Partnership), no. 8 (August 7, 2022): 542–46. http://dx.doi.org/10.33920/pol-01-2208-04.
Full textNajib, Warsun, Selo Sulistyo, and Widyawan. "QS-Trust: An IoT ecosystem security model incorporating quality of service and social factors for trust assessment." Communications in Science and Technology 9, no. 1 (2024): 153–60. http://dx.doi.org/10.21924/cst.9.1.2024.1419.
Full textKim, Sangyoung, and Taebok Lee. "Factors affecting information security compliance intention of military officer." Journal of Advances in Military Studies 5, no. 1 (2022): 5–33. http://dx.doi.org/10.37944/jams.v5i1.138.
Full textOrkida, Ilollari, and Islami Manjola. "Auditing as a way to increase cyber security." ECONOMICUS, no. 15 (March 24, 2017): 71–89. https://doi.org/10.5281/zenodo.7584751.
Full textVenkadesan Perumal. "Zero Trust SD-WAN: Enhancing Security and Efficiency in the Medical Industry." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1386–400. https://doi.org/10.32628/cseit25112495.
Full textSurendra N Koritala. "Zero-trust security models in financial planning systems." World Journal of Advanced Research and Reviews 25, no. 3 (2025): 2161–71. https://doi.org/10.30574/wjarr.2025.25.3.0944.
Full textDissertations / Theses on the topic "Trust by the way of security"
Urban, Michael Crawford. "Imagined security : collective identification, trust, and the liberal peace." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:92c67271-8953-46a8-b155-058fb5733881.
Full textManor, Mike. "The home front : civil rights, American values, and public trust when America is at war /." Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=cfa77bfd-34c7-403f-9f65-cbb4037fa454&rs=PublishedSearch.
Full textLemaitre, Freddy. "La monnaie comme objet de sûretés." Thesis, Paris 2, 2014. http://www.theses.fr/2014PA020044.
Full textGilberg, Ole Rasmus. "Cloud Security without Trust." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-26713.
Full textKarthik, Krishna FNU. "Vehicular Security using Trust Management." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/theses/2740.
Full textLeonhard, Julian. "Analog hardware security and trust." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS246.
Full textBilgic, Ali. "Transcending Europe's immigration security dilemma : security, trust, and hospitality." Thesis, Aberystwyth University, 2010. http://hdl.handle.net/2160/452c3109-1597-4d36-ac4a-7392183a7c1a.
Full textElsalamouny, Ehab M. "Probablistic trust models in network security." Thesis, University of Southampton, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.536340.
Full textEl, Salamouny Ehab. "Probabilistic trust models in network security." Thesis, University of Southampton, 2011. https://eprints.soton.ac.uk/179163/.
Full textPoirrier, Alexandre. "Formal Security of Zero Trust Architectures." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAX050.
Full textBooks on the topic "Trust by the way of security"
Bacevich, A. J. Breach of trust: How Americans failed their soldiers and their country. Metropolitan Books, Henry Holt and Company, 2013.
Find full textBörsch-Supan, Axel. The German public pension system: How it was, how it will be. National Bureau of Economic Research, 2004.
Find full textBörsch-Supan, Axel. The German public pension system: How it was, how it will be. National Bureau of Economic Research, 2004.
Find full textGarbis, Jason, and Jerry W. Chapman. Zero Trust Security. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6702-8.
Full textRoman, Rodrigo, and Jianying Zhou, eds. Security and Trust Management. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91859-0.
Full textKatsikas, Sokratis K., and Cristina Alcaraz, eds. Security and Trust Management. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01141-3.
Full textBarthe, Gilles, Evangelos Markatos, and Pierangela Samarati, eds. Security and Trust Management. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46598-2.
Full textJøsang, Audun, Pierangela Samarati, and Marinella Petrocchi, eds. Security and Trust Management. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38004-4.
Full textAccorsi, Rafael, and Silvio Ranise, eds. Security and Trust Management. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41098-7.
Full textSklavos, Nicolas, Ricardo Chaves, Giorgio Di Natale, and Francesco Regazzoni, eds. Hardware Security and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-44318-8.
Full textBook chapters on the topic "Trust by the way of security"
Singh, Rajiv Ranjan, José Moreira, Tom Chothia, and Mark D. Ryan. "Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties." In Security and Trust Management. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59817-4_1.
Full textFischer-Hübner, Simone, and Farzaneh Karegar. "Addressing Challenges: A Way Forward." In Synthesis Lectures on Information Security, Privacy, and Trust. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-54158-2_5.
Full textWazan, Ahmad Samer, Romain Laborde, David W. Chadwick, François Barrere, and AbdelMalek Benzekri. "Which Web Browsers Process SSL Certificates in a Standardized Way?" In Emerging Challenges for Security, Privacy and Trust. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01244-0_38.
Full textGolia, Silvia. "Trust and security in Italy." In Proceedings e report. Firenze University Press and Genova University Press, 2023. http://dx.doi.org/10.36253/979-12-215-0106-3.42.
Full textChiru, Irena, Cristina Ivan, and Silviu Paicu. "Reforming Intelligence in Ukraine: The Past, Present, and Future." In Contributions to Security and Defence Studies. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-66434-2_17.
Full textBonura, Susanna, Davide dalle Carbonare, Roberto Díaz-Morales, Ángel Navia-Vázquez, Mark Purcell, and Stephanie Rossello. "Increasing Trust for Data Spaces with Federated Learning." In Data Spaces. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98636-0_5.
Full textPark, Eun G. "Trust in Virtual Communities." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch165.
