| 2006 | A comparison of reputation-based trust systems. John B. Folkerts, Hans-Peter Bischof |
| 2006 | A concept of intelligent biometric-based early detection and warning system. Svetlana N. Yanushkevich |
| 2006 | A constraint based role based access control in the SECTET a model-driven approach. Muhammad Alam, Michael Hafner, Ruth Breu |
| 2006 | A framework ensuring privacy in a distributed environment. Dhiah el Diehn I. Abou-Tair |
| 2006 | A new fair non-repudiation protocol for secure negotiation and contract signing. Antonio Ruiz-Martínez, C. Inmaculada Marín-López, Laura Baño-López, Antonio Fernandez Gómez-Skarmeta |
| 2006 | A privacy-preserving UBICOMP architecture. George Yee |
| 2006 | A trust framework model for situational contexts. Carsten D. Schultz |
| 2006 | AA-RR: working with authentication and authorization infrastructures. Candido Rodriguez, Ajay Daryanani, Diego R. López, Jose M. Macias |
| 2006 | Achieving privacy and security in radio frequency identification. Aaditeshwar Seth, Mirza Omer Beg |
| 2006 | Alert correlation survey: framework and techniques. Reza Sadoddin, Ali A. Ghorbani |
| 2006 | An early release heuristic for k-anonymization. Edward Brown, Khandaker Ahamed |
| 2006 | An efficient traitor tracing scheme based on MDS code. Yang Bo, Wang Qin |
| 2006 | An improved familiarity measurement for formalization of trust in e-commerce based multiagent systems. Jie Zhang, Ali A. Ghorbani, Robin Cohen |
| 2006 | An incentive compatible reputation mechanism for ubiquitous computing environments. Jinshan Liu, Valérie Issarny |
| 2006 | Analyzing trust in technology strategies. Jennifer Horkoff, Eric S. K. Yu, Lin Liu |
| 2006 | Approximate autoregressive modeling for network attack detection. Harshit Nayyar, Ali A. Ghorbani |
| 2006 | Architecture-based refinements for secure computer systems design. Jie Zhou, Jim Alves-Foss |
| 2006 | Behavior analysis through reputation propagation in a multi-context environment. Ebrahim Bagheri, Ali A. Ghorbani |
| 2006 | Bridging the gap: software specification meets intrusion detector. Mathew Graves, Mohammad Zulkernine |
| 2006 | Building online trust through privacy policies. Thomas W. Lauer, Xiaodong Deng |
| 2006 | Chinese text watermarking based on occlusive components. Wenyin Zhang, Ningde Jin |
| 2006 | Computing trust from revision history. Honglei Zeng, Maher A. Alhossaini, Li Ding, Richard Fikes, Deborah L. McGuinness |
| 2006 | Considering role-based conflicts of interest in analyzing and designing e-health systems with goal-oriented methodologies. Vic Chung |
| 2006 | Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET. Muhammad Alam, Michael Hafner, Ruth Breu |
| 2006 | Cryptanalysis and improvement on Yang-Shieh authentication schemes. Jie Liu, Lei Fan, Jianhua Li |
| 2006 | Deep packet inspection comes to the desktop. Brian O'Higgins |
| 2006 | Defining the security required for WAP based mobile ticket sales. Alex Pandelidis |
| 2006 | Design and implementation of a behavioral difference analyzer for network intrusion detection. Mehran Nadjarbashi-Noghani, Ali A. Ghorbani |
| 2006 | Detecting low-profile scans in TCP anomaly event data. J. Treurniet |
| 2006 | Digital identity management and protection. Elisa Bertino |
| 2006 | Dynamic inference control in privacy preference enforcement. Xiangdong An, Dawn N. Jutla, Nick Cercone |
| 2006 | Embedding verifiable information flow analysis. Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl |
| 2006 | Execution monitoring enforcement for limited-memory systems. Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi |
| 2006 | Exploiting a buffer overflow using metasploit framework. Mustapha Refai |
| 2006 | Formal consistency verification between BPEL process and privacy policy. Yin Hua Li, Hye-Young Paik, Boualem Benatallah |
| 2006 | From concept to commercialiazed product: the challenges of privacy technologies. Mike Gurski |
| 2006 | From stakeholder goals to product features: towards a role-based variability framework with decision boundary. Catalin Bidian |
| 2006 | Intelligent virus detection on mobile devices. Deepak Venugopal, Guoning Hu, Nicoleta Roman |
| 2006 | Is privacy an attainable goal?: a review of the privacy rights dilemma. Anasuya Bulkan |
| 2006 | Is workplace surveillance legal in Canada? Avner Levin |
| 2006 | Label-based access control (LBAC) in DB2 LUW. Walid Rjaibi |
