PST C

52 papers

YearTitle / Authors
2013A multi-tenant RBAC model for collaborative cloud services.
Bo Tang, Qi Li, Ravi S. Sandhu
2013A novel privacy preserving keyword searching for cloud storage.
Lin Cheng, Zhengping Jin, Qiaoyan Wen, Hua Zhang
2013A peer-to-peer agent community for digital oblivion in online social networks.
Klara Stokes, Niklas Carlsson
2013A provenance-based access control model for dynamic separation of duties.
Dang Nguyen, Jaehong Park, Ravi S. Sandhu
2013A self-adaptive classification for the dissociating privacy agent.
Marc Juárez, Vicenç Torra
2013Aegis: A semantic implementation of privacy as contextual integrity in social ecosystems.
Md. Imrul Kayes, Adriana Iamnitchi
2013Allowing privacy-preserving analysis of social network likes.
Francesco Buccafurri, Lidia Fotia, Gianluca Lax
2013An NFC based consumer-level counterfeit detection framework.
Muhammad Qasim Saeed, Zeeshan Bilal, Colin D. Walter
2013An efficient and provably-secure coercion-resistant e-voting protocol.
Alireza Toroghi Haghighat, Mohammad Sadeq Dousti, Rasool Jalili
2013An implementation of secure multi-party computations to preserve privacy when processing EMR data.
Anders Andersen
2013Blend me in: Privacy-preserving input generalization for personalized online services.
Alegria Baquero, Allan M. Schiffman, Jeff Shrager
2013Coalitional games for the management of anonymous access in online social networks.
Esther Palomar, Almudena Alcaide, Elisenda Molina, Yan Zhang
2013Communicating trustworthiness using radar graphs: A detailed look.
Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts
2013Contextual feature based one-class classifier approach for detecting video response spam on YouTube.
Vidushi Chaudhary, Ashish Sureka
2013Define privacy-preserving setbase drawer size standard: A ∊-closeness perspective.
Benjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne, Olivier Cipiere
2013Design and implementation of multi-user secure indices for encrypted cloud storage.
Mao-Pang Pang Lin, Wei-Chih Hong, Chih-Hung Chen, Chen-Mou Cheng
2013Device Comfort for mobile health information accessibility.
Stephen Marsh, Yao Wang, Sylvie Noël, Lewis Robart, John A. Stewart
2013Differential privacy via t-closeness in data publishing.
Jordi Soria-Comas, Josep Domingo-Ferrer
2013Efficient polynomial delegation under standard assumptions.
Paz Morillo, Marc Obrador
2013Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013
Jordi Castellà-Roca, Josep Domingo-Ferrer, Joaquín García-Alfaro, Ali A. Ghorbani, Christian Damsgaard Jensen, Jesús A. Manjón, Iosif-Viorel Onut, Natalia Stakhanova, Vicenç Torra, Jie Zhang
2013Encouraging second thoughts: Obstructive user interfaces for raising security awareness.
Tim Storer, Stephen Marsh, Sylvie Noël, Babak Esfandiari, Khalil El-Khatib, Pamela Briggs, Karen Renaud, Mehmet Vefa Bicakci
2013Error-rate-based fusion of biometric experts.
Mads I. Ingwar, Naveed Ahmed, Christian Damsgaard Jensen
2013Extended structural balance theory for modeling trust in social networks.
Yi Qian, Sibel Adali
2013HALT: Hybrid anonymization of longitudinal transactions.
Morvarid Sehatkar, Stan Matwin
2013Hot-patching a web server: A case study of ASAP code repair.
Mathias Payer, Thomas R. Gross
2013How people care about their personal data released on social media.
Kellyton dos Santos Brito, Frederico Araújo Durão, Vinicius Cardoso Garcia, Silvio Romero de Lemos Meira
2013Identifying individual vulnerability based on public data.
John Ferro, Lisa Singh, Micah Sherr
2013Improving security of virtual machines during live migrations.
Sebastian Biedermann, Martin Zittel, Stefan Katzenbeisser
2013Key privacy and anonymous protocols.
Paolo D'Arco, Alfredo De Santis
2013Leveraging platoon dispersion for Sybil detection in vehicular networks.
Muhammad Al Mutaz, Levi Malott, Sriram Chellappan
2013Model-based specification and refinement of usage control policies.
Ricardo Neisse, Jörg Dörr
2013Multi-data-types interval decision diagrams for XACML evaluation engine.
Canh Ngo, Marc X. Makkes, Yuri Demchenko, Cees de Laat
2013Policy templates for relationship-based access control.
Evangelos Aktoudianakis, Jason Crampton, Steve A. Schneider, Helen Treharne, Adrian Waller
2013Privacy-preserving social recommendations in geosocial networks.
Bisheng Liu, Urs Hengartner
2013Providing useful and private Web search by means of social network profiling.
Alexandre Viejo, David Sánchez
2013Pseudonymous communications in secure industrial wireless sensor networks.
Nouha Oualha, Alexis Olivereau, Aymen Boudguiga
2013Real-time malicious fast-flux detection using DNS and bot related features.
Sergi Martinez-Bea, Sergio Castillo-Perez, Joaquín García-Alfaro
2013SPIKE: A novel session key management protocol with time-varying secure cluster formation in wireless sensor networks.
Sutirtha Sanyal
2013SSAS: A simple secure addressing scheme for IPv6 autoconfiguration.
Hosnieh Rafiee, Christoph Meinel
2013Secure rendering process in cloud computing.
Mohd Rizuan Baharon, Qi Shi, David Llewellyn-Jones, Madjid Merabti
2013Selective cloaking: Need-to-know for location-based apps.
Benjamin Henne, Christian Kater, Matthew Smith, Michael Brenner
2013Semi-automated assessment of annotation trustworthiness.
Davide Ceolin, Archana Nottamkandath, Wan J. Fokkink
2013Socio-technical formal analysis of TLS certificate validation in modern browsers.
Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini
2013Targeted attacks detection with SPuNge.
Marco Balduzzi, Vincenzo Ciangaglini, Robert McArdle
2013The role of phone numbers in understanding cyber-crime schemes.
Andrei Costin, Jelena Isacenkova, Marco Balduzzi, Aurélien Francillon, Davide Balzarotti
2013Top-down itemset recoding for releasing private complex data.
Tsubasa Takahashi, Koji Sobataka, Takao Takenouchi, Yuki Toyoda, Takuya Mori, Takahide Kohro
2013Towards engineering trust systems: Template-based, component-oriented assembly.
Sarah Magin, Sascha Hauke
2013Traceability analysis of quadratic residue-based RFID authentication protocols.
Zahra Sohrabi-Bonab, Mahdi R. Alagheband, Mohammad Reza Aref
2013Trust-based decision-making for the adaptation of public displays in changing social contexts.
Ekaterina Kurdjokova, Michael Wißner, Stephan Hammer, Elisabeth André
2013TrustForge: Flexible access control for collaborative crowd-sourced environment.
Jian Chang, Peter Gebhard, Andreas Haeberlen, Zachary G. Ives, Insup Lee, Oleg Sokolsky, Krishna K. Venkatasubramanian
2013Voice calls for free: How the black market establishes free phone calls - Trapped and uncovered by a VoIP honeynet.
Markus Gruber, Christian Schanes, Florian Fankhauser, Thomas Grechenig
2013Writing down your password: Does it help?
Vanessa Boothroyd, Sonia Chiasson