The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "PST"( http://dblp.L3S.de/Venues/PST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/pst

Publication years (Num. hits)
2004 (27) 2005 (32) 2006 (80) 2008 (26) 2010 (32) 2011 (39) 2012 (44) 2013 (52) 2014 (56) 2015 (28) 2016 (106) 2017 (47) 2018 (54) 2019 (51) 2021 (61) 2022 (32) 2023 (56)
Publication types (Num. hits)
inproceedings(806) proceedings(17)
Venues (Conferences, Journals, ...)
PST(823)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 156 occurrences of 123 keywords

Results
Found 823 publication records. Showing 823 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Antonio Ruiz-Martínez, C. Inmaculada Marín-López, Laura Baño-López, Antonio Fernandez Gómez-Skarmeta A new fair non-repudiation protocol for secure negotiation and contract signing. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF abuse freeness, contract negotiation, contract signing protocol, security, e-commerce, confidentiality, fair-exchange
1Eugenia Kondratova, Stephen Marsh 0001, Ali A. Ghorbani 0001 Trust-based contextual information filtering. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy and trust, mobility, context, information filtering
1Yang Bo, Wang Qin An efficient traitor tracing scheme based on MDS code. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF traitor tracing, collusion-resistant, MDS code
1Yunhai Tong, Guohui Sun, Peng Zhang, Shiwei Tang Privacy-preserving OLAP based on output perturbation across multiple sites. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jie Zhang 0002, Ali A. Ghorbani 0001, Robin Cohen An improved familiarity measurement for formalization of trust in e-commerce based multiagent systems. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF trust, e-commerce, multiagent systems, familiarity
1Marco Casassa Mont, Robert Thyne Privacy policy enforcement in enterprises with identity management solutions. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, access control, identity management, policy enforcement
1Deepak Venugopal, Guoning Hu, Nicoleta Roman Intelligent virus detection on mobile devices. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF common functionality, security, mobile, virus detection, DLL
1Mehran Nadjarbashi-Noghani, Ali A. Ghorbani 0001 Design and implementation of a behavioral difference analyzer for network intrusion detection. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF differential analyzer, intrusion detection, network security, diversity
1Jie Zhou, Jim Alves-Foss Architecture-based refinements for secure computer systems design. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF architectural refinement, non-functional requirements, multi-level security
1Sushil Jajodia Topological analysis of network attack vulnerability. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hongxia Jin Privacy, traceability, and anonymity for content protection. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anonymous trust, security, privacy, tracing, content protection
1Elisa Bertino Digital identity management and protection. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Reza Sadoddin, Ali A. Ghorbani 0001 Alert correlation survey: framework and techniques. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Catalin Bidian From stakeholder goals to product features: towards a role-based variability framework with decision boundary. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF software architecture, framework, variability, requirements analysis, product lines, product families, multi-agent modeling
1Jie Liu, Lei Fan 0002, Jianhua Li 0001 Cryptanalysis and improvement on Yang-Shieh authentication schemes. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptanalysis, smart cards, information security, remote authentication
1Kalman C. Toth Persona concept for web-based identity management. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1George Yee A privacy-preserving UBICOMP architecture. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ubiquitous computing, architecture, privacy protection, privacy policy, UBICOMP
1Gilbert Ornelas, Paulo Pinheiro da Silva Towards believing answers from cyber-infrastructure-based applications. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Santiago Zapata Hernandez, Antonio Fernandez Gómez-Skarmeta Virtual identities in authentication and authorization scenarios. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Daidalos, ID-token, PANA, RegID, VID, authentication, authorization, identity, diameter, SAML
1Yin Hua Li, Hye-Young Paik, Boualem Benatallah Formal consistency verification between BPEL process and privacy policy. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF consistency verification, business process, graph transformation, privacy policy
1Xuejun Yang, Xiangli Qu Towards reliable trust establishment in grid: a pre-evaluating set based bias-tuned method for dishonest feedback filtering. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF feedback filtering, pre-evaluating set, trust, grid
1Ebrahim Bagheri, Ali A. Ghorbani 0001 Towards an MDA-oriented UML profile for critical infrastructure modeling. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF modeling and simulation, UML profiles, critical infrastructure
1Jude Andrade Mobile access control policy for healthcare applications with XACML. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor Trust modelling for online transactions: a phishing scenario. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Dhiah el Diehn I. Abou-Tair A framework ensuring privacy in a distributed environment. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, access control, information flow control, policy enforcement
1Ebrahim Bagheri, Ali A. Ghorbani 0001 Behavior analysis through reputation propagation in a multi-context environment. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multi-context reputation, reputation formalization, reputation propagation
