PST 2006:
Markham,
Ontario,
Canada
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006.
ACM International Conference Proceeding Series 380 ACM 2006 BibTeX
Keynotes
Industry keynotes
Trust computing
- Honglei Zeng, Maher A. Alhossaini, Li Ding, Richard Fikes, Deborah L. McGuinness:
Computing trust from revision history.
8
Electronic Edition (ACM DL) BibTeX
- Jennifer Horkoff, Eric S. K. Yu, Lin Liu:
Analyzing trust in technology strategies.
9
Electronic Edition (ACM DL) BibTeX
- Zhengping Wu, Alfred C. Weaver:
Requirements of federated trust management for service-oriented architectures.
10
Electronic Edition (ACM DL) BibTeX
- Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor:
Trust modelling for online transactions: a phishing scenario.
11
Electronic Edition (ACM DL) BibTeX
- John B. Folkerts, Hans-Peter Bischof:
A comparison of reputation-based trust systems.
12
Electronic Edition (ACM DL) BibTeX
Security computing
Trust modeling
- Reto Kohlas, Jacek Jonczy, Rolf Haenni:
Towards a precise semantics for authenticity and trust.
18
Electronic Edition (ACM DL) BibTeX
- Jie Zhang, Ali A. Ghorbani, Robin Cohen:
An improved familiarity measurement for formalization of trust in e-commerce based multiagent systems.
19
Electronic Edition (ACM DL) BibTeX
- Michel Deriaz, Jean-Marc Seigneur:
Trust and security in spatial messaging: FoxyTag, the speed camera case study.
20
Electronic Edition (ACM DL) BibTeX
- Reid Kerr, Robin Cohen:
Modeling trust using transactional, numerical units.
21
Electronic Edition (ACM DL) BibTeX
- Thomas W. Lauer, Xiaodong Deng:
Building online trust through privacy policies.
22
Electronic Edition (ACM DL) BibTeX
- Harshit Nayyar, Ali A. Ghorbani:
Approximate autoregressive modeling for network attack detection.
23
Electronic Edition (ACM DL) BibTeX
Privacy technologies
- Xiangdong An, Dawn N. Jutla, Nick Cercone:
Dynamic inference control in privacy preference enforcement.
24
Electronic Edition (ACM DL) BibTeX
- Marco Casassa Mont, Robert Thyne:
Privacy policy enforcement in enterprises with identity management solutions.
25
Electronic Edition (ACM DL) BibTeX
- Yin Hua Li, Hye-Young Paik, Boualem Benatallah:
Formal consistency verification between BPEL process and privacy policy.
26
Electronic Edition (ACM DL) BibTeX
- George Yee:
A privacy-preserving UBICOMP architecture.
27
Electronic Edition (ACM DL) BibTeX
- Vikram Goyal, Shyam K. Gupta, Shobhit Saxena:
Query rewriting for detection of privacy violation through inferencing.
28
Electronic Edition (ACM DL) BibTeX
- Torsten Spindler, Christoph Wartmann, Ludger Hovestadt, Daniel Roth, Luc J. Van Gool, Andreas Steffen:
Privacy in video surveilled areas.
29
Electronic Edition (ACM DL) BibTeX
Protection and defense
Trust monitoring and reputation
Short papers:
Security and privacy issues
- Aaditeshwar Seth, Mirza Beg:
Achieving privacy and security in radio frequency identification.
41
Electronic Edition (ACM DL) BibTeX
- Mohd M. Anwar, Jim E. Greer, Christopher A. Brooks:
Privacy enhanced personalization in e-learning.
42
Electronic Edition (ACM DL) BibTeX
- Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
Security hardening of open source software.
43
Electronic Edition (ACM DL) BibTeX
- Muhammad Alam, Michael Hafner, Ruth Breu:
Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET.
44
Electronic Edition (ACM DL) BibTeX
- Dima Alhadidi, Nadia Belblidia, Mourad Debbabi:
Security crosscutting concerns and AspectJ.
45
Electronic Edition (ACM DL) BibTeX
- Yunhai Tong, Guohui Sun, Peng Zhang, Shiwei Tang:
Privacy-preserving OLAP based on output perturbation across multiple sites.
46
Electronic Edition (ACM DL) BibTeX
- Dhiah el Diehn I. Abou-Tair:
A framework ensuring privacy in a distributed environment.
