Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Antonio Ruiz-Martínez, C. Inmaculada Marín-López, Laura Baño-López, Antonio Fernandez Gómez-Skarmeta |
A new fair non-repudiation protocol for secure negotiation and contract signing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 16, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
abuse freeness, contract negotiation, contract signing protocol, security, e-commerce, confidentiality, fair-exchange |
1 | Eugenia Kondratova, Stephen Marsh 0001, Ali A. Ghorbani 0001 |
Trust-based contextual information filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 51, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy and trust, mobility, context, information filtering |
1 | Yang Bo, Wang Qin |
An efficient traitor tracing scheme based on MDS code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 34, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
traitor tracing, collusion-resistant, MDS code |
1 | Yunhai Tong, Guohui Sun, Peng Zhang, Shiwei Tang |
Privacy-preserving OLAP based on output perturbation across multiple sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 46, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jie Zhang 0002, Ali A. Ghorbani 0001, Robin Cohen |
An improved familiarity measurement for formalization of trust in e-commerce based multiagent systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 19, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
trust, e-commerce, multiagent systems, familiarity |
1 | Marco Casassa Mont, Robert Thyne |
Privacy policy enforcement in enterprises with identity management solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 25, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, access control, identity management, policy enforcement |
1 | Deepak Venugopal, Guoning Hu, Nicoleta Roman |
Intelligent virus detection on mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 65, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
common functionality, security, mobile, virus detection, DLL |
1 | Mehran Nadjarbashi-Noghani, Ali A. Ghorbani 0001 |
Design and implementation of a behavioral difference analyzer for network intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 69, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
differential analyzer, intrusion detection, network security, diversity |
1 | Jie Zhou, Jim Alves-Foss |
Architecture-based refinements for secure computer systems design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 15, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
architectural refinement, non-functional requirements, multi-level security |
1 | Sushil Jajodia |
Topological analysis of network attack vulnerability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 2, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Hongxia Jin |
Privacy, traceability, and anonymity for content protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 63, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
anonymous trust, security, privacy, tracing, content protection |
1 | Elisa Bertino |
Digital identity management and protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 1, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Reza Sadoddin, Ali A. Ghorbani 0001 |
Alert correlation survey: framework and techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 37, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Catalin Bidian |
From stakeholder goals to product features: towards a role-based variability framework with decision boundary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 79, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
software architecture, framework, variability, requirements analysis, product lines, product families, multi-agent modeling |
1 | Jie Liu, Lei Fan 0002, Jianhua Li 0001 |
Cryptanalysis and improvement on Yang-Shieh authentication schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 64, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cryptanalysis, smart cards, information security, remote authentication |
1 | Kalman C. Toth |
Persona concept for web-based identity management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 59, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | George Yee |
A privacy-preserving UBICOMP architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 27, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ubiquitous computing, architecture, privacy protection, privacy policy, UBICOMP |
1 | Gilbert Ornelas, Paulo Pinheiro da Silva |
Towards believing answers from cyber-infrastructure-based applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 70, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Santiago Zapata Hernandez, Antonio Fernandez Gómez-Skarmeta |
Virtual identities in authentication and authorization scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 57, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Daidalos, ID-token, PANA, RegID, VID, authentication, authorization, identity, diameter, SAML |
1 | Yin Hua Li, Hye-Young Paik, Boualem Benatallah |
Formal consistency verification between BPEL process and privacy policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 26, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
consistency verification, business process, graph transformation, privacy policy |
1 | Xuejun Yang, Xiangli Qu |
Towards reliable trust establishment in grid: a pre-evaluating set based bias-tuned method for dishonest feedback filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 49, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
feedback filtering, pre-evaluating set, trust, grid |
1 | Ebrahim Bagheri, Ali A. Ghorbani 0001 |
Towards an MDA-oriented UML profile for critical infrastructure modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 66, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
modeling and simulation, UML profiles, critical infrastructure |
1 | Jude Andrade |
Mobile access control policy for healthcare applications with XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 76, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor |
Trust modelling for online transactions: a phishing scenario. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 11, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Dhiah el Diehn I. Abou-Tair |
A framework ensuring privacy in a distributed environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 47, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, access control, information flow control, policy enforcement |
1 | Ebrahim Bagheri, Ali A. Ghorbani 0001 |
Behavior analysis through reputation propagation in a multi-context environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 40, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
multi-context reputation, reputation formalization, reputation propagation |
1 | Harshit Nayyar, Ali A. Ghorbani 0001 |
Approximate autoregressive modeling for network attack detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 23, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Barrington Young, Raj Bhatnagar |
Secure algorithm for finding K nearest neighbors in distributed databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 68, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | John B. Folkerts, Hans-Peter Bischof |
