PST C

44 papers

YearTitle / Authors
20123rd edition of the workshop on trustworthy self-organizing systems (TSOS 2012).
Christian Müller-Schloer, Wolfgang Reif, Jan-Philipp Steghöfer
2012A concordance framework for building trust evidences.
Anirban Basu, Natasha Dwyer, Stephen Naicken
2012A distributed platform of high interaction honeypots and experimental results.
Ivan Studnia, Vincent Nicomette, Mohamed Kaâniche, Eric Alata
2012A provenance-based access control model.
Jaehong Park, Dang Nguyen, Ravi S. Sandhu
2012A secure data deduplication framework for cloud environments.
Fatema Rashid, Ali Miri, Isaac Woungang
2012Advice and trust in games of choice.
Cody Buntain, Jennifer Golbeck, Dana S. Nau, Sarit Kraus
2012Aggregation and privacy in multi-relational databases.
Yasser Jafer, Herna L. Viktor, Eric Paquet
2012An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast.
Gianpiero Costantino, Fabio Martinelli, Paolo Santi, Dario Amoruso
2012An integrated key management and secure routing framework for Mobile Ad-Hoc Networks.
Shushan Zhao, Robert D. Kent, Akshai K. Aggarwal
2012Automated detection of session management vulnerabilities in web applications.
Yusuke Takamatsu, Yuji Kosuga, Kenji Kono
2012Building robust Reputation Systems for travel-related services.
Huiying Duan, Peng Yang
2012CENTER: A Centralized Trust-Based Efficient Routing protocol for wireless sensor networks.
Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab
2012Collaborative trust evaluation for wiki security.
Kasper Lindberg, Christian Damsgaard Jensen
2012Combining the setbase approach with negative databases.
Julien Bringer, Hervé Chabanne, Olivier Cipiere
2012DLAS: Data Location Assurance Service for cloud computing environments.
Ali Nur Mohammad Noman, Carlisle M. Adams
2012Distributive and retributive justice in self-organising electronic institutions.
Jeremy Pitt
2012Ethical and legal considerations of reCAPTCHA.
Jonathan Lung
2012Exploring re-identification risks in public domains.
Aditi Ramachandran, Lisa Singh, Edward Porter, Frank Nagle
2012Limiting data collection in application forms: A real-case application of a founding privacy principle.
Nicolas Anciaux, Benjamin Nguyen, Michalis Vazirgiannis
2012Making trusted attribute assertions online with the publish trust framework.
Jennifer Golbeck, Hal Warren, Eva Winer
2012Obligations in risk-aware access control.
Liang Chen, Jason Crampton, Martin J. Kollingbaum, Timothy J. Norman
2012Out of sight, out of mind: Effects of displaying access-control information near the item it controls.
Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter
2012PDF Scrutinizer: Detecting JavaScript-based attacks in PDF documents.
Florian Schmitt, Jan Gassen, Elmar Gerhards-Padilla
2012Platform for privacy preferences (P3P): Current status and future directions.
Muyiwa Olurin, Carlisle Adams, Luigi Logrippo
2012Privacy invasion in business environments.
Manuel Lafond, Pierre-Olivier Brosseau, Esma Aïmeur
2012Privacy-preserving resource evaluation in social networks.
Francesco Buccafurri, Lidia Fotia, Gianluca Lax
2012REM: A runtime browser extension manager with fine-grained access control.
Said Marouf, Mohamed Shehab, Adharsh Desikan
2012Risk perception of internet-related activities.
Daniel Leblanc, Robert Biddle
2012SIPPA-2.0 - Secure information processing with privacy assurance (version 2.0).
Arun Prakash, Kumara Krishnan, Bon K. Sy
2012Secure collaboration in on boarding companies.
Pratap Chillakanti
2012Service provider authentication assurance.
Audun Jøsang, Kent A. Varmedal, Christophe Rosenberger, Rajendra Kumar
2012Single-party private web search.
Alexandre Viejo, Jordi Castellà-Roca, Oriol Bernado, Josep Maria Mateo-Sanz
2012Social secret sharing in cloud computing using a new trust function.
Mehrdad Nojoumian, Douglas R. Stinson
2012Sticky policies for data control in the cloud.
Slim Trabelsi, Jakub Sendor
2012Tenth Annual International Conference on Privacy, Security and Trust, PST 2012, Paris, France, July 16-18, 2012
Nora Cuppens-Boulahia, Philip Fong, Joaquín García-Alfaro, Stephen Marsh, Jan-Philipp Steghöfer
2012The role of trust in computer security.
2012The theory of creating trust with a set of mistrust-parties.
Johannes Viehmann
2012Towards a BPEL model-driven approach for Web services security.
Hanine Tout, Azzam Mourad, Hamdi Yahyaoui, Chamseddine Talhi, Hadi Otrok
2012Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions.
Marian Harbach, Sascha Fahl, Michael Brenner, Thomas Muders, Matthew Smith
2012Towards requirements for trust management.
Mark Vinkovits
2012Using Trust to reduce wasteful computation in open Desktop Grid Systems.
Lukas Klejnowski, Yvonne Bernard, Christian Müller-Schloer, Jörg Hähner
2012Using conventional reasoning techniques for self-organising systems.
Graeme Smith, Jeff W. Sanders
2012Visualization of processes in self-learning systems.
Gabriele Peters, Kerstin Bunte, Marc Strickert, Michael Biehl, Thomas Villmann
2012WhACKY! - What anyone could know about you from Twitter.
Denzil Correa, Ashish Sureka, Raghav Sethi