47
Electronic Edition (ACM DL) BibTeX
- Edward Brown, Khandaker Ahamed:
An early release heuristic for k-anonymization.
48
Electronic Edition (ACM DL) BibTeX
Short papers:
Trust applications
- Xuejun Yang, Xiangli Qu:
Towards reliable trust establishment in grid: a pre-evaluating set based bias-tuned method for dishonest feedback filtering.
49
Electronic Edition (ACM DL) BibTeX
- Carsten D. Schultz:
A trust framework model for situational contexts.
50
Electronic Edition (ACM DL) BibTeX
- Eugenia Kondratova, Stephen Marsh, Ali A. Ghorbani:
Trust-based contextual information filtering.
51
Electronic Edition (ACM DL) BibTeX
- Johnson P. Thomas, Sudha Chinni, George Ghinea:
Trust determination in ad hoc networks.
52
Electronic Edition (ACM DL) BibTeX
- EunJoung Byun, SeokIn Kim, HongSoo Kim, SungJin Choi, JangWon Choi, Chong-Sun Hwang:
MTRMS: mutual-trust-based reputation management system in community-based peer-to-peer environment.
53
Electronic Edition (ACM DL) BibTeX
- Scott Buffett, T. A. Kosa:
Towards a model for risk and consent management of personal health information.
54
Electronic Edition (ACM DL) BibTeX
- Svetlana N. Yanushkevich:
A concept of intelligent biometric-based early detection and warning system.
55
Electronic Edition (ACM DL) BibTeX
- Merv Matson, Mihaela Ulieru:
The 'how' and 'why' of persistent information security.
56
Electronic Edition (ACM DL) BibTeX
Short papers:
Authentication and authorization
- Santiago Zapata Hernandez, Antonio F. Gómez-Skarmeta:
Virtual identities in authentication and authorization scenarios.
57
Electronic Edition (ACM DL) BibTeX
- Candido Rodriguez, Ajay Daryanani, Diego R. Lopez, Jose M. Macias:
AA-RR: working with authentication and authorization infrastructures.
58
Electronic Edition (ACM DL) BibTeX
- Kalman C. Toth:
Persona concept for web-based identity management.
59
Electronic Edition (ACM DL) BibTeX
- Kenji Imamoto, Kouichi Sakurai:
Off-line verification of one-time ID in distributed environment.
60
Electronic Edition (ACM DL) BibTeX
- Zhang Wenyin, Jin Ningde:
Chinese text watermarking based on occlusive components.
61
Electronic Edition (ACM DL) BibTeX
- Ajith Kamath, Ramiro Liscano, Abdulmotaleb El-Saddik:
User-credential based role mapping in multi-domain environment.
62
Electronic Edition (ACM DL) BibTeX
- Hongxia Jin:
Privacy, traceability, and anonymity for content protection.
63
Electronic Edition (ACM DL) BibTeX
- Jie Liu, Lei Fan, Jianhua Li:
Cryptanalysis and improvement on Yang-Shieh authentication schemes.
64
Electronic Edition (ACM DL) BibTeX
Short papers:
Security applications
- Deepak Venugopal, Guoning Hu, Nicoleta Roman:
Intelligent virus detection on mobile devices.
65
Electronic Edition (ACM DL) BibTeX
- Ebrahim Bagheri, Ali A. Ghorbani:
Towards an MDA-oriented UML profile for critical infrastructure modeling.
66
Electronic Edition (ACM DL) BibTeX
- Quan Zhou, Lin-gang Gu, Chong-Jun Wang, Jun Wang, Shifu Chen:
Using an improved C4.5 for imbalanced dataset of intrusion.
67
Electronic Edition (ACM DL) BibTeX
- Barrington Young, Raj Bhatnagar:
Secure algorithm for finding K nearest neighbors in distributed databases.
68
Electronic Edition (ACM DL) BibTeX
- Mehran Nadjarbashi-Noghani, Ali A. Ghorbani:
Design and implementation of a behavioral difference analyzer for network intrusion detection.
69
Electronic Edition (ACM DL) BibTeX
- Gilbert Ornelas, Paulo Pinheiro da Silva:
Towards believing answers from cyber-infrastructure-based applications.
70
Electronic Edition (ACM DL) BibTeX
Student poster papers
Copyright © Sat May 16 23:35:24 2009
by Michael Ley (ley@uni-trier.de)