A comparison of reputation-based trust systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 12, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Hilmi Günes Kayacik, Nur Zincir-Heywood |
Using self-organizing maps to build an attack map for forensic analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 33, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
KDD 99 intrusion detection datasets, neural networks, intrusion detection, self-organizing map |
1 | Honglei Zeng, Maher A. Alhossaini, Li Ding 0001, Richard Fikes, Deborah L. McGuinness |
Computing trust from revision history. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 8, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Torsten Spindler, Christoph Wartmann, Ludger Hovestadt, Daniel Roth 0002, Luc Van Gool, Andreas Steffen |
Privacy in video surveilled areas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 29, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
computer vision, cryptography, surveillance, building automation |
1 | Xiangdong An 0001, Dawn N. Jutla, Nick Cercone |
Dynamic inference control in privacy preference enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 24, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy protection, dynamic bayesian networks, inference control, ubiquitous environments |
1 | Mike Gurski |
From concept to commercialiazed product: the challenges of privacy technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 5, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Edward Brown, Khandaker Ahamed |
An early release heuristic for k-anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 48, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kenji Imamoto, Kouichi Sakurai |
Off-line verification of one-time ID in distributed environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 60, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Johnson P. Thomas, Sudha Chinni, George Ghinea |
Trust determination in ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 52, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Dima Alhadidi, Nadia Belblidia, Mourad Debbabi |
Security crosscutting concerns and AspectJ. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 45, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Azzam Mourad, Marc-André Laverdière, Mourad Debbabi |
Security hardening of open source software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 43, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jennifer Horkoff, Eric S. K. Yu, Lin Liu 0001 |
Analyzing trust in technology strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 9, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
the i* framework, trust, trusted computing, goal modeling, business strategies, model evaluation |
1 | Carsten D. Schultz |
A trust framework model for situational contexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 50, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
trust framework model, trust, trustworthiness |
1 | Svetlana N. Yanushkevich |
A concept of intelligent biometric-based early detection and warning system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 55, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
decision making support, physical access control, artificial intelligence, biometrics |
1 | Aaditeshwar Seth, Mirza Omer Beg |
Achieving privacy and security in radio frequency identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 41, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Zhengping Wu, Alfred C. Weaver |
Requirements of federated trust management for service-oriented architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 10, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
requirements, trust management, service-oriented computing |
1 | J. Treurniet |
Detecting low-profile scans in TCP anomaly event data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 17, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
distributed scan detection, scan detection, slow scan detection, network security, TCP, anomaly detection |
1 | Michelle Watson |
Mobile healthcare applications: a study of access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 77, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
MAVAAN, huddle mode, meditech, roaming mode, standalone mode, MANET |
1 | Mohd M. Anwar, Jim E. Greer, Christopher A. Brooks 0001 |
Privacy enhanced personalization in e-learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 42, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, trust, personalization, anonymity, reputation, identity, pseudonymity |
1 | Avner Levin |
Is workplace surveillance legal in Canada? ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 30, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, monitoring, surveillance, work |
1 | Zhengping Wu, Alfred C. Weaver |
Using web service enhancements to bridge business trust relationships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 35, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
web service enhancements, web service, trust management, trust establishment |
1 | |
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006 ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![ACM The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Alex Pandelidis |
Defining the security required for WAP based mobile ticket sales. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 71, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
mobile ticket sales, security, WAP, cellular |
1 | Jiantao Kong, Karsten Schwan, Patrick M. Widener |
Protected data paths: delivering sensitive data via untrusted proxies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 14, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Alam, Michael Hafner, Ruth Breu |
A constraint based role based access control in the SECTET a model-driven approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 13, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
service oriented architectures, role based access control, model-driven architecture, model-driven security |
1 | Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi |
Execution monitoring enforcement for limited-memory systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 38, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
bounded history automata, enforcement mechanisms, locally-testable properties, security policies, execution monitoring, edit automata |
1 | Walid Rjaibi |
Label-based access control (LBAC) in DB2 LUW. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 7, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Quan Zhou, Lin-gang Gu, Chong-Jun Wang, Jun Wang, Shifu Chen |
Using an improved C4.5 for imbalanced dataset of intrusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 67, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ajith Kamath, Ramiro Liscano, Abdulmotaleb El-Saddik |
User-credential based role mapping in multi-domain environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 62, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Vic Chung |
Considering role-based conflicts of interest in analyzing and designing e-health systems with goal-oriented methodologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 78, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
goal-oriented methodologies, healthcare privacy, healthcare security, system design, system analysis, conflicts of interest |
