Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Bo Tang, Qi Li 0002, Ravi S. Sandhu |
A multi-tenant RBAC model for collaborative cloud services. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Vidushi Chaudhary, Ashish Sureka |
Contextual feature based one-class classifier approach for detecting video response spam on YouTube. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Paz Morillo, Marc Obrador |
Efficient polynomial delegation under standard assumptions. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kellyton dos Santos Brito, Frederico Araújo Durão, Vinicius Cardoso Garcia, Silvio Romero de Lemos Meira |
How people care about their personal data released on social media. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lin Cheng 0002, Zhengping Jin, Qiaoyan Wen, Hua Zhang 0001 |
A novel privacy preserving keyword searching for cloud storage. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne, Olivier Cipiere |
Define privacy-preserving setbase drawer size standard: A ∊-closeness perspective. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sutirtha Sanyal |
SPIKE: A novel session key management protocol with time-varying secure cluster formation in wireless sensor networks. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Markus Gruber, Christian Schanes, Florian Fankhauser, Thomas Grechenig |
Voice calls for free: How the black market establishes free phone calls - Trapped and uncovered by a VoIP honeynet. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohd Rizuan Baharon, Qi Shi 0001, David Llewellyn-Jones, Madjid Merabti |
Secure rendering process in cloud computing. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yi Qian, Sibel Adali |
Extended structural balance theory for modeling trust in social networks. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Vanessa Boothroyd, Sonia Chiasson |
Writing down your password: Does it help? |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Esther Palomar, Almudena Alcaide, Elisenda Molina, Yan Zhang |
Coalitional games for the management of anonymous access in online social networks. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marc Juárez, Vicenç Torra |
A self-adaptive classification for the dissociating privacy agent. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Davide Ceolin, Archana Nottamkandath, Wan J. Fokkink |
Semi-automated assessment of annotation trustworthiness. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Andrei Costin, Jelena Isacenkova, Marco Balduzzi, Aurélien Francillon, Davide Balzarotti |
The role of phone numbers in understanding cyber-crime schemes. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sarah Magin, Sascha Hauke |
Towards engineering trust systems: Template-based, component-oriented assembly. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zahra Sohrabi-Bonab, Mahdi R. Alagheband, Mohammad Reza Aref |
Traceability analysis of quadratic residue-based RFID authentication protocols. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Evangelos Aktoudianakis, Jason Crampton, Steve A. Schneider, Helen Treharne, Adrian Waller |
Policy templates for relationship-based access control. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mao-Pang Pang Lin, Wei-Chih Hong, Chih-Hung Chen, Chen-Mou Cheng |
Design and implementation of multi-user secure indices for encrypted cloud storage. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Henne, Christian Kater, Matthew Smith 0001, Michael Brenner 0003 |
Selective cloaking: Need-to-know for location-based apps. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Alireza Toroghi Haghighat, Mohammad Sadeq Dousti, Rasool Jalili |
An efficient and provably-secure coercion-resistant e-voting protocol. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ricardo Neisse, Jörg Dörr |
Model-based specification and refinement of usage control policies. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Alegria Baquero, Allan M. Schiffman, Jeff Shrager |
Blend me in: Privacy-preserving input generalization for personalized online services. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jordi Castellà-Roca, Josep Domingo-Ferrer, Joaquín García-Alfaro, Ali A. Ghorbani 0001, Christian Damsgaard Jensen, Jesús A. Manjón, Iosif-Viorel Onut, Natalia Stakhanova, Vicenç Torra, Jie Zhang 0002 (eds.) |
Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013 |
PST |
2013 |
DBLP BibTeX RDF |
|
1 | Bisheng Liu, Urs Hengartner |
Privacy-preserving social recommendations in geosocial networks. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nouha Oualha, Alexis Olivereau, Aymen Boudguiga |
Pseudonymous communications in secure industrial wireless sensor networks. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mathias Payer, Thomas R. Gross |
Hot-patching a web server: A case study of ASAP code repair. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jian Chang, Peter Gebhard, Andreas Haeberlen, Zachary G. Ives, Insup Lee 0001, Oleg Sokolsky, Krishna K. Venkatasubramanian |
TrustForge: Flexible access control for collaborative crowd-sourced environment. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tim Storer, Stephen Marsh 0001, Sylvie Noël, Babak Esfandiari, Khalil El-Khatib, Pamela Briggs, Karen Renaud, Mehmet Vefa Bicakci |
Encouraging second thoughts: Obstructive user interfaces for raising security awareness. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Canh Ngo, Marc X. Makkes, Yuri Demchenko, Cees de Laat |
Multi-data-types interval decision diagrams for XACML evaluation engine. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Qasim Saeed, Zeeshan Bilal, Colin D. Walter |
