Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Antonio Ruiz-Martínez, C. Inmaculada Marín-López, Laura Baño-López, Antonio Fernandez Gómez-Skarmeta |
A new fair non-repudiation protocol for secure negotiation and contract signing. |
PST |
2006 |
DBLP DOI BibTeX RDF |
abuse freeness, contract negotiation, contract signing protocol, security, e-commerce, confidentiality, fair-exchange |
1 | Eugenia Kondratova, Stephen Marsh 0001, Ali A. Ghorbani 0001 |
Trust-based contextual information filtering. |
PST |
2006 |
DBLP DOI BibTeX RDF |
privacy and trust, mobility, context, information filtering |
1 | Yang Bo, Wang Qin |
An efficient traitor tracing scheme based on MDS code. |
PST |
2006 |
DBLP DOI BibTeX RDF |
traitor tracing, collusion-resistant, MDS code |
1 | Yunhai Tong, Guohui Sun, Peng Zhang, Shiwei Tang |
Privacy-preserving OLAP based on output perturbation across multiple sites. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jie Zhang 0002, Ali A. Ghorbani 0001, Robin Cohen |
An improved familiarity measurement for formalization of trust in e-commerce based multiagent systems. |
PST |
2006 |
DBLP DOI BibTeX RDF |
trust, e-commerce, multiagent systems, familiarity |
1 | Marco Casassa Mont, Robert Thyne |
Privacy policy enforcement in enterprises with identity management solutions. |
PST |
2006 |
DBLP DOI BibTeX RDF |
privacy, access control, identity management, policy enforcement |
1 | Deepak Venugopal, Guoning Hu, Nicoleta Roman |
Intelligent virus detection on mobile devices. |
PST |
2006 |
DBLP DOI BibTeX RDF |
common functionality, security, mobile, virus detection, DLL |
1 | Mehran Nadjarbashi-Noghani, Ali A. Ghorbani 0001 |
Design and implementation of a behavioral difference analyzer for network intrusion detection. |
PST |
2006 |
DBLP DOI BibTeX RDF |
differential analyzer, intrusion detection, network security, diversity |
1 | Jie Zhou, Jim Alves-Foss |
Architecture-based refinements for secure computer systems design. |
PST |
2006 |
DBLP DOI BibTeX RDF |
architectural refinement, non-functional requirements, multi-level security |
1 | Sushil Jajodia |
Topological analysis of network attack vulnerability. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Hongxia Jin |
Privacy, traceability, and anonymity for content protection. |
PST |
2006 |
DBLP DOI BibTeX RDF |
anonymous trust, security, privacy, tracing, content protection |
1 | Elisa Bertino |
Digital identity management and protection. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Reza Sadoddin, Ali A. Ghorbani 0001 |
Alert correlation survey: framework and techniques. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Catalin Bidian |
From stakeholder goals to product features: towards a role-based variability framework with decision boundary. |
PST |
2006 |
DBLP DOI BibTeX RDF |
software architecture, framework, variability, requirements analysis, product lines, product families, multi-agent modeling |
1 | Jie Liu, Lei Fan 0002, Jianhua Li 0001 |
Cryptanalysis and improvement on Yang-Shieh authentication schemes. |
PST |
2006 |
DBLP DOI BibTeX RDF |
cryptanalysis, smart cards, information security, remote authentication |
1 | Kalman C. Toth |
Persona concept for web-based identity management. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | George Yee |
A privacy-preserving UBICOMP architecture. |
PST |
2006 |
DBLP DOI BibTeX RDF |
ubiquitous computing, architecture, privacy protection, privacy policy, UBICOMP |
1 | Gilbert Ornelas, Paulo Pinheiro da Silva |
Towards believing answers from cyber-infrastructure-based applications. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Santiago Zapata Hernandez, Antonio Fernandez Gómez-Skarmeta |
Virtual identities in authentication and authorization scenarios. |
PST |
2006 |
DBLP DOI BibTeX RDF |
Daidalos, ID-token, PANA, RegID, VID, authentication, authorization, identity, diameter, SAML |
1 | Yin Hua Li, Hye-Young Paik, Boualem Benatallah |
Formal consistency verification between BPEL process and privacy policy. |
PST |
2006 |
DBLP DOI BibTeX RDF |
consistency verification, business process, graph transformation, privacy policy |
1 | Xuejun Yang, Xiangli Qu |
Towards reliable trust establishment in grid: a pre-evaluating set based bias-tuned method for dishonest feedback filtering. |
PST |
2006 |
DBLP DOI BibTeX RDF |
feedback filtering, pre-evaluating set, trust, grid |
1 | Ebrahim Bagheri, Ali A. Ghorbani 0001 |
