default search action
PST 2005: St. Andrews, New Brunswick, Canada
- Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings. 2005
Privacy 1
- Sabah S. Al-Fedaghi:
How to Calculate the Information Privacy. 3-13 - Scott Flinn, Jo Lumsden:
User Perceptions of Privacy and Security on the Web. - George Yee, Larry Korba:
Specifying Personal Privacy Policies to Avoid Unexpected Outcomes.
Security 1: Intrusion Detection 1
- Frédéric Massicotte, Mathieu Couture, Yvan Labiche:
Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq Databases. - Jiong Zhang, Mohammad Zulkernine:
Network Intrusion Detection using Random Forests. - James Blustein, Daniel L. Silver, Ching-Lung Fu:
Information Visualization for Intrusion Detection.
Security 2: Intrusion Detection 2
- Stephen Neville:
Are Deeper Levels of Risk Analysis a Requirement for Enabling Optimal Tactical Responses in INFOSEC Alert Correlation Systems? - Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood:
Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99. - Ahmed Awad E. Ahmed, Issa Traoré:
Detecting Computer Intrusions Using Behavioral Biometrics.
Trust 1
- Jacek Jonczy, Rolf Haenni:
Credential Networks: a General Model for Distributed Trust and Authenticity Management. - Glenn Mahoney, Wendy J. Myrvold, Gholamali C. Shoja:
Generic Reliability Trust Model. - Kevin Regan, Robin Cohen, Pascal Poupart:
The Advisor-POMDP: A Principled Approach to Trust through Reputation in Electronic Markets.
Security 3: Firewalls, Proxies, Access Control
- Weiwei Geng, Scott Flinn, John M. DeDourek:
Usable Firewall Configuration. - John Marchesini, Sean W. Smith:
SHEMP: Secure Hardware Enhanced MyProxy. - George Bakos, Sergey Bratus:
Ubiquitous Redirection as Access Control Response.
Privacy and Trust
- Scott Buffett, Luc Comeau, Michael W. Fleming, Bruce Spencer:
MONOLOGUE: A Tool for Negotiating Exchanges of Private Information in E-Commerce. - Elizabeth Chang, Farookh Khadeer Hussain, Tharam S. Dillon:
Trustworthiness Measure for e-Service.
Security 4 (Java and Security)
- Philip W. L. Fong:
Link-Time Enforcement of Confined Types for JVM Bytecode. - Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua:
Security Analysis of Wireless Java.
Short Papers
- Carsten Röcker:
Providing Personalized Privacy Support in Public Places. - Anthony D. Whitehead:
Towards Eliminating Steganographic Communication. - Jeff Gilchrist:
Solitary Confinement: Using Artificial Cells to Control Access and Facilitate Apoptosis in Computer Systems. - Nazar Elfadil:
Graphical and Digital signature Combination for fulfilling the cultural gap between traditional signature and current smart card digital certificate/signature. - Andreas Hirt, Michael J. Jacobson Jr., Carey L. Williamson:
A Practical Buses Protocol for Anonymous Internet Communication. - Patrick C. K. Hung:
Towards a Privacy Access Control Model for e-Healthcare Services. - Zhengping Wu, Alfred C. Weaver:
A Privacy Preserving Enhanced Trust Building Mechanism for Web Services. - Mike Smit, Michael McAllister, Jacob Slonim:
Public Trust and Electronic Health Records. - Tim Storer, Ishbel Duncan:
Electronic Voting in the UK: Current Trends in Deployment , Requirements and Technologies. - Lars Brückner, Marco Voss:
MozPETs - a privacy enhanced Web Browser. - Narjès Boufaden, William Elazmeh, Stan Matwin, Nathalie Japkowicz:
PEEP- Privacy Enforcement in Email Project. - Ariel Futoransky, Ariel Waissbein:
Enforcing Privacy in Web Applications.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.