PST C

32 papers

YearTitle / Authors
2005A Practical Buses Protocol for Anonymous Internet Communication.
Andreas Hirt, Michael J. Jacobson Jr., Carey L. Williamson
2005A Privacy Preserving Enhanced Trust Building Mechanism for Web Services.
Zhengping Wu, Alfred C. Weaver
2005Are Deeper Levels of Risk Analysis a Requirement for Enabling Optimal Tactical Responses in INFOSEC Alert Correlation Systems?
Stephen Neville
2005Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq Databases.
Frédéric Massicotte, Mathieu Couture, Yvan Labiche
2005Credential Networks: a General Model for Distributed Trust and Authenticity Management.
Jacek Jonczy, Rolf Haenni
2005Detecting Computer Intrusions Using Behavioral Biometrics.
Ahmed Awad E. Ahmed, Issa Traoré
2005Electronic Voting in the UK: Current Trends in Deployment , Requirements and Technologies.
Tim Storer, Ishbel Duncan
2005Enforcing Privacy in Web Applications.
Ariel Futoransky, Ariel Waissbein
2005Generic Reliability Trust Model.
Glenn Mahoney, Wendy J. Myrvold, Gholamali C. Shoja
2005Graphical and Digital signature Combination for fulfilling the cultural gap between traditional signature and current smart card digital certificate/signature.
Nazar Elfadil
2005How to Calculate the Information Privacy.
Sabah S. Al-Fedaghi
2005Information Visualization for Intrusion Detection.
James Blustein, Daniel L. Silver, Ching-Lung Fu
2005Link-Time Enforcement of Confined Types for JVM Bytecode.
Philip W. L. Fong
2005MONOLOGUE: A Tool for Negotiating Exchanges of Private Information in E-Commerce.
Scott Buffett, Luc Comeau, Michael W. Fleming, Bruce Spencer
2005MozPETs - a privacy enhanced Web Browser.
Lars Brückner, Marco Voss
2005Network Intrusion Detection using Random Forests.
Jiong Zhang, Mohammad Zulkernine
2005PEEP- Privacy Enforcement in Email Project.
Narjès Boufaden, William Elazmeh, Stan Matwin, Nathalie Japkowicz
2005Providing Personalized Privacy Support in Public Places.
Carsten Röcker
2005Public Trust and Electronic Health Records.
Mike Smit, Michael McAllister, Jacob Slonim
2005SHEMP: Secure Hardware Enhanced MyProxy.
John Marchesini, Sean W. Smith
2005Security Analysis of Wireless Java.
Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua
2005Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99.
Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood
2005Solitary Confinement: Using Artificial Cells to Control Access and Facilitate Apoptosis in Computer Systems.
Jeff Gilchrist
2005Specifying Personal Privacy Policies to Avoid Unexpected Outcomes.
George Yee, Larry Korba
2005The Advisor-POMDP: A Principled Approach to Trust through Reputation in Electronic Markets.
Kevin Regan, Robin Cohen, Pascal Poupart
2005Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings
2005Towards Eliminating Steganographic Communication.
Anthony D. Whitehead
2005Towards a Privacy Access Control Model for e-Healthcare Services.
Patrick C. K. Hung
2005Trustworthiness Measure for e-Service.
Elizabeth Chang, Farookh Khadeer Hussain, Tharam S. Dillon
2005Ubiquitous Redirection as Access Control Response.
George Bakos, Sergey Bratus
2005Usable Firewall Configuration.
Weiwei Geng, Scott Flinn, John M. DeDourek
2005User Perceptions of Privacy and Security on the Web.
Scott Flinn, Jo Lumsden