An NFC based consumer-level counterfeit detection framework. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jordi Soria-Comas, Josep Domingo-Ferrer |
Differential privacy via t-closeness in data publishing. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Biedermann, Martin Zittel, Stefan Katzenbeisser 0001 |
Improving security of virtual machines during live migrations. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marco Balduzzi, Vincenzo Ciangaglini, Robert McArdle |
Targeted attacks detection with SPuNge. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini |
Socio-technical formal analysis of TLS certificate validation in modern browsers. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Md. Imrul Kayes, Adriana Iamnitchi |
Aegis: A semantic implementation of privacy as contextual integrity in social ecosystems. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts |
Communicating trustworthiness using radar graphs: A detailed look. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Stephen Marsh 0001, Yao Wang, Sylvie Noël, Lewis Robart, John A. Stewart |
Device Comfort for mobile health information accessibility. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Paolo D'Arco, Alfredo De Santis |
Key privacy and anonymous protocols. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Al Mutaz, Levi Malott, Sriram Chellappan |
Leveraging platoon dispersion for Sybil detection in vehicular networks. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | John Ferro, Lisa Singh, Micah Sherr |
Identifying individual vulnerability based on public data. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Alexandre Viejo, David Sánchez 0001 |
Providing useful and private Web search by means of social network profiling. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sergi Martinez-Bea, Sergio Castillo-Perez, Joaquín García-Alfaro |
Real-time malicious fast-flux detection using DNS and bot related features. |
PST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | |
The role of trust in computer security. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Graeme Smith 0001, Jeff W. Sanders |
Using conventional reasoning techniques for self-organising systems. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Denzil Correa, Ashish Sureka, Raghav Sethi |
WhACKY! - What anyone could know about you from Twitter. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christian Müller-Schloer, Wolfgang Reif, Jan-Philipp Steghöfer |
3rd edition of the workshop on trustworthy self-organizing systems (TSOS 2012). |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Marian Harbach, Sascha Fahl, Michael Brenner 0003, Thomas Muders, Matthew Smith 0001 |
Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Muyiwa Olurin, Carlisle Adams, Luigi Logrippo |
Platform for privacy preferences (P3P): Current status and future directions. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Florian Schmitt, Jan Gassen, Elmar Gerhards-Padilla |
PDF Scrutinizer: Detecting JavaScript-based attacks in PDF documents. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yasser Jafer, Herna L. Viktor, Eric Paquet |
Aggregation and privacy in multi-relational databases. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Audun Jøsang, Kent A. Varmedal, Christophe Rosenberger, Rajendra Kumar |
Service provider authentication assurance. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lukas Klejnowski, Yvonne Bernard, Christian Müller-Schloer, Jörg Hähner |
Using Trust to reduce wasteful computation in open Desktop Grid Systems. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter |
Out of sight, out of mind: Effects of displaying access-control information near the item it controls. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Lung |
Ethical and legal considerations of reCAPTCHA. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mark Vinkovits |
Towards requirements for trust management. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Liang Chen, Jason Crampton, Martin J. Kollingbaum, Timothy J. Norman |
Obligations in risk-aware access control. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Fatema Rashid, Ali Miri, Isaac Woungang |
A secure data deduplication framework for cloud environments. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Studnia, Vincent Nicomette, Mohamed Kaâniche, Eric Alata |
A distributed platform of high interaction honeypots and experimental results. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Anirban Basu, Natasha Dwyer, Stephen Naicken |
A concordance framework for building trust evidences. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yusuke Takamatsu, Yuji Kosuga, Kenji Kono |
Automated detection of session management vulnerabilities in web applications. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ali Nur Mohammad Noman, Carlisle M. Adams |
DLAS: Data Location Assurance Service for cloud computing environments. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jaehong Park, Dang Nguyen 0001, Ravi S. Sandhu |
A provenance-based access control model. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mehrdad Nojoumian, Douglas R. Stinson |
Social secret sharing in cloud computing using a new trust function. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Viehmann |
The theory of creating trust with a set of mistrust-parties. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Gianpiero Costantino, Fabio Martinelli, Paolo Santi, Dario Amoruso |