| 2006 | MTRMS: mutual-trust-based reputation management system in community-based peer-to-peer environment. EunJoung Byun, SeokIn Kim, Hongsoo Kim, Sungjin Choi, Jangwon Choi, Chong-Sun Hwang |
| 2006 | Mobile access control policy for healthcare applications with XACML. Jude Andrade |
| 2006 | Mobile healthcare applications: a study of access control. Michelle Watson |
| 2006 | Modeling trust using transactional, numerical units. Reid Kerr, Robin Cohen |
| 2006 | Off-line verification of one-time ID in distributed environment. Kenji Imamoto, Kouichi Sakurai |
| 2006 | Ontario healthcare privacy act: compliant ad hoc healthcare applications. Stephanie Chow |
| 2006 | Paths to creativity in security careers. Gregory B. Newby |
| 2006 | Persona concept for web-based identity management. Kalman C. Toth |
| 2006 | Phishing defense against IDN address spoofing attacks. Viktor Krammer |
| 2006 | Privacy enhanced personalization in e-learning. Mohd M. Anwar, Jim E. Greer, Christopher A. Brooks |
| 2006 | Privacy in video surveilled areas. Torsten Spindler, Christoph Wartmann, Ludger Hovestadt, Daniel Roth, Luc Van Gool, Andreas Steffen |
| 2006 | Privacy policy enforcement in enterprises with identity management solutions. Marco Casassa Mont, Robert Thyne |
| 2006 | Privacy, traceability, and anonymity for content protection. Hongxia Jin |
| 2006 | Privacy-preserving OLAP based on output perturbation across multiple sites. Yunhai Tong, Guohui Sun, Peng Zhang, Shiwei Tang |
| 2006 | Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006 |
| 2006 | Protected data paths: delivering sensitive data via untrusted proxies. Jiantao Kong, Karsten Schwan, Patrick M. Widener |
| 2006 | Query rewriting for detection of privacy violation through inferencing. Vikram Goyal, Shyam K. Gupta, Shobhit Saxena |
| 2006 | Requirements of federated trust management for service-oriented architectures. Zhengping Wu, Alfred C. Weaver |
| 2006 | Role-based access control: past, present and future. Sylvia L. Osborn |
| 2006 | Secure algorithm for finding K nearest neighbors in distributed databases. Barrington Young, Raj Bhatnagar |
| 2006 | Security crosscutting concerns and AspectJ. Dima Alhadidi, Nadia Belblidia, Mourad Debbabi |
| 2006 | Security hardening of open source software. Azzam Mourad, Marc-André Laverdière, Mourad Debbabi |
| 2006 | The 'how' and 'why' of persistent information security. Merv Matson, Mihaela Ulieru |
| 2006 | The quantum nature of cryptography: problems of public-key cryptography and the prospect of quantum key distribution. A. K. M. Harun-Ar-Rashid |
| 2006 | Topological analysis of network attack vulnerability. Sushil Jajodia |
| 2006 | Towards a model for risk and consent management of personal health information. Scott Buffett, T. A. Kosa |
| 2006 | Towards a precise semantics for authenticity and trust. Reto Kohlas, Jacek Jonczy, Rolf Haenni |
| 2006 | Towards an MDA-oriented UML profile for critical infrastructure modeling. Ebrahim Bagheri, Ali A. Ghorbani |
| 2006 | Towards believing answers from cyber-infrastructure-based applications. Gilbert Ornelas, Paulo Pinheiro da Silva |
| 2006 | Towards reliable trust establishment in grid: a pre-evaluating set based bias-tuned method for dishonest feedback filtering. Xuejun Yang, Xiangli Qu |
| 2006 | Trust and security in spatial messaging: FoxyTag, the speed camera case study. Michel Deriaz, Jean-Marc Seigneur |
| 2006 | Trust determination in ad hoc networks. Johnson P. Thomas, Sudha Chinni, George Ghinea |
| 2006 | Trust modelling for online transactions: a phishing scenario. Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor |
| 2006 | Trust-based contextual information filtering. Eugenia Kondratova, Stephen Marsh, Ali A. Ghorbani |
| 2006 | User-credential based role mapping in multi-domain environment. Ajith Kamath, Ramiro Liscano, Abdulmotaleb El Saddik |
| 2006 | Using an improved C4.5 for imbalanced dataset of intrusion. Quan Zhou, Lin-gang Gu, Chong-Jun Wang, Jun Wang, Shifu Chen |
| 2006 | Using self-organizing maps to build an attack map for forensic analysis. Hilmi Günes Kayacik, Nur Zincir-Heywood |
| 2006 | Using web service enhancements to bridge business trust relationships. Zhengping Wu, Alfred C. Weaver |
| 2006 | Virtual identities in authentication and authorization scenarios. Santiago Zapata Hernandez, Antonio Fernandez Gómez-Skarmeta |