Towards an MDA-oriented UML profile for critical infrastructure modeling. |
PST |
2006 |
DBLP DOI BibTeX RDF |
modeling and simulation, UML profiles, critical infrastructure |
1 | Jude Andrade |
Mobile access control policy for healthcare applications with XACML. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor |
Trust modelling for online transactions: a phishing scenario. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Dhiah el Diehn I. Abou-Tair |
A framework ensuring privacy in a distributed environment. |
PST |
2006 |
DBLP DOI BibTeX RDF |
privacy, access control, information flow control, policy enforcement |
1 | Ebrahim Bagheri, Ali A. Ghorbani 0001 |
Behavior analysis through reputation propagation in a multi-context environment. |
PST |
2006 |
DBLP DOI BibTeX RDF |
multi-context reputation, reputation formalization, reputation propagation |
1 | Harshit Nayyar, Ali A. Ghorbani 0001 |
Approximate autoregressive modeling for network attack detection. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Barrington Young, Raj Bhatnagar |
Secure algorithm for finding K nearest neighbors in distributed databases. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | John B. Folkerts, Hans-Peter Bischof |
A comparison of reputation-based trust systems. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Hilmi Günes Kayacik, Nur Zincir-Heywood |
Using self-organizing maps to build an attack map for forensic analysis. |
PST |
2006 |
DBLP DOI BibTeX RDF |
KDD 99 intrusion detection datasets, neural networks, intrusion detection, self-organizing map |
1 | Honglei Zeng, Maher A. Alhossaini, Li Ding 0001, Richard Fikes, Deborah L. McGuinness |
Computing trust from revision history. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Torsten Spindler, Christoph Wartmann, Ludger Hovestadt, Daniel Roth 0002, Luc Van Gool, Andreas Steffen |
Privacy in video surveilled areas. |
PST |
2006 |
DBLP DOI BibTeX RDF |
computer vision, cryptography, surveillance, building automation |
1 | Xiangdong An 0001, Dawn N. Jutla, Nick Cercone |
Dynamic inference control in privacy preference enforcement. |
PST |
2006 |
DBLP DOI BibTeX RDF |
privacy protection, dynamic bayesian networks, inference control, ubiquitous environments |
1 | Mike Gurski |
From concept to commercialiazed product: the challenges of privacy technologies. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Edward Brown, Khandaker Ahamed |
An early release heuristic for k-anonymization. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kenji Imamoto, Kouichi Sakurai |
Off-line verification of one-time ID in distributed environment. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Johnson P. Thomas, Sudha Chinni, George Ghinea |
Trust determination in ad hoc networks. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Dima Alhadidi, Nadia Belblidia, Mourad Debbabi |
Security crosscutting concerns and AspectJ. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Azzam Mourad, Marc-André Laverdière, Mourad Debbabi |
Security hardening of open source software. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jennifer Horkoff, Eric S. K. Yu, Lin Liu 0001 |
Analyzing trust in technology strategies. |
PST |
2006 |
DBLP DOI BibTeX RDF |
the i* framework, trust, trusted computing, goal modeling, business strategies, model evaluation |
1 | Carsten D. Schultz |
A trust framework model for situational contexts. |
PST |
2006 |
DBLP DOI BibTeX RDF |
trust framework model, trust, trustworthiness |
1 | Svetlana N. Yanushkevich |
A concept of intelligent biometric-based early detection and warning system. |
PST |
2006 |
DBLP DOI BibTeX RDF |
decision making support, physical access control, artificial intelligence, biometrics |
1 | Aaditeshwar Seth, Mirza Omer Beg |
Achieving privacy and security in radio frequency identification. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Zhengping Wu, Alfred C. Weaver |
Requirements of federated trust management for service-oriented architectures. |
PST |
2006 |
DBLP DOI BibTeX RDF |
requirements, trust management, service-oriented computing |
1 | J. Treurniet |
Detecting low-profile scans in TCP anomaly event data. |
PST |
2006 |
DBLP DOI BibTeX RDF |
distributed scan detection, scan detection, slow scan detection, network security, TCP, anomaly detection |
1 | Michelle Watson |
Mobile healthcare applications: a study of access control. |
PST |
2006 |
DBLP DOI BibTeX RDF |
