default search action
PST 2008: Fredericton, New Brunswick, Canada
- Larry Korba, Stephen Marsh, Reihaneh Safavi-Naini:
Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada. IEEE Computer Society 2008, ISBN 978-0-7695-3390-2
Security
- Viktor Krammer:
An Effective Defense against Intrusive Web Advertising. 3-14 - Jani Suomalainen, Seamus Moloney, Juha Koivisto, Kari Keinänen:
OpenHouse: A Secure Platform for Distributed Home Services. 15-23 - Wilfred Villegas, Bader Ali, Muthucumaru Maheswaran:
An Access Control Scheme for Protecting Personal Data. 24-35 - Marianne Hirschbichler, Colin Boyd, Wageeh W. Boles:
A Multiple-Control Fuzzy Vault. 36-47
Privacy
- Volker Fusenig, Eugen Staab, Uli Sorger, Thomas Engel:
Unlinkable Communication. 51-55 - Kamil Reddy, H. S. Venter, Martin S. Olivier, Iain Currie:
Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. 56-64 - Piotr Cofta:
Confidence-Compensating Privacy Protection. 65-74 - Princely Ifinedo:
IT Security and Privacy Issues in Global Financial Services Institutions: Do Socio-Economic and Cultural Factors Matter? 75-84
Security
- Azzam Mourad, Dima Alhadidi, Mourad Debbabi:
Cross-Language Weaving Approach Targeting Software Security Hardening. 87-98 - Adetokunbo Makanju, Stephen Brooks, Nur Zincir-Heywood, Evangelos E. Milios:
LogView: Visualizing Event Log Clusters. 99-108 - S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, C. Pandu Rangan:
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks. 109-120 - Heidar Pirzadeh, Danny Dubé:
Encoding the Program Correctness Proofs as Programs in PCC Technology. 121-132 - Rachid Hadjidj, Xiaochun Yang, Syrine Tlili, Mourad Debbabi:
Model-Checking for Software Vulnerabilities Detection with Multi-Language Support. 133-142
Trust
- Farag Azzedin, Ahmad Ridha:
The Effect of Behavior Change on Honesty Checking in Peer-to-Peer Systems. 145-150 - Nathan Lewis, Noria Foukia:
An Efficient Reputation-Based Routing Mechanism for Wireless Sensor Networks: Testing the Impact of Mobility and Hostile Nodes. 151-155 - Riyad Alshammari, Nur Zincir-Heywood:
Investigating Two Different Approaches for Encrypted Traffic Classification. 156-166 - Sheikh Iqbal Ahamed, Mehrab Monjur, Mohammad Saiful Islam:
CCTB: Context Correlation for Trust Bootstrapping in Pervasive Environment. 167-174
Trust and Security
- Michel Deriaz:
The Uncertainty of the Truth. 177-188 - Jie Zhang, Murat Sensoy, Robin Cohen:
A Detailed Comparison of Probabilistic Approaches for Coping with Unfair Ratings in Trust and Reputation Systems. 189-200 - Apurva Mohan, Douglas M. Blough:
AttributeTrust A Framework for Evaluating Trust in Aggregated Attributes via a Reputation System. 201-212 - Hilmi Günes Kayacik, Nur Zincir-Heywood:
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection? 213-223
Privacy
- Michal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger, Mina Askari, Jie Gao:
Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data. 227-231 - Ed Brown, Tracy Ann Kosa:
Incorporating Privacy Outcomes: Teaching an Old Dog New Tricks. 232-239 - David Benjamin, Mikhail J. Atallah:
Private and Cheating-Free Outsourcing of Algebraic Computations. 240-245 - Baishakhi Ray, Shivakant Mishra:
A Protocol for Building Secure and Reliable Covert Channel. 246-253
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.