Full textVashishth, Tarun Kumar, Vikas Sharma, Kewal Krishan Sharma, Bhupendra Kumar, Sachin Chaudhary, and Rajneesh Panwar. "Enhancing Cloud Security." In Improving Security, Privacy, and Trust in Cloud Computing. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-1431-9.ch004.
Full textBrosso, Ines, and Alessandro La Neve. "Information Security Management Based on Adaptive Security Policy Using User Behavior Analysis." In Strategic and Practical Approaches for Information Security Governance. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0197-0.ch019.
Full textOermann, Andrea, and Jana Dittmann. "Trust in E-Technologies." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch209.
Full textConference papers on the topic "Trust by the way of security"
Yang, Zhihuan, Wenlong Tian, Ruixuan Li, Xuming Ye, and Zhiyong Xu. "Who Owns the Cloud Data? Exploring a non-interactive way for secure proof of ownership." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00206.
Full textAlfieri, Costanza, Suriya Ganesh, Limin Ge, Jingxin Shi, and Norman Sadeh. "“I was Diagnosed with …”: Sensitivity Detection and Rephrasing of Amazon Reviews with ChatGPT." In 2024 21st Annual International Conference on Privacy, Security and Trust (PST). IEEE, 2024. https://doi.org/10.1109/pst62714.2024.10788076.
Full textPélissier, Samuel, Gianluca Anselmi, Abhishek Kumar Mishra, Anna Maria Mandalari, and Mathieu Cunche. "Enhancing IoT Privacy: Why DNS-over-HTTPS Alone Falls Short?" In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00189.
Full textR, Sreelatha, and Abhay Yelsangiker. "Zero Trust Security Architecture." In 2024 Recent Advances in Sustainable Engineering and Future Technologies (RASEFT). IEEE, 2024. https://doi.org/10.1109/raseft61414.2024.00034.
Full textRies, Sebastian, Marc Fischlin, Leonardo A. Martucci, and Max Muuhlhauser. "Learning Whom to Trust in a Privacy-Friendly Way." In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2011. http://dx.doi.org/10.1109/trustcom.2011.30.
Full textFeng, Huan, and Kang G. Shin. "Masquerade of mobile applications: Introducing unlinkability in a practical way." In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7906937.
Full textHoa, Huynh Van, Chan Dai Truyen Thai, Nguyen Thi Yen Linh, and Vo Nguyen Quoc Bao. "Security for Selected Two-Way Relay with Different Trust Degrees and Friendly Jammers." In 2021 International Conference on Advanced Technologies for Communications (ATC). IEEE, 2021. http://dx.doi.org/10.1109/atc52653.2021.9598201.
Full textLy, Stephen, and Yuan Cheng. "A Data-based Protocol for One-way Trust in Inter-vehicular Communication." In CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy. ACM, 2021. http://dx.doi.org/10.1145/3445969.3450430.
Full textChen, Muqian, Xuebin Wang, Jinqiao Shi, Can Zhao, Meiqi Wang, and Binxing Fang. "Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way." In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020. http://dx.doi.org/10.1109/trustcom50675.2020.00097.
Full textLiang, Shan, Yuewu Wang, Lingguang Lei, Jiwu Jing, and Quan Zhou. "SecureESFS: Sharing Android External Storage Files in a Securer Way." In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020. http://dx.doi.org/10.1109/trustcom50675.2020.00180.
Full textReports on the topic "Trust by the way of security"
Deitelhoff, Nicole, Rainer Forst, Vinzenz Hediger, and Tobias Wille. Trust in conflict : notes on a research program. ConTrust - Trust in Conflict. Research Centre "Normative Orders" of Goethe University Frankfurt am Main, 2025. https://doi.org/10.21248/gups.90950.
Full textFlagg, Melissa, and Zachary Arnold. A New Institutional Approach to Research Security in the United States: Defending a Diverse R&D Ecosystem. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/20200051.
Full textArtis, Roslyn, Connie Ledoux Book, Jennifer Clinton, John S. Lucas, James P. Pellow, and Dawn Michele Whitehead. Advancing Global Stability and U.S. National Security through Peaceful Exchange. The International Coalition (coordinated by The Forum on Education Abroad), 2021. http://dx.doi.org/10.36366/ic.agsausnstpe.03312021.
Full textArmstrong, Beth, Lucy King, Robin Clifford, and Mark Jitlal. Food and You 2 - Wave 2. Food Standards Agency, 2021. http://dx.doi.org/10.46756/sci.fsa.dws750.
Full textArmstrong, Beth, Lucy King, Robin Clifford, et al. Food and You 2: Wave 6 Key Findings. Food Standards Agency, 2023. http://dx.doi.org/10.46756/sci.fsa.djj797.
Full textArmstrong, Beth, Lucy King, Robin Clifford, et al. Food and You: Wave 5. Food Standards Agency, 2023. http://dx.doi.org/10.46756/sci.fsa.fqq357.
Full textMcFee, Erin. Research Brief: Environmental Peacebuilding with Formerly Armed Actors. Trust After Betrayal, 2024. http://dx.doi.org/10.59498/21970.
Full textArmstrong, Beth, Lucy King, Robin Clifford, et al. Food and You 2: Wave 7 Key Findings. Food Standards Agency, 2024. http://dx.doi.org/10.46756/sci.fsa.qqj935.
Full textVilalta Perdomo, Carlos J. Determinant Factors in the Perception of Crime-Related Insecurity in Mexico. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0011448.
Full textOshio, Takashi. Social Security and Trust Fund Management. National Bureau of Economic Research, 2004. http://dx.doi.org/10.3386/w10444.
Full text