MAVAAN, huddle mode, meditech, roaming mode, standalone mode, MANET |
1 | Mohd M. Anwar, Jim E. Greer, Christopher A. Brooks 0001 |
Privacy enhanced personalization in e-learning. |
PST |
2006 |
DBLP DOI BibTeX RDF |
privacy, trust, personalization, anonymity, reputation, identity, pseudonymity |
1 | Avner Levin |
Is workplace surveillance legal in Canada? |
PST |
2006 |
DBLP DOI BibTeX RDF |
privacy, monitoring, surveillance, work |
1 | Zhengping Wu, Alfred C. Weaver |
Using web service enhancements to bridge business trust relationships. |
PST |
2006 |
DBLP DOI BibTeX RDF |
web service enhancements, web service, trust management, trust establishment |
1 | |
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006 |
PST |
2006 |
DBLP BibTeX RDF |
|
1 | Alex Pandelidis |
Defining the security required for WAP based mobile ticket sales. |
PST |
2006 |
DBLP DOI BibTeX RDF |
mobile ticket sales, security, WAP, cellular |
1 | Jiantao Kong, Karsten Schwan, Patrick M. Widener |
Protected data paths: delivering sensitive data via untrusted proxies. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Alam, Michael Hafner, Ruth Breu |
A constraint based role based access control in the SECTET a model-driven approach. |
PST |
2006 |
DBLP DOI BibTeX RDF |
service oriented architectures, role based access control, model-driven architecture, model-driven security |
1 | Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi |
Execution monitoring enforcement for limited-memory systems. |
PST |
2006 |
DBLP DOI BibTeX RDF |
bounded history automata, enforcement mechanisms, locally-testable properties, security policies, execution monitoring, edit automata |
1 | Walid Rjaibi |
Label-based access control (LBAC) in DB2 LUW. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Quan Zhou, Lin-gang Gu, Chong-Jun Wang, Jun Wang, Shifu Chen |
Using an improved C4.5 for imbalanced dataset of intrusion. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ajith Kamath, Ramiro Liscano, Abdulmotaleb El-Saddik |
User-credential based role mapping in multi-domain environment. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Vic Chung |
Considering role-based conflicts of interest in analyzing and designing e-health systems with goal-oriented methodologies. |
PST |
2006 |
DBLP DOI BibTeX RDF |
goal-oriented methodologies, healthcare privacy, healthcare security, system design, system analysis, conflicts of interest |
1 | Scott Buffett, T. A. Kosa |
Towards a model for risk and consent management of personal health information. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Brian O'Higgins |
Deep packet inspection comes to the desktop. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Merv Matson, Mihaela Ulieru |
The 'how' and 'why' of persistent information security. |
PST |
2006 |
DBLP DOI BibTeX RDF |
avaliability, emergency response operations, information custodian, infosec, persistent information security, integrity, information security, confidentiality, digital rights management, DRM |
1 | Anasuya Bulkan |
Is privacy an attainable goal?: a review of the privacy rights dilemma. |
PST |
2006 |
DBLP DOI BibTeX RDF |
privacy contract, rights and ethics, policy |
1 | Mustapha Refai |
Exploiting a buffer overflow using metasploit framework. |
PST |
2006 |
DBLP DOI BibTeX RDF |
metasploit, framework, buffer overflow, exploit, buffer overrun |
1 | Reid Kerr, Robin Cohen |
Modeling trust using transactional, numerical units. |
PST |
2006 |
DBLP DOI BibTeX RDF |
buying and selling, e-commerce marketplaces, multiagent systems, trust and reputation |
1 | Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua |
Security Analysis of Wireless Java. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Sabah S. Al-Fedaghi |
How to Calculate the Information Privacy. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Ariel Futoransky, Ariel Waissbein |
Enforcing Privacy in Web Applications. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Stephen Neville |
Are Deeper Levels of Risk Analysis a Requirement for Enabling Optimal Tactical Responses in INFOSEC Alert Correlation Systems? |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | |
Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | James Blustein, Daniel L. Silver, Ching-Lung Fu |
Information Visualization for Intrusion Detection. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | John Marchesini, Sean W. Smith |
