default search action
12th CSE 2009: Vanoucer, BC, Canada - Volume 3
- Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009. IEEE Computer Society 2009, ISBN 978-1-4244-5334-4
IEEE International Conference on Privacy, Security, Risk, and Trust (PASSAT 2009)
Privacy and Security I
- Shaozhi Ye, Shyhtsun Felix Wu, Raju Pandey, Hao Chen:
Noise Injection for Search Privacy Protection. 1-8 - Saeed Samet, Ali Miri:
Privacy-Preserving Bayesian Network for Horizontally Partitioned Data. 9-16 - Thomas Léauté, Boi Faltings:
Privacy-Preserving Multi-agent Constraint Satisfaction. 17-25 - Wanying Luo, Qi Xie, Urs Hengartner:
FaceCloak: An Architecture for User Privacy on Social Networking Sites. 26-33
Privacy and Security II
- Florian Kerschbaum:
Adapting Privacy-Preserving Computation to the Service Provider Model. 34-41 - Yasuyuki Tsukada, Ken Mano, Hideki Sakurada, Yoshinobu Kawabe:
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach. 42-51 - Benjamin Kellermann, Rainer Böhme:
Privacy-Enhanced Event Scheduling. 52-59 - Mary-Anne Williams:
Privacy Management, the Law & Business Strategies: A Case for Privacy Driven Design. 60-67
Privacy and Security III
- Wei Jiang, Mummoorthy Murugesan, Chris Clifton, Luo Si:
t-Plausibility: Semantic Preserving Text Sanitization. 68-75 - Wenjia Li, Anupam Joshi, Tim Finin:
Policy-Based Malicious Peer Detection in Ad Hoc Networks. 76-82 - Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus, Antony Martin:
Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems. 83-91
Risk and Trust
- Eugen Staab, Thomas Engel:
Tuning Evidence-Based Trust Models. 92-99 - Dimitri do B. DeFigueiredo, Earl T. Barr, Shyhtsun Felix Wu:
Trust Is in the Eye of the Beholder. 100-108 - Richard Seymour, Gilbert L. Peterson:
A Trust-Based Multiagent System. 109-116 - Markus Huber, Stewart Kowalski, Marcus Nohlberg, Simon Tjoa:
Towards Automating Social Engineering Using Social Networking Sites. 117-124 - Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mohamed Ismail, Quentin Jones:
Social Inference Risk Modeling in Mobile and Social Applications. 125-132
The 2009 International Symposium on Secure Computing (SecureCom 2009)
Privacy and Security I
- David Evans, Robert H. Warren:
Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans. 133-138 - Florian Schaub, Zhendong Ma, Frank Kargl:
Privacy Requirements in Vehicular Communication Systems. 139-145 - Harold van Heerde, Maarten M. Fokkinga, Nicolas Anciaux:
A Framework to Balance Privacy and Data Usability Using Data Degradation. 146-153
Privacy and Security II
- Kambiz Ghazinour, Maryam Majedi, Ken Barker:
A Lattice-Based Privacy Aware Access Control Model. 154-159 - Martin Neubauer:
Modelling of Pseudonymity under Probabilistic Linkability Attacks. 160-167 - Gelareh Taban, Virgil D. Gligor:
Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks. 168-175
Privacy and Security III
- Victor Manuel García-Barrios:
User-centric Privacy Framework: Integrating Legal, Technological and Human Aspects into User-Adapting Systems. 176-181 - I-Cheng Wang, Chih-Hao Shen, Kung Chen, Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang:
An Empirical Study on Privacy and Secure Multi-party Computation Using Exponentiation. 182-188 - Ram Krishnan, Ravi S. Sandhu:
A Hybrid Enforcement Model for Group-centric Secure Information Sharing. 189-194 - Jason Crampton, Hemanth Khambhammettu:
A Framework for Enforcing Constrained RBAC Policies. 195-200
Privacy and Security IV
- Mohammed Hussain, David B. Skillicorn:
Guarantee-Based Access Control. 201-206 - Ruilin Liu, Wendy Hui Wang:
Integrity Verification of Outsourced XML Databases. 207-212 - Riham Hassan, Mohamed Eltoweissy, Shawn A. Bohner, Sherif El-Kassas:
Goal-Oriented Software Security Engineering: The Electronic Smart Card Case Study. 213-218 - Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta:
A Unified Approach to Intra-domain Security. 219-224
Risk and Trust I
- Chih-Hung Chang:
A Low-Cost Green IT Design and Application of VHSP Based on Virtualization Technology. 225-230 - Pavel Minarík, Jan Vykopal, Vojtech Krmicek:
Improving Host Profiling with Bidirectional Flows. 231-237 - Shashwat Raizada, Goutam Paul, Vineet Pandey:
Nearby-Friend Discovery Protocol for Multiple Users. 238-243 - Ghassan Jabbour, Daniel A. Menascé:
The Insider Threat Security Architecture: A Framework for an Integrated, Inseparable, and Uninterrupted Self-Protection Mechanism. 244-251
Risk and Trust II
- Daniel Trivellato, Fred Spiessens, Nicola Zannone, Sandro Etalle:
Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control. 252-258 - Peter Schartner, Stefan Rass:
How to overcome the 'Trusted Node Model' in Quantum Cryptography. 259-262 - Mark Hoogendoorn, S. Waqar Jaffry:
The Influence of Personalities Upon the Dynamics of Trust and Reputation. 263-270 - Danesh Irani, Steve Webb, Kang Li, Calton Pu:
Large Online Social Footprints - An Emerging Threat. 271-276
Risk and Trust III
- Xusen Cheng, Linda A. Macaulay, Alex Zarifis:
A Case Study of Individual Trust Development in Computer Mediated Collaboration Teams. 277-282 - John Lyle, Andrew P. Martin:
On the Feasibility of Remote Attestation for Web Services. 283-288 - Michele Barletta, Silvio Ranise, Luca Viganò:
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures. 289-296 - Mathias Kohler, Achim D. Brucker, Andreas Schaad:
ProActive Caching: Generating Caching Heuristics for Business Process Environments. 297-304
The 2009 International Symposium on Privacy and Security Applications (PSA 2009)
Privacy and Security I
- Behzad Malek, Ali Miri:
Combining Attribute-Based and Access Systems. 305-312 - Ayonote Clement, Pavol Zavarsky, Dale Lindskog:
Analysis of the GMPLS Control Plane Security. 313-318 - Mark Rounds, Norman Pendegraft:
Diversity in Network Attacker Motivation: A Literature Review. 319-323
Privacy and Security II
- Hendrik J. G. Oberholzer, Martin S. Olivier:
Emergency Privacy Measures. 324-329 - Anthony Stell, Richard O. Sinnott, Oluwafemi O. Ajayi, Jipu Jiang:
Designing Privacy for Scalable Electronic Healthcare Linkage. 330-336 - Ning Hu, Peidong Zhu, Huayang Cao, Kan Chen:
Routing Policy Conflict Detection without Violating ISP's Privacy. 337-342 - Benjamin Wasser, Justin Zhan:
Practical Values for Privacy. 343-346
Privacy and Security III
- Hicham Tout, William Hafner:
Phishpin: An Identity-Based Anti-phishing Approach. 347-352 - André van Cleeff, Wolter Pieters, Roel J. Wieringa:
Security Implications of Virtualization: A Literature Study. 353-358 - Dimitris Zisiadis, Spyros Kopsidas, Leandros Tassiulas:
ViDPSec Visual Device Pairing Security Protocol. 359-364 - Safaa Zaman, Fakhri Karray:
Lightweight IDS Based on Features Selection and IDS Classification Scheme. 365-370
Risk and Trust
- Mandeep Saran, Pavol Zavarsky:
A Study of the Methods for Improving Internet Usage Policy Compliance. 371-378 - Shi-Cho Cha, Li-Ting Liu, Bo-Chen Yu:
Process-Oriented Approach for Validating Asset Value for Evaluating Information Security Risk. 379-385 - Zhitao Huang, Pavol Zavarsky, Ron Ruhl:
An Efficient Framework for IT Controls of Bill 198 (Canada Sarbanes-Oxley) Compliance by Aligning COBIT 4.1, ITIL v3 and ISO/IEC 27002. 386-391 - Jean Everson Martina, Túlio Cicero Salvaro de Souza, Ricardo Felipe Custódio:
Ceremonies Formal Analysis in PKI's Context. 392-398
The 2009 International Workshop on Software Security Processes (SSP 2009)
Software Engineering for Security
- Muhammad Umair Ahmed Khan, Mohammad Zulkernine:
Activity and Artifact Views of a Secure Software Development Process. 399-404 - Valentina Casola, Anna Rita Fasolino, Nicola Mazzocca, Porfirio Tramontana:
An AHP-Based Framework for Quality and Security Evaluation. 405-411 - Claudio A. Ardagna, Massimo Banzi, Ernesto Damiani, Fulvio Frati:
Assurance Process for Large Open Source Code Bases. 412-417 - John Aycock, Juan M. Gutiérrez Cárdenas, Daniel Medeiros Nunes de Castro:
Code Obfuscation Using Pseudo-random Number Generators. 418-423 - Takao Okubo, Kenji Taguchi, Nobukazu Yoshioka:
Misuse Cases + Assets + Security Goals. 424-429
Data Privacy
- Girma Nigusse, Bart De Decker, Vincent Naessens:
Specification of Fair Data Practice Principles Using Privacy Policy Languages. 430-437 - Alaa Aref El Masri, João Pedro Sousa:
Limiting Private Data Exposure in Online Transactions: A User-Based Online Privacy Assurance Model. 438-443 - Nicolas Liampotis, Ioanna Roussaki, Elizabeth Papadopoulou, Yussuf Abu-Shaaban, M. Howard Williams, Nicholas K. Taylor, Sarah McBurney, Kajetan Dolinar:
A Privacy Framework for Personal Self-Improving Smart Spaces. 444-449 - Qussai Yaseen, Brajendra Panda:
Knowledge Acquisition and Insider Threat Prediction in Relational Database Systems. 450-455
Risk Management
- Samuel Oladapo, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Andy Igonor:
Managing Risk of IT Security Outsourcing in the Decision-Making Stage. 456-461 - Fariborz Farahmand, Melissa Dark, Sydney Liles, Brandon Sorge:
Risk Perceptions of Information Security: A Measurement Study. 462-469 - Yeni Yuqin Li Helgesson:
Managing Risks on Critical IT Systems in Public Service Organizations. 470-475 - Burcu Bulgurcu, Hasan Cavusoglu, Izak Benbasat:
Effects of Individual and Organization Based Beliefs and the Moderating Role of Work Experience on Insiders' Good Security Behaviors. 476-481
Trust and Security Models and Emerging Approaches
- Yun Yang, Juhua Chen:
A Dynamic Trust Evaluation Model on C2C Marketplaces. 482-485 - Xiaoli Lin, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
Threat Modeling for CSRF Attacks. 486-491 - Franco Frattolillo, Federica Landolfi, Fiammetta Marulli:
A Novel Approach to DRM Systems. 492-497 - Seiji Shibaguchi, Yuki Nakayama, Ken-ichi Okada:
Worm Path Identification Using Visualization System. 498-503 - Norman Pendegraft, Mark Rounds:
A Simulation of Various Variable Hacker Populations. 504-510
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.