default search action
PST 2013: Tarragona, Catalonia, Spain
- Jordi Castellà-Roca, Josep Domingo-Ferrer, Joaquín García-Alfaro, Ali A. Ghorbani, Christian Damsgaard Jensen, Jesús A. Manjón, Iosif-Viorel Onut, Natalia Stakhanova, Vicenç Torra, Jie Zhang:
Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013. IEEE Computer Society 2013, ISBN 978-1-4673-5839-2 - Esther Palomar, Almudena Alcaide, Elisenda Molina, Yan Zhang:
Coalitional games for the management of anonymous access in online social networks. 1-10 - Paolo D'Arco, Alfredo De Santis:
Key privacy and anonymous protocols. 11-18 - Benjamin Henne, Christian Kater, Matthew Smith, Michael Brenner:
Selective cloaking: Need-to-know for location-based apps. 19-26 - Jordi Soria-Comas, Josep Domingo-Ferrer:
Differential privacy via t-closeness in data publishing. 27-35 - Francesco Buccafurri, Lidia Fotia, Gianluca Lax:
Allowing privacy-preserving analysis of social network likes. 36-43 - Marc Juárez, Vicenç Torra:
A self-adaptive classification for the dissociating privacy agent. 44-50 - Alegria Baquero, Allan M. Schiffman, Jeff Shrager:
Blend me in: Privacy-preserving input generalization for personalized online services. 51-60 - Zahra Sohrabi-Bonab, Mahdi R. Alagheband, Mohammad Reza Aref:
Traceability analysis of quadratic residue-based RFID authentication protocols. 61-68 - Bisheng Liu, Urs Hengartner:
Privacy-preserving social recommendations in geosocial networks. 69-76 - Lin Cheng, Zhengping Jin, Qiaoyan Wen, Hua Zhang:
A novel privacy preserving keyword searching for cloud storage. 77-81 - Mohd Rizuan Baharon, Qi Shi, David Llewellyn-Jones, Madjid Merabti:
Secure rendering process in cloud computing. 82-87 - Md. Imrul Kayes, Adriana Iamnitchi:
Aegis: A semantic implementation of privacy as contextual integrity in social ecosystems. 88-97 - Nouha Oualha, Alexis Olivereau, Aymen Boudguiga:
Pseudonymous communications in secure industrial wireless sensor networks. 98-102 - Klara Stokes, Niklas Carlsson:
A peer-to-peer agent community for digital oblivion in online social networks. 103-110 - Kellyton dos Santos Brito, Frederico Araújo Durão, Vinicius Cardoso Garcia, Silvio Romero de Lemos Meira:
How people care about their personal data released on social media. 111-118 - John Ferro, Lisa Singh, Micah Sherr:
Identifying individual vulnerability based on public data. 119-126 - Morvarid Sehatkar, Stan Matwin:
HALT: Hybrid anonymization of longitudinal transactions. 127-134 - Muhammad Qasim Saeed, Zeeshan Bilal, Colin D. Walter:
An NFC based consumer-level counterfeit detection framework. 135-142 - Mathias Payer, Thomas R. Gross:
Hot-patching a web server: A case study of ASAP code repair. 143-150 - Sutirtha Sanyal:
SPIKE: A novel session key management protocol with time-varying secure cluster formation in wireless sensor networks. 151-160 - Alireza Toroghi Haghighat, Mohammad Sadeq Dousti, Rasool Jalili:
An efficient and provably-secure coercion-resistant e-voting protocol. 161-168 - Ricardo Neisse, Jörg Dörr:
Model-based specification and refinement of usage control policies. 169-176 - Mao-Pang Pang Lin, Wei-Chih Hong, Chih-Hung Chen, Chen-Mou Cheng:
Design and implementation of multi-user secure indices for encrypted cloud storage. 177-184 - Marco Balduzzi, Vincenzo Ciangaglini, Robert McArdle:
Targeted attacks detection with SPuNge. 185-194 - Vidushi Chaudhary, Ashish Sureka:
Contextual feature based one-class classifier approach for detecting video response spam on YouTube. 195-204 - Markus Gruber, Christian Schanes, Florian Fankhauser, Thomas Grechenig:
Voice calls for free: How the black market establishes free phone calls - Trapped and uncovered by a VoIP honeynet. 205-212 - Andrei Costin, Jelena Isacenkova, Marco Balduzzi, Aurélien Francillon, Davide Balzarotti:
The role of phone numbers in understanding cyber-crime schemes. 213-220 - Evangelos Aktoudianakis, Jason Crampton, Steve A. Schneider, Helen Treharne, Adrian Waller:
Policy templates for relationship-based access control. 221-228 - Bo Tang, Qi Li, Ravi S. Sandhu:
A multi-tenant RBAC model for collaborative cloud services. 229-238 - Mads I. Ingwar, Naveed Ahmed, Christian Damsgaard Jensen:
Error-rate-based fusion of biometric experts. 239-246 - Dang Nguyen, Jaehong Park, Ravi S. Sandhu:
A provenance-based access control model for dynamic separation of duties. 247-256 - Canh Ngo, Marc X. Makkes, Yuri Demchenko, Cees de Laat:
Multi-data-types interval decision diagrams for XACML evaluation engine. 257-266 - Vanessa Boothroyd, Sonia Chiasson:
Writing down your password: Does it help? 267-274 - Hosnieh Rafiee, Christoph Meinel:
SSAS: A simple secure addressing scheme for IPv6 autoconfiguration. 275-282 - Yi Qian, Sibel Adali:
Extended structural balance theory for modeling trust in social networks. 283-290 - Jian Chang, Peter Gebhard, Andreas Haeberlen, Zachary G. Ives, Insup Lee, Oleg Sokolsky, Krishna K. Venkatasubramanian:
TrustForge: Flexible access control for collaborative crowd-sourced environment. 291-300 - Paz Morillo, Marc Obrador:
Efficient polynomial delegation under standard assumptions. 301-308 - Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini:
Socio-technical formal analysis of TLS certificate validation in modern browsers. 309-316 - Ekaterina Kurdjokova, Michael Wißner, Stephan Hammer, Elisabeth André:
Trust-based decision-making for the adaptation of public displays in changing social contexts. 317-324 - Davide Ceolin, Archana Nottamkandath, Wan J. Fokkink:
Semi-automated assessment of annotation trustworthiness. 325-332 - Jason R. C. Nurse, Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Koen Lamberts:
Communicating trustworthiness using radar graphs: A detailed look. 333-339 - Muhammad Al Mutaz, Levi Malott, Sriram Chellappan:
Leveraging platoon dispersion for Sybil detection in vehicular networks. 340-347 - Sarah Magin, Sascha Hauke:
Towards engineering trust systems: Template-based, component-oriented assembly. 348-351 - Sebastian Biedermann, Martin Zittel, Stefan Katzenbeisser:
Improving security of virtual machines during live migrations. 352-357 - Alexandre Viejo, David Sánchez:
Providing useful and private Web search by means of social network profiling. 358-361 - Benjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne, Olivier Cipiere:
Define privacy-preserving setbase drawer size standard: A ∊-closeness perspective. 362-365 - Tim Storer, Stephen Marsh, Sylvie Noël, Babak Esfandiari, Khalil El-Khatib, Pamela Briggs, Karen Renaud, Mehmet Vefa Bicakci:
Encouraging second thoughts: Obstructive user interfaces for raising security awareness. 366-368 - Sergi Martinez-Bea, Sergio Castillo-Perez, Joaquín García-Alfaro:
Real-time malicious fast-flux detection using DNS and bot related features. 369-372 - Tsubasa Takahashi, Koji Sobataka, Takao Takenouchi, Yuki Toyoda, Takuya Mori, Takahide Kohro:
Top-down itemset recoding for releasing private complex data. 373-376 - Stephen Marsh, Yao Wang, Sylvie Noël, Lewis Robart, John A. Stewart:
Device Comfort for mobile health information accessibility. 377-380 - Anders Andersen:
An implementation of secure multi-party computations to preserve privacy when processing EMR data. 381-384
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.