Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Zainab M. Aljazzaf, Miriam A. M. Capretz, Mark Perry 0001 |
Trust bootstrapping services and service providers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 7-15, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mark Manulis, Marion Steiner |
UPBA: User-Authenticated Property-Based Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 112-119, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Abbas Javadtalab, Laith Abbadi, Mona Omidyeganeh, Shervin Shirmohammadi, Carlisle M. Adams, Abdulmotaleb El-Saddik |
Transparent non-intrusive multimodal biometric system for video conference using the fusion of face and ear recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 87-92, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Md. Moniruzzaman, Ken Barker 0001 |
Delegation of access rights in a privacy preserving access control model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 124-133, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Viehmann |
Secure communication with secret sharing in static computer networks with partition in mistrust parties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 205-212, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sherif Saad, Issa Traoré, Ali A. Ghorbani 0001, Bassam Sayed, David Zhao, Wei Lu 0018, John Felix, Payman Hakimian |
Detecting P2P botnets through network behavior analysis and machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 174-180, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yoshihiro Kaneko, Yuji Kinpara, Yuta Shiomi |
A hamming distance-like filtering in keystroke dynamics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 93-95, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Lilia Georgieva |
Modelling of security properties in Alloy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 52-54, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Parham, John William Atwood |
Validation of security for participant control exchanges in multicast content distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 156-163, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Abdulsalam Yassine, Ali A. Nazari Shirehjini, Shervin Shirmohammadi, Thomas T. Tran |
Online information privacy: Agent-mediated payoff. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 260-263, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Naveed Ahmad 0003, Haitham S. Cruickshank, Zhili Sun, Muhammad Asif 0006 |
Pseudonymised communication in delay tolerant networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 1-6, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | François Gauthier 0001, Dominic Letarte, Thierry Lavoie, Ettore Merlo |
Extraction and comprehension of moodle's access control model: A case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 44-51, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jiangong Weng, Amy P. Felty |
An implementation of a verification condition generator for foundational proof-carrying code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 238-245, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nick Mailloux, Ali Miri, Monica Nevins |
Forward secure identity-based key agreement for dynamic groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 102-111, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nagajyothi Gunti, Weiqing Sun, Mohammed Y. Niamat |
I-RBAC: Isolation enabled role-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 79-86, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tristan Allard, Benjamin Nguyen, Philippe Pucheral |
Safe realization of the Generalization privacy mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 16-23, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ali Nur Mohammad Noman, Sk. Md. Mizanur Rahman, Carlisle Adams |
Improving security and usability of low cost RFID tags. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 134-141, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hagen Stübing, Murat Ceven, Sorin A. Huss |
A Diffie-Hellman based privacy protocol for Car-to-X communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 201-204, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dakshita Khurana, Aditya Gaurav |
Ensuring tight computational security against higher-order DPA attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 96-101, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Qi Xie, Urs Hengartner |
Privacy-preserving matchmaking For mobile social networking secure against malicious users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 252-259, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Esma Aïmeur, David Schönfeld |
The ultimate invasion of privacy: Identity theft. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 24-31, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sk. Md. Mizanur Rahman, Md. Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein T. Mouftah, Eiji Okamoto |
Cryptographic security models for eHealth P2P database management systems network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 164-173, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Joshua Gorner, Jie Zhang 0002, Robin Cohen |
Improving the use of advisor networks for multi-agent trust modelling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 71-78, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bernard Stepien, Stan Matwin, Amy P. Felty |
Advantages of a non-technical XACML notation in role-based models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 193-200, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Xuhua Ouyang, Binod Vaidya, Dimitrios Makrakis |
A probabilistic-based approach towards trust evaluation using Poisson Hidden Markov Models and Bonus Malus Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 150-155, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Paolo Gasti, Alessio Merlo |
On Re-use of randomness in broadcast encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 36-43, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nabil Seddigh, Biswajit Nandy, Rupinder Makkar, Jean-Francois Beaumont |
Security advances and challenges in 4G wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 62-71, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Brent Carrara, Carlisle Adams |
On achieving a digital identity management system with support for non-transferability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 150-159, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Omar Hasan, Elisa Bertino, Lionel Brunie |
Efficient privacy preserving reputation protocols inspired by secure sum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 126-133, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Nürnberger, Thomas Feller 0002, Sorin A. Huss |
Ray - a secure micro kernel architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 3-6, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Brent Carrara, Carlisle Adams |
You are the key: Generating cryptographic keys from voice biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 213-222, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hamad Binsalleeh, Thomas C. Ormerod, Amine Boukhtouta, Prosenjit Sinha, Amr M. Youssef, Mourad Debbabi, Lingyu Wang 0001 |
On the analysis of the Zeus botnet crimeware toolkit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 31-38, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bon K. Sy, Adam Ramirez, Arun Prakash Kumara Krishnan |
