PST C

28 papers

YearTitle / Authors
201513th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015
Ali A. Ghorbani, Vicenç Torra, Hüseyin Hisil, Ali Miri, Ahmet Koltuksuz, Jie Zhang, Murat Sensoy, Joaquín García-Alfaro, Ibrahim Zincir
2015A framework for a privacy-aware feature selection evaluation measure.
Yasser Jafer, Stan Matwin, Marina Sokolova
2015A model for calculating user-identity trustworthiness in online transactions.
Brian A. Soeder, K. Suzanne Barber
2015A secure revocable personal health record system with policy-based fine-grained access control.
Mitu Kumar Debnath, Saeed Samet, Krishnamurthy Vidyasankar
2015An access control model for protecting provenance graphs.
Liang Chen, Peter Edwards, John D. Nelson, Timothy J. Norman
2015An adaptive algorithm for multivariate data-oriented microaggregation.
Balkis Abidi, Sadok Ben Yahia
2015An efficient ID-based message recoverable privacy-preserving auditing scheme.
Mehmet Sabir Kiraz, Isa Sertkaya, Osmanbey Uzunkol
2015Devil in a box: Installing backdoors in electronic door locks.
Seongyeol Oh, Joon-Sung Yang, Andrea Bianchi, Hyoungshick Kim
2015Disclosure risk assessment via record linkage by a maximum-knowledge attacker.
Josep Domingo-Ferrer, Sara Ricci, Jordi Soria-Comas
2015ECA rules for controlling authorisation plan to satisfy dynamic constraints.
Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira
2015Embedded systems security: Threats, vulnerabilities, and attack taxonomy.
Dorottya Papp, Zhendong Ma, Levente Buttyán
2015InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocol.
Per A. Hallgren, Martín Ochoa, Andrei Sabelfeld
2015Is privacy a human right? An empirical examination in a global context.
Hsiao-Ying Huang, Masooda N. Bashir
2015Keyboard or keylogger?: A security analysis of third-party keyboards on Android.
Junsung Cho, Geumhwan Cho, Hyoungshick Kim
2015Laplace noise generation for two-party computational differential privacy.
Balamurugan Anandan, Chris Clifton
2015Minimizing transitive trust threats in software management systems.
Jaap Boender, Giuseppe Primiero, Franco Raimondi
2015Network security supported by arguments.
Fabio Martinelli, Francesco Santini, Artsiom Yautsiukhin
2015Performance evaluation of ECC scalar multiplication using parallel modular algorithms on mobile devices.
Tiago V. de Arruda, Yeda Regina Venturini, Tiemi C. Sakata
2015Physical trust-based persistent authentication.
Masahiro Fujita, Christian Damsgaard Jensen, Shiori Arimura, Yuki Ikeya, Masakatsu Nishigaki
2015Privacy preserving business process matching.
Dilian Gurov, Peeter Laud, Roberto Guanciale
2015Privacy-preserving conditional random selection.
Stefan Wüller, Ulrike Meyer, Fabian Förg, Susanne Wetzel
2015Real-time signature-based detection approach for SMS botnet.
Abdullah J. Alzahrani, Ali A. Ghorbani
2015Recommendation of categories in an agents world: The role of (not) local communicative environments.
Rino Falcone, Alessandro Sapienza, Cristiano Castelfranchi
2015Revealing the relationship network behind link spam.
Apostolis Zarras, Antonis Papadogiannakis, Sotiris Ioannidis, Thorsten Holz
2015Towards automatic real time identification of malicious posts on Facebook.
Prateek Dewan, Ponnurangam Kumaraguru
2015What they do in shadows: Twitter underground follower market.
Anupama Aggarwal, Ponnurangam Kumaraguru
2015Who manages the manager? Identity management and user ownership in the age of data.
Jonas Breuer, Heritiana Ranaivoson, Uschi Buchinger, Pieter Ballon
2015Zipf distribution model for quantifying risk of re-identification from trajectory data.
Hiroaki Kikuchi, Katsumi Takahashi