


default search action
PST 2004: Fredericton, New Brunswick, Canada
- Second Annual Conference on Privacy, Security and Trust, October 13-15, 2004, Wu Centre, University of New Brunswick, Fredericton, New Brunswick, Canada, Proceedings. 2004

Session 1: Commerce and Society
- Ali Grami, Bernadette Schell:

Future Trends in Mobile Commerce: Service Offerings, Technological Advances and Security Challenges. 1-14 - Milena M. Head, Khaled Hassanein:

Building Online Trust through Socially Rich Web Interfaces. 15-22 - Jie Zhang, Ali A. Ghorbani:

Familiarity and Trust: Measuring Familiarity with a Web Site. 23-28 - Anna Shubina, Sean W. Smith:

Design and Prototype of a Coercion-Resistant, Verifiable Electronic Voting System. 29-39 - Tim Storer, Ishbel Duncan:

Practical Remote Electronic Elections for the UK. 41-45
Session 2: Privacy and Identity
- Jean-Marc Seigneur, Nathan Dimmock, Ciarán Bryce, Christian Damsgaard Jensen:

Combating Spam with TEA. 47-58 - Lori Kettel, Christopher A. Brooks, Jim E. Greer:

Supporting Privacy in E-Learning with Semantic Streams. 59-67 - Mohammad Mannan, Paul C. van Oorschot:

Secure Public Instant Messaging. 69-77 - Scott Buffett, Nathan Scott, Bruce Spencer, Michael Richter, Michael W. Fleming:

Determining Internet Users' Values for Private Information. 79-88 - Stephan J. Engberg, Morten Borup Harning, Christian Damsgaard Jensen:

Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience. 89-101
Session 3: Short Papers
- Brian R. Richardson, Jim E. Greer:

An Architecture for Identity Management (August 2004). 103-108 - Terry Roebuck:

A Diagrammatical Framework for Information Systems Attacks. 109-117 - Panayiotis Periorellis, Christopher J. W. Townson, Philip English:

Structural Concepts for Trust, Contract and Security Management for a Virtual Chemical Engineering Organisation. 119-130 - Ying-Chieh Chen, Patrick S. Chen, Ronggong Song, Larry Korba:

Online Gaming Crime and Security Issue - Cases and Countermeasures from Taiwan. 131-136 - Evelien van de Garde-Perik, Boris E. R. de Ruyter, Panos Markopoulos, Berry Eggen:

The Sensitivities of User Profile Information in Music Recommender Systems. 137-141 - Bastin Tony Roy Savarimuthu, Martin K. Purvis, Marcos de Oliveira, Maryam Purvis:

Towards secure interaction in agent societies. 143-148 - Stephen Marsh:

infoDNA (Version 2) Agent Enhanced Trustworthy Distributed Information. 149-153 - Oded Tal, Scott Knight, Tom Dean:

Syntax-based Vulnerability Testing of Frame-based Network Protocols. 155-160
Session 4: Security Methods
- Alexandre Lacasse, Mohamed Mejri, Béchir Ktari:

Formal Implementation of Network Security Policies. 161-166 - Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani:

A novel visualization technique for network anomaly detection. 167-174 - Mathieu Couture, Béchir Ktari, Mohamed Mejri, Frédéric Massicotte:

A Declarative Approach to Stateful Intrusion Detection and Network Monitoring. 175-179 - Mehdi Shajari, Ali A. Ghorbani:

Application of Belief-Desire-Intention Agents in Intrusion Detection & Response. 181-191 - Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray Sweidan:

Detection of New Malicious Code Using N-grams Signatures. 193-196
Session 5: Information Access and Assurance
- Nabil Seddigh, Peter Pieda, Ashraf Matrawy, Biswajit Nandy, Ioannis Lambadaris, Adam Hatfield:

Current Trends and Advances in Information Assurance Metrics. 197-205 - Marc Branchaud, Scott Flinn:

xTrust: A Scalable Trust Management Infrastructure. 207-218 - Deholo Nali, Ali Miri, Carlisle M. Adams:

Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities. 219-223

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














