PST C

80 papers

YearTitle / Authors
2006A comparison of reputation-based trust systems.
John B. Folkerts, Hans-Peter Bischof
2006A concept of intelligent biometric-based early detection and warning system.
Svetlana N. Yanushkevich
2006A constraint based role based access control in the SECTET a model-driven approach.
Muhammad Alam, Michael Hafner, Ruth Breu
2006A framework ensuring privacy in a distributed environment.
Dhiah el Diehn I. Abou-Tair
2006A new fair non-repudiation protocol for secure negotiation and contract signing.
Antonio Ruiz-Martínez, C. Inmaculada Marín-López, Laura Baño-López, Antonio Fernandez Gómez-Skarmeta
2006A privacy-preserving UBICOMP architecture.
George Yee
2006A trust framework model for situational contexts.
Carsten D. Schultz
2006AA-RR: working with authentication and authorization infrastructures.
Candido Rodriguez, Ajay Daryanani, Diego R. López, Jose M. Macias
2006Achieving privacy and security in radio frequency identification.
Aaditeshwar Seth, Mirza Omer Beg
2006Alert correlation survey: framework and techniques.
Reza Sadoddin, Ali A. Ghorbani
2006An early release heuristic for k-anonymization.
Edward Brown, Khandaker Ahamed
2006An efficient traitor tracing scheme based on MDS code.
Yang Bo, Wang Qin
2006An improved familiarity measurement for formalization of trust in e-commerce based multiagent systems.
Jie Zhang, Ali A. Ghorbani, Robin Cohen
2006An incentive compatible reputation mechanism for ubiquitous computing environments.
Jinshan Liu, Valérie Issarny
2006Analyzing trust in technology strategies.
Jennifer Horkoff, Eric S. K. Yu, Lin Liu
2006Approximate autoregressive modeling for network attack detection.
Harshit Nayyar, Ali A. Ghorbani
2006Architecture-based refinements for secure computer systems design.
Jie Zhou, Jim Alves-Foss
2006Behavior analysis through reputation propagation in a multi-context environment.
Ebrahim Bagheri, Ali A. Ghorbani
2006Bridging the gap: software specification meets intrusion detector.
Mathew Graves, Mohammad Zulkernine
2006Building online trust through privacy policies.
Thomas W. Lauer, Xiaodong Deng
2006Chinese text watermarking based on occlusive components.
Wenyin Zhang, Ningde Jin
2006Computing trust from revision history.
Honglei Zeng, Maher A. Alhossaini, Li Ding, Richard Fikes, Deborah L. McGuinness
2006Considering role-based conflicts of interest in analyzing and designing e-health systems with goal-oriented methodologies.
Vic Chung
2006Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET.
Muhammad Alam, Michael Hafner, Ruth Breu
2006Cryptanalysis and improvement on Yang-Shieh authentication schemes.
Jie Liu, Lei Fan, Jianhua Li
2006Deep packet inspection comes to the desktop.
Brian O'Higgins
2006Defining the security required for WAP based mobile ticket sales.
Alex Pandelidis
2006Design and implementation of a behavioral difference analyzer for network intrusion detection.
Mehran Nadjarbashi-Noghani, Ali A. Ghorbani
2006Detecting low-profile scans in TCP anomaly event data.
J. Treurniet
2006Digital identity management and protection.
Elisa Bertino
2006Dynamic inference control in privacy preference enforcement.
Xiangdong An, Dawn N. Jutla, Nick Cercone
2006Embedding verifiable information flow analysis.
Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl
2006Execution monitoring enforcement for limited-memory systems.
Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi
2006Exploiting a buffer overflow using metasploit framework.
Mustapha Refai
2006Formal consistency verification between BPEL process and privacy policy.
Yin Hua Li, Hye-Young Paik, Boualem Benatallah
2006From concept to commercialiazed product: the challenges of privacy technologies.
Mike Gurski
2006From stakeholder goals to product features: towards a role-based variability framework with decision boundary.
Catalin Bidian
2006Intelligent virus detection on mobile devices.
Deepak Venugopal, Guoning Hu, Nicoleta Roman
2006Is privacy an attainable goal?: a review of the privacy rights dilemma.
Anasuya Bulkan
2006Is workplace surveillance legal in Canada?
Avner Levin
2006Label-based access control (LBAC) in DB2 LUW.
Walid Rjaibi
2006MTRMS: mutual-trust-based reputation management system in community-based peer-to-peer environment.