1Harshit Nayyar, Ali A. Ghorbani 0001 Approximate autoregressive modeling for network attack detection. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Barrington Young, Raj Bhatnagar Secure algorithm for finding K nearest neighbors in distributed databases. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1John B. Folkerts, Hans-Peter Bischof A comparison of reputation-based trust systems. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hilmi Günes Kayacik, Nur Zincir-Heywood Using self-organizing maps to build an attack map for forensic analysis. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF KDD 99 intrusion detection datasets, neural networks, intrusion detection, self-organizing map
1Honglei Zeng, Maher A. Alhossaini, Li Ding 0001, Richard Fikes, Deborah L. McGuinness Computing trust from revision history. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Torsten Spindler, Christoph Wartmann, Ludger Hovestadt, Daniel Roth 0002, Luc Van Gool, Andreas Steffen Privacy in video surveilled areas. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF computer vision, cryptography, surveillance, building automation
1Xiangdong An 0001, Dawn N. Jutla, Nick Cercone Dynamic inference control in privacy preference enforcement. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy protection, dynamic bayesian networks, inference control, ubiquitous environments
1Mike Gurski From concept to commercialiazed product: the challenges of privacy technologies. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Edward Brown, Khandaker Ahamed An early release heuristic for k-anonymization. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kenji Imamoto, Kouichi Sakurai Off-line verification of one-time ID in distributed environment. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Johnson P. Thomas, Sudha Chinni, George Ghinea Trust determination in ad hoc networks. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Dima Alhadidi, Nadia Belblidia, Mourad Debbabi Security crosscutting concerns and AspectJ. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Azzam Mourad, Marc-André Laverdière, Mourad Debbabi Security hardening of open source software. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jennifer Horkoff, Eric S. K. Yu, Lin Liu 0001 Analyzing trust in technology strategies. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF the i* framework, trust, trusted computing, goal modeling, business strategies, model evaluation
1Carsten D. Schultz A trust framework model for situational contexts. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF trust framework model, trust, trustworthiness
1Svetlana N. Yanushkevich A concept of intelligent biometric-based early detection and warning system. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF decision making support, physical access control, artificial intelligence, biometrics
1Aaditeshwar Seth, Mirza Omer Beg Achieving privacy and security in radio frequency identification. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Zhengping Wu, Alfred C. Weaver Requirements of federated trust management for service-oriented architectures. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF requirements, trust management, service-oriented computing
1J. Treurniet Detecting low-profile scans in TCP anomaly event data. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF distributed scan detection, scan detection, slow scan detection, network security, TCP, anomaly detection
1Michelle Watson Mobile healthcare applications: a study of access control. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MAVAAN, huddle mode, meditech, roaming mode, standalone mode, MANET
1Mohd M. Anwar, Jim E. Greer, Christopher A. Brooks 0001 Privacy enhanced personalization in e-learning. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, trust, personalization, anonymity, reputation, identity, pseudonymity
1Avner Levin Is workplace surveillance legal in Canada? Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, monitoring, surveillance, work
1Zhengping Wu, Alfred C. Weaver Using web service enhancements to bridge business trust relationships. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF web service enhancements, web service, trust management, trust establishment
1 Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006 Search on Bibsonomy PST The full citation details ... 2006 DBLP  BibTeX  RDF
1Alex Pandelidis Defining the security required for WAP based mobile ticket sales. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF mobile ticket sales, security, WAP, cellular
1Jiantao Kong, Karsten Schwan, Patrick M. Widener Protected data paths: delivering sensitive data via untrusted proxies. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Muhammad Alam, Michael Hafner, Ruth Breu A constraint based role based access control in the SECTET a model-driven approach. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF service oriented architectures, role based access control, model-driven architecture, model-driven security
1Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi Execution monitoring enforcement for limited-memory systems. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bounded history automata, enforcement mechanisms, locally-testable properties, security policies, execution monitoring, edit automata
1Walid Rjaibi Label-based access control (LBAC) in DB2 LUW. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Quan Zhou, Lin-gang Gu, Chong-Jun Wang, Jun Wang, Shifu Chen Using an improved C4.5 for imbalanced dataset of intrusion. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ajith Kamath, Ramiro Liscano, Abdulmotaleb El-Saddik User-credential based role mapping in multi-domain environment. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Vic Chung Considering role-based conflicts of interest in analyzing and designing e-health systems with goal-oriented methodologies. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF goal-oriented methodologies, healthcare privacy, healthcare security, system design, system analysis, conflicts of interest
1Scott Buffett, T. A. Kosa Towards a model for risk and consent management of personal health information. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Brian O'Higgins Deep packet inspection comes to the desktop. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Merv Matson, Mihaela Ulieru The 'how' and 'why' of persistent information security. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF avaliability, emergency response operations, information custodian, infosec, persistent information security, integrity, information security, confidentiality, digital rights management, DRM