Secure Information Processing with Privacy Assurance - standard based design and development for biometric applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 223-230, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yunli Wang, Yan Cui, Liqiang Geng, Hongyu Liu |
A new perspective of privacy protection: Unique distinct l-SR diversity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 110-117, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Amirali Salehi-Abari, Tony White |
The relationship of trust, demand, and utility: Be more trustworthy, then i will buy more. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 72-79, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Leblanc, Alain Forget, Robert Biddle |
Guessing click-based graphical passwords by eye tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 197-204, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Azzam Mourad, Sara Ayoubi, Hamdi Yahyaoui, Hadi Otrok |
New approach for the dynamic enforcement of Web services security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 189-196, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Perumalraja Rengaraju, Chung-Horng Lung, Anand Srinivasan |
Design of distributed security architecture for multihop WiMAX networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 54-61, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | David Tancock, Siani Pearson, Andrew Charlesworth |
Analysis of Privacy Impact Assessments within Major jurisdictions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 118-125, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nauman Abdullah Shah, Muhammad Arif Wahla |
Secure architecture for RFID enabled supply chain hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 167-172, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sherif Saad, Issa Traoré |
Method ontology for intelligent network forensics analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 7-14, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | James P. Delgrande, Aaron Hunter 0001, Torsten Grote |
On the representation and verification of cryptographic protocols in a theory of action. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 39-45, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Linda Briesemeister, Steven Cheung, Ulf Lindqvist, Alfonso Valdes |
Detection, correlation, and visualization of attacks against critical infrastructure systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 15-22, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ji Ma, Kamel Adi, Mohamed Mejri, Luigi Logrippo |
Risk analysis in access control systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 160-166, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Palanivel Andiappan Kodeswaran, Evelyne Viegas |
Towards a privacy preserving policy based infrastructure for social data access to enable scientific research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 103-109, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ray Hunt, Jill Slay |
Achieving critical infrastructure protection through the interaction of computer security and network forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 23-30, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Paul Rabinovich |
Transaction signing in applications using identity federation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 144-149, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | James B. Williams 0001, Jens H. Weber-Jahnke |
Social networks for health care: Addressing regulatory gaps with privacy-by-design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 134-143, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Pulei Xiong, Liam Peyton |
A model-driven penetration test framework for Web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 173-180, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Carlisle Adams, Guy-Vincent Jourdan, Jean-Pierre Levac, François Prevost |
Lightweight protection against brute force login attacks on Web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 181-188, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sanat Kumar Bista, Keshav P. Dahal, Peter I. Cowling, Aziz Bouras |
Assessing trustworthiness of nodes to enhance performance in mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 80-87, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alex Stoianov |
Security of Error Correcting Code for biometric Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 231-235, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Heather Crawford |
Keystroke dynamics: Characteristics and opportunities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 205-212, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tracy Ann Kosa |
Vampire bats: Trust in Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 96-102, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mahendra Kumar, Richard E. Newman |
J3: High payload histogram neutral JPEG steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 46-53, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Haïdar Safa, Farah Abu Shahla |
Trust-aware monitoring scheme for WiMAX networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 88-95, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Michael Hay, Basil Saeed, Chung-Horng Lung, Anand Srinivasan |
Co-located Physical-Layer Network Coding to mitigate passive eavesdropping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada, pp. 1-2, 2010, IEEE, 978-1-4244-7551-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | |
Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![IEEE, 978-1-4244-7551-3 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Heidar Pirzadeh, Danny Dubé |
Encoding the Program Correctness Proofs as Programs in PCC Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 121-132, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Michel Deriaz |
The Uncertainty of the Truth. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 177-188, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Azzam Mourad, Dima Alhadidi, Mourad Debbabi |
Cross-Language Weaving Approach Targeting Software Security Hardening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 87-98, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Farag Azzedin, Ahmad Ridha |
The Effect of Behavior Change on Honesty Checking in Peer-to-Peer Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 145-150, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Riyad Alshammari, Nur Zincir-Heywood |
Investigating Two Different Approaches for Encrypted Traffic Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 156-166, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Princely Ifinedo |
IT Security and Privacy Issues in Global Financial Services Institutions: Do Socio-Economic and Cultural Factors Matter? ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 75-84, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Marianne Hirschbichler, Colin Boyd, Wageeh W. Boles |
A Multiple-Control Fuzzy Vault. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 36-47, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Baishakhi Ray, Shivakant Mishra |
A Protocol for Building Secure and Reliable Covert Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 246-253, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, C. Pandu Rangan |
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 109-120, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Viktor Krammer |