1 | Scott Buffett, T. A. Kosa |
Towards a model for risk and consent management of personal health information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 54, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Brian O'Higgins |
Deep packet inspection comes to the desktop. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 6, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Merv Matson, Mihaela Ulieru |
The 'how' and 'why' of persistent information security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 56, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
avaliability, emergency response operations, information custodian, infosec, persistent information security, integrity, information security, confidentiality, digital rights management, DRM |
1 | Anasuya Bulkan |
Is privacy an attainable goal?: a review of the privacy rights dilemma. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 73, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy contract, rights and ethics, policy |
1 | Mustapha Refai |
Exploiting a buffer overflow using metasploit framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 74, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
metasploit, framework, buffer overflow, exploit, buffer overrun |
1 | Reid Kerr, Robin Cohen |
Modeling trust using transactional, numerical units. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 21, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
buying and selling, e-commerce marketplaces, multiagent systems, trust and reputation |
1 | Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua |
Security Analysis of Wireless Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Sabah S. Al-Fedaghi |
How to Calculate the Information Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, pp. 3-13, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Ariel Futoransky, Ariel Waissbein |
Enforcing Privacy in Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Stephen Neville |
Are Deeper Levels of Risk Analysis a Requirement for Enabling Optimal Tactical Responses in INFOSEC Alert Correlation Systems? ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | |
Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | James Blustein, Daniel L. Silver, Ching-Lung Fu |
Information Visualization for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | John Marchesini, Sean W. Smith |
SHEMP: Secure Hardware Enhanced MyProxy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | George Yee, Larry Korba |
Specifying Personal Privacy Policies to Avoid Unexpected Outcomes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Zhengping Wu, Alfred C. Weaver |
A Privacy Preserving Enhanced Trust Building Mechanism for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Scott Flinn, Jo Lumsden |
User Perceptions of Privacy and Security on the Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Patrick C. K. Hung |
Towards a Privacy Access Control Model for e-Healthcare Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Glenn Mahoney, Wendy J. Myrvold, Gholamali C. Shoja |
Generic Reliability Trust Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Frédéric Massicotte, Mathieu Couture, Yvan Labiche |
Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Anthony D. Whitehead |
Towards Eliminating Steganographic Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Carsten Röcker |
Providing Personalized Privacy Support in Public Places. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Lars Brückner, Marco Voss |
MozPETs - a privacy enhanced Web Browser. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Ahmed Awad E. Ahmed, Issa Traoré |
Detecting Computer Intrusions Using Behavioral Biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood |
Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Mike Smit, Michael McAllister, Jacob Slonim |
Public Trust and Electronic Health Records. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Narjès Boufaden, William Elazmeh, Stan Matwin, Nathalie Japkowicz |
PEEP- Privacy Enforcement in Email Project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Philip W. L. Fong |
Link-Time Enforcement of Confined Types for JVM Bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Tim Storer, Ishbel Duncan |
Electronic Voting in the UK: Current Trends in Deployment , Requirements and Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Weiwei Geng, Scott Flinn, John M. DeDourek |
Usable Firewall Configuration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Jacek Jonczy, Rolf Haenni |
Credential Networks: a General Model for Distributed Trust and Authenticity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | George Bakos, Sergey Bratus |
Ubiquitous Redirection as Access Control Response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Nazar Elfadil |
Graphical and Digital signature Combination for fulfilling the cultural gap between traditional signature and current smart card digital certificate/signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Elizabeth Chang 0001, Farookh Khadeer Hussain, Tharam S. Dillon |
Trustworthiness Measure for e-Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Jiong Zhang, Mohammad Zulkernine |
Network Intrusion Detection using Random Forests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Andreas Hirt, Michael J. Jacobson Jr., Carey L. Williamson |
A Practical Buses Protocol for Anonymous Internet Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Kevin Regan 0001, Robin Cohen, Pascal Poupart |
The Advisor-POMDP: A Principled Approach to Trust through Reputation in Electronic Markets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Scott Buffett, Luc Comeau, Michael W. Fleming, Bruce Spencer |
MONOLOGUE: A Tool for Negotiating Exchanges of Private Information in E-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Jeff Gilchrist |
Solitary Confinement: Using Artificial Cells to Control Access and Facilitate Apoptosis in Computer Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | |
Second Annual Conference on Privacy, Security and Trust, October 13-15, 2004, Wu Centre, University of New Brunswick, Fredericton, New Brunswick, Canada, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Jean-Marc Seigneur, Nathan Dimmock, Ciarán Bryce, Christian Damsgaard Jensen |
Combating Spam with TEA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Second Annual Conference on Privacy, Security and Trust, October 13-15, 2004, Wu Centre, University of New Brunswick, Fredericton, New Brunswick, Canada, Proceedings, pp. 47-58, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Terry Roebuck |
A Diagrammatical Framework for Information Systems Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Second Annual Conference on Privacy, Security and Trust, October 13-15, 2004, Wu Centre, University of New Brunswick, Fredericton, New Brunswick, Canada, Proceedings, pp. 109-117, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Evelien van de Garde-Perik, Boris E. R. de Ruyter, Panos Markopoulos 0001, Berry Eggen |
The Sensitivities of User Profile Information in Music Recommender Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Second Annual Conference on Privacy, Security and Trust, October 13-15, 2004, Wu Centre, University of New Brunswick, Fredericton, New Brunswick, Canada, Proceedings, pp. 137-141, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|