default search action
PST 2012: Paris, France
- Nora Cuppens-Boulahia, Philip Fong, Joaquín García-Alfaro, Stephen Marsh, Jan-Philipp Steghöfer:
Tenth Annual International Conference on Privacy, Security and Trust, PST 2012, Paris, France, July 16-18, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2323-9 - Alexandre Viejo, Jordi Castellà-Roca, Oriol Bernado, Josep Maria Mateo-Sanz:
Single-party private web search. 1-8 - Gianpiero Costantino, Fabio Martinelli, Paolo Santi, Dario Amoruso:
An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast. 9-16 - Marian Harbach, Sascha Fahl, Michael Brenner, Thomas Muders, Matthew Smith:
Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions. 17-24 - Arun Prakash, Kumara Krishnan, Bon K. Sy:
SIPPA-2.0 - Secure information processing with privacy assurance (version 2.0). 25-34 - Aditi Ramachandran, Lisa Singh, Edward Porter, Frank Nagle:
Exploring re-identification risks in public domains. 35-42 - Denzil Correa, Ashish Sureka, Raghav Sethi:
WhACKY! - What anyone could know about you from Twitter. 43-50 - Francesco Buccafurri, Lidia Fotia, Gianluca Lax:
Privacy-preserving resource evaluation in social networks. 51-58 - Nicolas Anciaux, Benjamin Nguyen, Michalis Vazirgiannis:
Limiting data collection in application forms: A real-case application of a founding privacy principle. 59-66 - Yasser Jafer, Herna L. Viktor, Eric Paquet:
Aggregation and privacy in multi-relational databases. 67-74 - Slim Trabelsi, Jakub Sendor:
Sticky policies for data control in the cloud. 75-80 - Fatema Rashid, Ali Miri, Isaac Woungang:
A secure data deduplication framework for cloud environments. 81-87
Security
- Daniel Leblanc, Robert Biddle:
Risk perception of internet-related activities. 88-95 - Shushan Zhao, Robert D. Kent, Akshai K. Aggarwal:
An integrated key management and secure routing framework for Mobile Ad-Hoc Networks. 96-103 - Florian Schmitt, Jan Gassen, Elmar Gerhards-Padilla:
PDF Scrutinizer: Detecting JavaScript-based attacks in PDF documents. 104-111 - Yusuke Takamatsu, Yuji Kosuga, Kenji Kono:
Automated detection of session management vulnerabilities in web applications. 112-119 - Hanine Tout, Azzam Mourad, Hamdi Yahyaoui, Chamseddine Talhi, Hadi Otrok:
Towards a BPEL model-driven approach for Web services security. 120-127 - Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter:
Out of sight, out of mind: Effects of displaying access-control information near the item it controls. 128-136 - Jaehong Park, Dang Nguyen, Ravi S. Sandhu:
A provenance-based access control model. 137-144 - Liang Chen, Jason Crampton, Martin J. Kollingbaum, Timothy J. Norman:
Obligations in risk-aware access control. 145-152
Trust
- Anirban Basu, Natasha Dwyer, Stephen Naicken:
A concordance framework for building trust evidences. 153-154 - Jennifer Golbeck, Hal Warren, Eva Winer:
Making trusted attribute assertions online with the publish trust framework. 155-156 - Cody Buntain, Jennifer Golbeck, Dana S. Nau, Sarit Kraus:
Advice and trust in games of choice. 157-158 - Mark Vinkovits:
Towards requirements for trust management. 159-160 - Mehrdad Nojoumian, Douglas R. Stinson:
Social secret sharing in cloud computing using a new trust function. 161-167 - Huiying Duan, Peng Yang:
Building robust Reputation Systems for travel-related services. 168-175 - Kasper Lindberg, Christian Damsgaard Jensen:
Collaborative trust evaluation for wiki security. 176-184 - Johannes Viehmann:
The theory of creating trust with a set of mistrust-parties. 185-194 - Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab:
CENTER: A Centralized Trust-Based Efficient Routing protocol for wireless sensor networks. 195-202 - Audun Jøsang, Kent A. Varmedal, Christophe Rosenberger, Rajendra Kumar:
Service provider authentication assurance. 203-210 - Jonathan Lung:
Ethical and legal considerations of reCAPTCHA. 211-216
Short Papers
- Muyiwa Olurin, Carlisle Adams, Luigi Logrippo:
Platform for privacy preferences (P3P): Current status and future directions. 217-220 - Manuel Lafond, Pierre-Olivier Brosseau, Esma Aïmeur:
Privacy invasion in business environments. 221-224 - Ali Nur Mohammad Noman, Carlisle M. Adams:
DLAS: Data Location Assurance Service for cloud computing environments. 225-228 - Ivan Studnia, Vincent Nicomette, Mohamed Kaâniche, Eric Alata:
A distributed platform of high interaction honeypots and experimental results. 229-230 - Said Marouf, Mohamed Shehab, Adharsh Desikan:
REM: A runtime browser extension manager with fine-grained access control. 231-232 - Julien Bringer, Hervé Chabanne, Olivier Cipiere:
Combining the setbase approach with negative databases. 233-234
TSOS 2012 Workshop
- Christian Müller-Schloer, Wolfgang Reif, Jan-Philipp Steghöfer:
3rd edition of the workshop on trustworthy self-organizing systems (TSOS 2012). 235 - (Withdrawn) The role of trust in computer security. 236
- Jeremy Pitt:
Distributive and retributive justice in self-organising electronic institutions. 237 - Graeme Smith, Jeff W. Sanders:
Using conventional reasoning techniques for self-organising systems. 238-243 - Gabriele Peters, Kerstin Bunte, Marc Strickert, Michael Biehl, Thomas Villmann:
Visualization of processes in self-learning systems. 244-249 - Lukas Klejnowski, Yvonne Bernard, Christian Müller-Schloer, Jörg Hähner:
Using Trust to reduce wasteful computation in open Desktop Grid Systems. 250-255 - Pratap Chillakanti:
Secure collaboration in on boarding companies. 256-259
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.