An Effective Defense against Intrusive Web Advertising. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 3-14, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Hilmi Günes Kayacik, Nur Zincir-Heywood |
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection? ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 213-223, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sheikh Iqbal Ahamed, Mehrab Monjur, Mohammad Saiful Islam |
CCTB: Context Correlation for Trust Bootstrapping in Pervasive Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 167-174, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Volker Fusenig, Eugen Staab, Uli Sorger, Thomas Engel 0001 |
Unlinkable Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 51-55, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Larry Korba, Stephen Marsh 0001, Reihaneh Safavi-Naini (eds.) |
Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![IEEE Computer Society, 978-0-7695-3390-2 The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Piotr Cofta |
Confidence-Compensating Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 65-74, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Nathan Lewis, Noria Foukia |
An Efficient Reputation-Based Routing Mechanism for Wireless Sensor Networks: Testing the Impact of Mobility and Hostile Nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 151-155, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Rachid Hadjidj, Xiaochun Yang, Syrine Tlili, Mourad Debbabi |
Model-Checking for Software Vulnerabilities Detection with Multi-Language Support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 133-142, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Kamil Reddy, H. S. Venter, Martin S. Olivier, Iain Currie |
Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 56-64, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Michal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger, Mina Askari, Jie Gao 0019 |
Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 227-231, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Apurva Mohan, Douglas M. Blough |
AttributeTrust A Framework for Evaluating Trust in Aggregated Attributes via a Reputation System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 201-212, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Wilfred Villegas, Bader Ali, Muthucumaru Maheswaran |
An Access Control Scheme for Protecting Personal Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 24-35, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Adetokunbo Makanju, Stephen Brooks, Nur Zincir-Heywood, Evangelos E. Milios |
LogView: Visualizing Event Log Clusters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 99-108, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | David Benjamin, Mikhail J. Atallah |
Private and Cheating-Free Outsourcing of Algebraic Computations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 240-245, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ed Brown, Tracy Ann Kosa |
Incorporating Privacy Outcomes: Teaching an Old Dog New Tricks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 232-239, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jie Zhang 0002, Murat Sensoy, Robin Cohen |
A Detailed Comparison of Probabilistic Approaches for Coping with Unfair Ratings in Trust and Reputation Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 189-200, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jani Suomalainen, Seamus Moloney, Juha Koivisto, Kari Keinänen |
OpenHouse: A Secure Platform for Distributed Home Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 15-23, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Vikram Goyal, Shyam K. Gupta 0001, Shobhit Saxena |
Query rewriting for detection of privacy violation through inferencing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 28, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | EunJoung Byun, SeokIn Kim, HongSoo Kim, SungJin Choi, JangWon Choi, Chong-Sun Hwang |
MTRMS: mutual-trust-based reputation management system in community-based peer-to-peer environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 53, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Sylvia L. Osborn |
Role-based access control: past, present and future. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 4, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Viktor Krammer |
Phishing defense against IDN address spoofing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 32, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
usability, web browsers, phishing, internet security, unicode, internationalized domain names |
1 | Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl |
Embedding verifiable information flow analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 39, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
embedded systems, static analysis, information flow, confidentiality, language-based security, smart objects |
1 | Candido Rodriguez, Ajay Daryanani, Diego R. López, Jose M. Macias |
AA-RR: working with authentication and authorization infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 58, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, software testing, identification, computer network security |
1 | Wenyin Zhang, Ningde Jin |
Chinese text watermarking based on occlusive components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 61, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Chinese text watermarking, digital watermarking |
1 | A. K. M. Harun-Ar-Rashid |
The quantum nature of cryptography: problems of public-key cryptography and the prospect of quantum key distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 72, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Stephanie Chow |
Ontario healthcare privacy act: compliant ad hoc healthcare applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 75, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Gregory B. Newby |
Paths to creativity in security careers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 3, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Mathew Graves, Mohammad Zulkernine |
Bridging the gap: software specification meets intrusion detector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 31, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
attack languages, intrusion detection, software security, software specification |
1 | Muhammad Alam, Michael Hafner, Ruth Breu |
Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 44, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
administrative role based access control, permission-level delegation, service oriented architectures, model-driven architecture |
1 | Reto Kohlas, Jacek Jonczy, Rolf Haenni |
Towards a precise semantics for authenticity and trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 18, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Michel Deriaz, Jean-Marc Seigneur |
Trust and security in spatial messaging: FoxyTag, the speed camera case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 20, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jinshan Liu, Valérie Issarny |
An incentive compatible reputation mechanism for ubiquitous computing environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 36, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ubiquitous computing, mobile ad hoc networks, incentive compatibility, reputation mechanism |
1 | Thomas W. Lauer, Xiaodong Deng |
Building online trust through privacy policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 22, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|