


default search action
12th CSE 2009: Vanoucer, BC, Canada - Volume 3
- Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009. IEEE Computer Society 2009, ISBN 978-1-4244-5334-4

IEEE International Conference on Privacy, Security, Risk, and Trust (PASSAT 2009)
Privacy and Security I
- Shaozhi Ye, Shyhtsun Felix Wu, Raju Pandey, Hao Chen

:
Noise Injection for Search Privacy Protection. 1-8 - Saeed Samet

, Ali Miri:
Privacy-Preserving Bayesian Network for Horizontally Partitioned Data. 9-16 - Thomas Léauté, Boi Faltings:

Privacy-Preserving Multi-agent Constraint Satisfaction. 17-25 - Wanying Luo, Qi Xie, Urs Hengartner:

FaceCloak: An Architecture for User Privacy on Social Networking Sites. 26-33
Privacy and Security II
- Florian Kerschbaum:

Adapting Privacy-Preserving Computation to the Service Provider Model. 34-41 - Yasuyuki Tsukada

, Ken Mano, Hideki Sakurada, Yoshinobu Kawabe:
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach. 42-51 - Benjamin Kellermann, Rainer Böhme:

Privacy-Enhanced Event Scheduling. 52-59 - Mary-Anne Williams

:
Privacy Management, the Law & Business Strategies: A Case for Privacy Driven Design. 60-67
Privacy and Security III
- Wei Jiang, Mummoorthy Murugesan, Chris Clifton, Luo Si:

t-Plausibility: Semantic Preserving Text Sanitization. 68-75 - Wenjia Li

, Anupam Joshi
, Tim Finin
:
Policy-Based Malicious Peer Detection in Ad Hoc Networks. 76-82 - Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus, Antony Martin:

Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems. 83-91
Risk and Trust
- Eugen Staab, Thomas Engel:

Tuning Evidence-Based Trust Models. 92-99 - Dimitri do B. DeFigueiredo, Earl T. Barr

, Shyhtsun Felix Wu:
Trust Is in the Eye of the Beholder. 100-108 - Richard Seymour, Gilbert L. Peterson

:
A Trust-Based Multiagent System. 109-116 - Markus Huber

, Stewart Kowalski, Marcus Nohlberg, Simon Tjoa
:
Towards Automating Social Engineering Using Social Networking Sites. 117-124 - Sara Motahari, Sotirios G. Ziavras

, Mor Naaman
, Mohamed Ismail, Quentin Jones:
Social Inference Risk Modeling in Mobile and Social Applications. 125-132
The 2009 International Symposium on Secure Computing (SecureCom 2009)
Privacy and Security I
- David Evans, Robert H. Warren:

Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans. 133-138 - Florian Schaub

, Zhendong Ma, Frank Kargl:
Privacy Requirements in Vehicular Communication Systems. 139-145 - Harold van Heerde, Maarten M. Fokkinga, Nicolas Anciaux:

A Framework to Balance Privacy and Data Usability Using Data Degradation. 146-153
Privacy and Security II
- Kambiz Ghazinour, Maryam Majedi, Ken Barker:

A Lattice-Based Privacy Aware Access Control Model. 154-159 - Martin Neubauer:

Modelling of Pseudonymity under Probabilistic Linkability Attacks. 160-167 - Gelareh Taban, Virgil D. Gligor:

Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks. 168-175
Privacy and Security III
- Victor Manuel García-Barrios:

User-centric Privacy Framework: Integrating Legal, Technological and Human Aspects into User-Adapting Systems. 176-181 - I-Cheng Wang, Chih-Hao Shen, Kung Chen

, Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang:
An Empirical Study on Privacy and Secure Multi-party Computation Using Exponentiation. 182-188 - Ram Krishnan, Ravi S. Sandhu:

A Hybrid Enforcement Model for Group-centric Secure Information Sharing. 189-194 - Jason Crampton, Hemanth Khambhammettu:

A Framework for Enforcing Constrained RBAC Policies. 195-200
Privacy and Security IV
- Mohammed Hussain, David B. Skillicorn

:
Guarantee-Based Access Control. 201-206 - Ruilin Liu, Wendy Hui Wang:

Integrity Verification of Outsourced XML Databases. 207-212 - Riham Hassan, Mohamed Eltoweissy, Shawn A. Bohner, Sherif El-Kassas:

Goal-Oriented Software Security Engineering: The Electronic Smart Card Case Study. 213-218 - Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta:

A Unified Approach to Intra-domain Security. 219-224
Risk and Trust I
- Chih-Hung Chang:

A Low-Cost Green IT Design and Application of VHSP Based on Virtualization Technology. 225-230 - Pavel Minarík, Jan Vykopal

, Vojtech Krmicek:
Improving Host Profiling with Bidirectional Flows. 231-237 - Shashwat Raizada, Goutam Paul, Vineet Pandey:

Nearby-Friend Discovery Protocol for Multiple Users. 238-243 - Ghassan Jabbour, Daniel A. Menascé:

The Insider Threat Security Architecture: A Framework for an Integrated, Inseparable, and Uninterrupted Self-Protection Mechanism. 244-251
Risk and Trust II
- Daniel Trivellato, Fred Spiessens, Nicola Zannone

, Sandro Etalle:
Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control. 252-258 - Peter Schartner, Stefan Rass

:
How to overcome the 'Trusted Node Model' in Quantum Cryptography. 259-262 - Mark Hoogendoorn, S. Waqar Jaffry

:
The Influence of Personalities Upon the Dynamics of Trust and Reputation. 263-270 - Danesh Irani, Steve Webb, Kang Li, Calton Pu:

Large Online Social Footprints - An Emerging Threat. 271-276
Risk and Trust III
- Xusen Cheng, Linda A. Macaulay, Alex Zarifis

:
A Case Study of Individual Trust Development in Computer Mediated Collaboration Teams. 277-282 - John Lyle, Andrew P. Martin

:
On the Feasibility of Remote Attestation for Web Services. 283-288 - Michele Barletta, Silvio Ranise

, Luca Viganò:
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures. 289-296 - Mathias Kohler, Achim D. Brucker

, Andreas Schaad:
ProActive Caching: Generating Caching Heuristics for Business Process Environments. 297-304
The 2009 International Symposium on Privacy and Security Applications (PSA 2009)
Privacy and Security I
- Behzad Malek, Ali Miri:

Combining Attribute-Based and Access Systems. 305-312 - Ayonote Clement, Pavol Zavarsky, Dale Lindskog:

Analysis of the GMPLS Control Plane Security. 313-318 - Mark Rounds, Norman Pendegraft:

Diversity in Network Attacker Motivation: A Literature Review. 319-323
Privacy and Security II
- Hendrik J. G. Oberholzer, Martin S. Olivier

:
Emergency Privacy Measures. 324-329 - Anthony Stell

, Richard O. Sinnott
, Oluwafemi O. Ajayi, Jipu Jiang:
Designing Privacy for Scalable Electronic Healthcare Linkage. 330-336 - Ning Hu, Peidong Zhu, Huayang Cao, Kan Chen:

Routing Policy Conflict Detection without Violating ISP's Privacy. 337-342 - Benjamin Wasser, Justin Zhan:

Practical Values for Privacy. 343-346
Privacy and Security III
- Hicham Tout, William Hafner:

Phishpin: An Identity-Based Anti-phishing Approach. 347-352 - André van Cleeff, Wolter Pieters, Roel J. Wieringa:

Security Implications of Virtualization: A Literature Study. 353-358 - Dimitris Zisiadis

, Spyros Kopsidas, Leandros Tassiulas:
ViDPSec Visual Device Pairing Security Protocol. 359-364 - Safaa Zaman, Fakhri Karray:

Lightweight IDS Based on Features Selection and IDS Classification Scheme. 365-370
Risk and Trust
- Mandeep Saran, Pavol Zavarsky:

A Study of the Methods for Improving Internet Usage Policy Compliance. 371-378 - Shi-Cho Cha, Li-Ting Liu, Bo-Chen Yu:

Process-Oriented Approach for Validating Asset Value for Evaluating Information Security Risk. 379-385 - Zhitao Huang, Pavol Zavarsky, Ron Ruhl:

An Efficient Framework for IT Controls of Bill 198 (Canada Sarbanes-Oxley) Compliance by Aligning COBIT 4.1, ITIL v3 and ISO/IEC 27002. 386-391 - Jean Everson Martina, Túlio Cicero Salvaro de Souza, Ricardo Felipe Custódio:

Ceremonies Formal Analysis in PKI's Context. 392-398
The 2009 International Workshop on Software Security Processes (SSP 2009)
Software Engineering for Security
- Muhammad Umair Ahmed Khan

, Mohammad Zulkernine:
Activity and Artifact Views of a Secure Software Development Process. 399-404 - Valentina Casola

, Anna Rita Fasolino
, Nicola Mazzocca
, Porfirio Tramontana
:
An AHP-Based Framework for Quality and Security Evaluation. 405-411 - Claudio A. Ardagna

, Massimo Banzi, Ernesto Damiani
, Fulvio Frati:
Assurance Process for Large Open Source Code Bases. 412-417 - John Aycock, Juan M. Gutiérrez Cárdenas, Daniel Medeiros Nunes de Castro:

Code Obfuscation Using Pseudo-random Number Generators. 418-423 - Takao Okubo, Kenji Taguchi, Nobukazu Yoshioka

:
Misuse Cases + Assets + Security Goals. 424-429
Data Privacy
- Girma Nigusse, Bart De Decker, Vincent Naessens:

Specification of Fair Data Practice Principles Using Privacy Policy Languages. 430-437 - Alaa Aref El Masri, João Pedro Sousa:

Limiting Private Data Exposure in Online Transactions: A User-Based Online Privacy Assurance Model. 438-443 - Nicolas Liampotis

, Ioanna Roussaki, Elizabeth Papadopoulou, Yussuf Abu-Shaaban, M. Howard Williams, Nicholas K. Taylor
, Sarah McBurney, Kajetan Dolinar:
A Privacy Framework for Personal Self-Improving Smart Spaces. 444-449 - Qussai Yaseen

, Brajendra Panda:
Knowledge Acquisition and Insider Threat Prediction in Relational Database Systems. 450-455
Risk Management
- Samuel Oladapo, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Andy Igonor:

Managing Risk of IT Security Outsourcing in the Decision-Making Stage. 456-461 - Fariborz Farahmand, Melissa Dark, Sydney Liles, Brandon Sorge

:
Risk Perceptions of Information Security: A Measurement Study. 462-469 - Yeni Yuqin Li Helgesson:

Managing Risks on Critical IT Systems in Public Service Organizations. 470-475 - Burcu Bulgurcu, Hasan Cavusoglu

, Izak Benbasat:
Effects of Individual and Organization Based Beliefs and the Moderating Role of Work Experience on Insiders' Good Security Behaviors. 476-481
Trust and Security Models and Emerging Approaches
- Yun Yang, Juhua Chen:

A Dynamic Trust Evaluation Model on C2C Marketplaces. 482-485 - Xiaoli Lin, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:

Threat Modeling for CSRF Attacks. 486-491 - Franco Frattolillo

, Federica Landolfi, Fiammetta Marulli
:
A Novel Approach to DRM Systems. 492-497 - Seiji Shibaguchi, Yuki Nakayama, Ken-ichi Okada:

Worm Path Identification Using Visualization System. 498-503 - Norman Pendegraft, Mark Rounds:

A Simulation of Various Variable Hacker Populations. 504-510

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