SHEMP: Secure Hardware Enhanced MyProxy. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | George Yee, Larry Korba |
Specifying Personal Privacy Policies to Avoid Unexpected Outcomes. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Zhengping Wu, Alfred C. Weaver |
A Privacy Preserving Enhanced Trust Building Mechanism for Web Services. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Scott Flinn, Jo Lumsden |
User Perceptions of Privacy and Security on the Web. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Patrick C. K. Hung |
Towards a Privacy Access Control Model for e-Healthcare Services. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Glenn Mahoney, Wendy J. Myrvold, Gholamali C. Shoja |
Generic Reliability Trust Model. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Frédéric Massicotte, Mathieu Couture, Yvan Labiche |
Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq Databases. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Anthony D. Whitehead |
Towards Eliminating Steganographic Communication. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Carsten Röcker |
Providing Personalized Privacy Support in Public Places. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Lars Brückner, Marco Voss |
MozPETs - a privacy enhanced Web Browser. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Ahmed Awad E. Ahmed, Issa Traoré |
Detecting Computer Intrusions Using Behavioral Biometrics. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood |
Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Mike Smit, Michael McAllister, Jacob Slonim |
Public Trust and Electronic Health Records. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Narjès Boufaden, William Elazmeh, Stan Matwin, Nathalie Japkowicz |
PEEP- Privacy Enforcement in Email Project. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Philip W. L. Fong |
Link-Time Enforcement of Confined Types for JVM Bytecode. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Tim Storer, Ishbel Duncan |
Electronic Voting in the UK: Current Trends in Deployment , Requirements and Technologies. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Weiwei Geng, Scott Flinn, John M. DeDourek |
Usable Firewall Configuration. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Jacek Jonczy, Rolf Haenni |
Credential Networks: a General Model for Distributed Trust and Authenticity Management. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | George Bakos, Sergey Bratus |
Ubiquitous Redirection as Access Control Response. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Nazar Elfadil |
Graphical and Digital signature Combination for fulfilling the cultural gap between traditional signature and current smart card digital certificate/signature. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Elizabeth Chang 0001, Farookh Khadeer Hussain, Tharam S. Dillon |
Trustworthiness Measure for e-Service. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Jiong Zhang, Mohammad Zulkernine |
Network Intrusion Detection using Random Forests. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Andreas Hirt, Michael J. Jacobson Jr., Carey L. Williamson |
A Practical Buses Protocol for Anonymous Internet Communication. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Kevin Regan 0001, Robin Cohen, Pascal Poupart |
The Advisor-POMDP: A Principled Approach to Trust through Reputation in Electronic Markets. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Scott Buffett, Luc Comeau, Michael W. Fleming, Bruce Spencer |
MONOLOGUE: A Tool for Negotiating Exchanges of Private Information in E-Commerce. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | Jeff Gilchrist |
Solitary Confinement: Using Artificial Cells to Control Access and Facilitate Apoptosis in Computer Systems. |
PST |
2005 |
DBLP BibTeX RDF |
|
1 | |
Second Annual Conference on Privacy, Security and Trust, October 13-15, 2004, Wu Centre, University of New Brunswick, Fredericton, New Brunswick, Canada, Proceedings |
PST |
2004 |
DBLP BibTeX RDF |
|
1 | Jean-Marc Seigneur, Nathan Dimmock, Ciarán Bryce, Christian Damsgaard Jensen |
Combating Spam with TEA. |
PST |
2004 |
DBLP BibTeX RDF |
|
1 | Terry Roebuck |
A Diagrammatical Framework for Information Systems Attacks. |
PST |
2004 |
DBLP BibTeX RDF |
|
1 | Evelien van de Garde-Perik, Boris E. R. de Ruyter, Panos Markopoulos 0001, Berry Eggen |
The Sensitivities of User Profile Information in Music Recommender Systems. |
PST |
2004 |
DBLP BibTeX RDF |
|