EunJoung Byun, SeokIn Kim, Hongsoo Kim, Sungjin Choi, Jangwon Choi, Chong-Sun Hwang
2006Mobile access control policy for healthcare applications with XACML.
Jude Andrade
2006Mobile healthcare applications: a study of access control.
Michelle Watson
2006Modeling trust using transactional, numerical units.
Reid Kerr, Robin Cohen
2006Off-line verification of one-time ID in distributed environment.
Kenji Imamoto, Kouichi Sakurai
2006Ontario healthcare privacy act: compliant ad hoc healthcare applications.
Stephanie Chow
2006Paths to creativity in security careers.
Gregory B. Newby
2006Persona concept for web-based identity management.
Kalman C. Toth
2006Phishing defense against IDN address spoofing attacks.
Viktor Krammer
2006Privacy enhanced personalization in e-learning.
Mohd M. Anwar, Jim E. Greer, Christopher A. Brooks
2006Privacy in video surveilled areas.
Torsten Spindler, Christoph Wartmann, Ludger Hovestadt, Daniel Roth, Luc Van Gool, Andreas Steffen
2006Privacy policy enforcement in enterprises with identity management solutions.
Marco Casassa Mont, Robert Thyne
2006Privacy, traceability, and anonymity for content protection.
Hongxia Jin
2006Privacy-preserving OLAP based on output perturbation across multiple sites.
Yunhai Tong, Guohui Sun, Peng Zhang, Shiwei Tang
2006Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006
2006Protected data paths: delivering sensitive data via untrusted proxies.
Jiantao Kong, Karsten Schwan, Patrick M. Widener
2006Query rewriting for detection of privacy violation through inferencing.
Vikram Goyal, Shyam K. Gupta, Shobhit Saxena
2006Requirements of federated trust management for service-oriented architectures.
Zhengping Wu, Alfred C. Weaver
2006Role-based access control: past, present and future.
Sylvia L. Osborn
2006Secure algorithm for finding K nearest neighbors in distributed databases.
Barrington Young, Raj Bhatnagar
2006Security crosscutting concerns and AspectJ.
Dima Alhadidi, Nadia Belblidia, Mourad Debbabi
2006Security hardening of open source software.
Azzam Mourad, Marc-André Laverdière, Mourad Debbabi
2006The 'how' and 'why' of persistent information security.
Merv Matson, Mihaela Ulieru
2006The quantum nature of cryptography: problems of public-key cryptography and the prospect of quantum key distribution.
A. K. M. Harun-Ar-Rashid
2006Topological analysis of network attack vulnerability.
Sushil Jajodia
2006Towards a model for risk and consent management of personal health information.
Scott Buffett, T. A. Kosa
2006Towards a precise semantics for authenticity and trust.
Reto Kohlas, Jacek Jonczy, Rolf Haenni
2006Towards an MDA-oriented UML profile for critical infrastructure modeling.
Ebrahim Bagheri, Ali A. Ghorbani
2006Towards believing answers from cyber-infrastructure-based applications.
Gilbert Ornelas, Paulo Pinheiro da Silva
2006Towards reliable trust establishment in grid: a pre-evaluating set based bias-tuned method for dishonest feedback filtering.
Xuejun Yang, Xiangli Qu
2006Trust and security in spatial messaging: FoxyTag, the speed camera case study.
Michel Deriaz, Jean-Marc Seigneur
2006Trust determination in ad hoc networks.
Johnson P. Thomas, Sudha Chinni, George Ghinea
2006Trust modelling for online transactions: a phishing scenario.
Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor
2006Trust-based contextual information filtering.
Eugenia Kondratova, Stephen Marsh, Ali A. Ghorbani
2006User-credential based role mapping in multi-domain environment.
Ajith Kamath, Ramiro Liscano, Abdulmotaleb El Saddik
2006Using an improved C4.5 for imbalanced dataset of intrusion.
Quan Zhou, Lin-gang Gu, Chong-Jun Wang, Jun Wang, Shifu Chen
2006Using self-organizing maps to build an attack map for forensic analysis.
Hilmi Günes Kayacik, Nur Zincir-Heywood
2006Using web service enhancements to bridge business trust relationships.
Zhengping Wu, Alfred C. Weaver
2006Virtual identities in authentication and authorization scenarios.
Santiago Zapata Hernandez, Antonio Fernandez Gómez-Skarmeta