An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Aditi Ramachandran, Lisa Singh, Edward Porter, Frank Nagle |
Exploring re-identification risks in public domains. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Cody Buntain, Jennifer Golbeck, Dana S. Nau, Sarit Kraus |
Advice and trust in games of choice. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Pitt |
Distributive and retributive justice in self-organising electronic institutions. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alexandre Viejo, Jordi Castellà-Roca, Oriol Bernado, Josep Maria Mateo-Sanz |
Single-party private web search. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Said Marouf, Mohamed Shehab, Adharsh Desikan |
REM: A runtime browser extension manager with fine-grained access control. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas Anciaux, Benjamin Nguyen, Michalis Vazirgiannis |
Limiting data collection in application forms: A real-case application of a founding privacy principle. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kasper Lindberg, Christian Damsgaard Jensen |
Collaborative trust evaluation for wiki security. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shushan Zhao, Robert D. Kent, Akshai K. Aggarwal |
An integrated key management and secure routing framework for Mobile Ad-Hoc Networks. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Slim Trabelsi, Jakub Sendor |
Sticky policies for data control in the cloud. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab |
CENTER: A Centralized Trust-Based Efficient Routing protocol for wireless sensor networks. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Francesco Buccafurri, Lidia Fotia, Gianluca Lax |
Privacy-preserving resource evaluation in social networks. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Gabriele Peters, Kerstin Bunte, Marc Strickert, Michael Biehl, Thomas Villmann |
Visualization of processes in self-learning systems. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jennifer Golbeck, Hal Warren, Eva Winer |
Making trusted attribute assertions online with the publish trust framework. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Pratap Chillakanti |
Secure collaboration in on boarding companies. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Leblanc, Robert Biddle |
Risk perception of internet-related activities. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nora Cuppens-Boulahia, Philip Fong, Joaquín García-Alfaro, Stephen Marsh 0001, Jan-Philipp Steghöfer (eds.) |
Tenth Annual International Conference on Privacy, Security and Trust, PST 2012, Paris, France, July 16-18, 2012 |
PST |
2012 |
DBLP BibTeX RDF |
|
1 | Huiying Duan, Peng Yang |
Building robust Reputation Systems for travel-related services. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hanine Tout, Azzam Mourad, Hamdi Yahyaoui, Chamseddine Talhi, Hadi Otrok |
Towards a BPEL model-driven approach for Web services security. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Manuel Lafond, Pierre-Olivier Brosseau, Esma Aïmeur |
Privacy invasion in business environments. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Julien Bringer, Hervé Chabanne, Olivier Cipiere |
Combining the setbase approach with negative databases. |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Arun Prakash, Kumara Krishnan, Bon K. Sy |
SIPPA-2.0 - Secure information processing with privacy assurance (version 2.0). |
PST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Samir Ouchani, Yosr Jarraya, Otmane Aït Mohamed |
Model-based systems security quantification. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | |
Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada |
PST |
2011 |
DBLP BibTeX RDF |
|
1 | Jens H. Weber-Jahnke, James B. Williams 0001 |
Beyond privacy policies - assessing inherent privacy risks of consumer health services. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi |
A trust-based approach against IP-spoofing attacks. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Alberto Vila Tena, Yrjö Raivio |
Privacy challenges of open APIs: Case location based services. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Steve R. Tate, Roopa Vishwanathan |
General Secure Function Evaluation using standard trusted computing hardware. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dina Said, Lisa Stirling, Peter Federolf, Ken Barker 0001 |
Data preprocessing for distance-based unsupervised Intrusion Detection. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shirantha Wijesekera, Xu Huang 0001, Dharmendra Sharma 0001 |
Performance analysis of QKD based key distribution for IEEE 802.11 networks. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Serguei A. Mokhov, Joey Paquet, Mourad Debbabi |
On the need for data flow graph visualization of Forensic Lucid programs and encoded evidence, and their evaluation by GIPSY. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Riaz Ahmed Shaikh 0001, Kamel Adi, Luigi Logrippo, Serge Mankovski |
Risk-based decision method for access control systems. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mahmoud Ghorbel, Armen Aghasaryan, Stéphane Betgé-Brezetz, Marie-Pascale Dupont, Guy-Bertrand Kamga, Sophie Piekarec |
Privacy Data Envelope: Concept and implementation. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Martín Barrère, Gustavo Betarte, Marcelo Rodríguez |
Towards machine-assisted formal procedures for the collection of digital evidence. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Qian Yu, Chang N. Zhang |
RC4 state and its applications. |
PST |
2011 |
DBLP DOI BibTeX RDF |
|