1Anasuya Bulkan Is privacy an attainable goal?: a review of the privacy rights dilemma. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy contract, rights and ethics, policy
1Mustapha Refai Exploiting a buffer overflow using metasploit framework. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF metasploit, framework, buffer overflow, exploit, buffer overrun
1Reid Kerr, Robin Cohen Modeling trust using transactional, numerical units. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF buying and selling, e-commerce marketplaces, multiagent systems, trust and reputation
1Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua Security Analysis of Wireless Java. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Sabah S. Al-Fedaghi How to Calculate the Information Privacy. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Ariel Futoransky, Ariel Waissbein Enforcing Privacy in Web Applications. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Stephen Neville Are Deeper Levels of Risk Analysis a Requirement for Enabling Optimal Tactical Responses in INFOSEC Alert Correlation Systems? Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1 Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1James Blustein, Daniel L. Silver, Ching-Lung Fu Information Visualization for Intrusion Detection. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1John Marchesini, Sean W. Smith SHEMP: Secure Hardware Enhanced MyProxy. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1George Yee, Larry Korba Specifying Personal Privacy Policies to Avoid Unexpected Outcomes. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Zhengping Wu, Alfred C. Weaver A Privacy Preserving Enhanced Trust Building Mechanism for Web Services. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Scott Flinn, Jo Lumsden User Perceptions of Privacy and Security on the Web. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Patrick C. K. Hung Towards a Privacy Access Control Model for e-Healthcare Services. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Glenn Mahoney, Wendy J. Myrvold, Gholamali C. Shoja Generic Reliability Trust Model. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Frédéric Massicotte, Mathieu Couture, Yvan Labiche Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq Databases. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Anthony D. Whitehead Towards Eliminating Steganographic Communication. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Carsten Röcker Providing Personalized Privacy Support in Public Places. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Lars Brückner, Marco Voss MozPETs - a privacy enhanced Web Browser. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Ahmed Awad E. Ahmed, Issa Traoré Detecting Computer Intrusions Using Behavioral Biometrics. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Mike Smit, Michael McAllister, Jacob Slonim Public Trust and Electronic Health Records. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Narjès Boufaden, William Elazmeh, Stan Matwin, Nathalie Japkowicz PEEP- Privacy Enforcement in Email Project. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Philip W. L. Fong Link-Time Enforcement of Confined Types for JVM Bytecode. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Tim Storer, Ishbel Duncan Electronic Voting in the UK: Current Trends in Deployment , Requirements and Technologies. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Weiwei Geng, Scott Flinn, John M. DeDourek Usable Firewall Configuration. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Jacek Jonczy, Rolf Haenni Credential Networks: a General Model for Distributed Trust and Authenticity Management. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1George Bakos, Sergey Bratus Ubiquitous Redirection as Access Control Response. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Nazar Elfadil Graphical and Digital signature Combination for fulfilling the cultural gap between traditional signature and current smart card digital certificate/signature. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Elizabeth Chang 0001, Farookh Khadeer Hussain, Tharam S. Dillon Trustworthiness Measure for e-Service. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Jiong Zhang, Mohammad Zulkernine Network Intrusion Detection using Random Forests. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Andreas Hirt, Michael J. Jacobson Jr., Carey L. Williamson A Practical Buses Protocol for Anonymous Internet Communication. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Kevin Regan 0001, Robin Cohen, Pascal Poupart The Advisor-POMDP: A Principled Approach to Trust through Reputation in Electronic Markets. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Scott Buffett, Luc Comeau, Michael W. Fleming, Bruce Spencer MONOLOGUE: A Tool for Negotiating Exchanges of Private Information in E-Commerce. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1Jeff Gilchrist Solitary Confinement: Using Artificial Cells to Control Access and Facilitate Apoptosis in Computer Systems. Search on Bibsonomy PST The full citation details ... 2005 DBLP  BibTeX  RDF
1 Second Annual Conference on Privacy, Security and Trust, October 13-15, 2004, Wu Centre, University of New Brunswick, Fredericton, New Brunswick, Canada, Proceedings Search on Bibsonomy PST The full citation details ... 2004 DBLP  BibTeX  RDF
1Jean-Marc Seigneur, Nathan Dimmock, Ciarán Bryce, Christian Damsgaard Jensen Combating Spam with TEA. Search on Bibsonomy PST The full citation details ... 2004 DBLP  BibTeX  RDF
1Terry Roebuck A Diagrammatical Framework for Information Systems Attacks. Search on Bibsonomy PST The full citation details ... 2004 DBLP  BibTeX  RDF
1Evelien van de Garde-Perik, Boris E. R. de Ruyter, Panos Markopoulos 0001, Berry Eggen The Sensitivities of User Profile Information in Music Recommender Systems. Search on Bibsonomy PST The full citation details ... 2004 DBLP  BibTeX  RDF
Displaying result #701 - #800 of 823 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license