


default search action
PST 2006: Markham, Ontario, Canada
- Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006. ACM International Conference Proceeding Series 380, ACM 2006
Keynotes
- Elisa Bertino:
Digital identity management and protection. 1 - Sushil Jajodia:
Topological analysis of network attack vulnerability. 2 - Gregory B. Newby:
Paths to creativity in security careers. 3 - Sylvia L. Osborn:
Role-based access control: past, present and future. 4
Industry keynotes
- Mike Gurski:
From concept to commercialiazed product: the challenges of privacy technologies. 5 - Brian O'Higgins:
Deep packet inspection comes to the desktop. 6 - Walid Rjaibi:
Label-based access control (LBAC) in DB2 LUW. 7
Trust computing
- Honglei Zeng, Maher A. Alhossaini, Li Ding, Richard Fikes, Deborah L. McGuinness:
Computing trust from revision history. 8 - Jennifer Horkoff, Eric S. K. Yu, Lin Liu:
Analyzing trust in technology strategies. 9 - Zhengping Wu, Alfred C. Weaver
:
Requirements of federated trust management for service-oriented architectures. 10 - Ponnurangam Kumaraguru, Alessandro Acquisti
, Lorrie Faith Cranor:
Trust modelling for online transactions: a phishing scenario. 11 - John B. Folkerts, Hans-Peter Bischof:
A comparison of reputation-based trust systems. 12
Security computing
- Muhammad Alam, Michael Hafner, Ruth Breu:
A constraint based role based access control in the SECTET a model-driven approach. 13 - Jiantao Kong, Karsten Schwan, Patrick M. Widener:
Protected data paths: delivering sensitive data via untrusted proxies. 14 - Jie Zhou, Jim Alves-Foss:
Architecture-based refinements for secure computer systems design. 15 - Antonio Ruiz-Martínez
, C. Inmaculada Marín-López, Laura Baño-López, Antonio Fernandez Gómez-Skarmeta
:
A new fair non-repudiation protocol for secure negotiation and contract signing. 16 - J. Treurniet:
Detecting low-profile scans in TCP anomaly event data. 17
Trust modeling
- Reto Kohlas, Jacek Jonczy, Rolf Haenni:
Towards a precise semantics for authenticity and trust. 18 - Jie Zhang, Ali A. Ghorbani, Robin Cohen:
An improved familiarity measurement for formalization of trust in e-commerce based multiagent systems. 19 - Michel Deriaz, Jean-Marc Seigneur:
Trust and security in spatial messaging: FoxyTag, the speed camera case study. 20 - Reid Kerr, Robin Cohen:
Modeling trust using transactional, numerical units. 21 - Thomas W. Lauer, Xiaodong Deng:
Building online trust through privacy policies. 22 - Harshit Nayyar, Ali A. Ghorbani:
Approximate autoregressive modeling for network attack detection. 23
Privacy technologies
- Xiangdong An, Dawn N. Jutla, Nick Cercone:
Dynamic inference control in privacy preference enforcement. 24 - Marco Casassa Mont
, Robert Thyne:
Privacy policy enforcement in enterprises with identity management solutions. 25 - Yin Hua Li, Hye-Young Paik, Boualem Benatallah:
Formal consistency verification between BPEL process and privacy policy. 26 - George Yee:
A privacy-preserving UBICOMP architecture. 27 - Vikram Goyal, Shyam K. Gupta, Shobhit Saxena:
Query rewriting for detection of privacy violation through inferencing. 28 - Torsten Spindler, Christoph Wartmann, Ludger Hovestadt, Daniel Roth, Luc Van Gool, Andreas Steffen:
Privacy in video surveilled areas. 29
Protection and defense
- Avner Levin:
Is workplace surveillance legal in Canada? 30 - Mathew Graves, Mohammad Zulkernine:
Bridging the gap: software specification meets intrusion detector. 31 - Viktor Krammer:
Phishing defense against IDN address spoofing attacks. 32 - Hilmi Günes Kayacik, Nur Zincir-Heywood:
Using self-organizing maps to build an attack map for forensic analysis. 33 - Yang Bo, Wang Qin:
An efficient traitor tracing scheme based on MDS code. 34
Trust monitoring and reputation
- Zhengping Wu, Alfred C. Weaver
:
Using web service enhancements to bridge business trust relationships. 35 - Jinshan Liu, Valérie Issarny:
An incentive compatible reputation mechanism for ubiquitous computing environments. 36 - Reza Sadoddin, Ali A. Ghorbani:
Alert correlation survey: framework and techniques. 37 - Chamseddine Talhi, Nadia Tawbi
, Mourad Debbabi
:
Execution monitoring enforcement for limited-memory systems. 38 - Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl:
Embedding verifiable information flow analysis. 39 - Ebrahim Bagheri, Ali A. Ghorbani:
Behavior analysis through reputation propagation in a multi-context environment. 40
Short papers: Security and privacy issues
- Aaditeshwar Seth, Mirza Omer Beg:
Achieving privacy and security in radio frequency identification. 41 - Mohd M. Anwar, Jim E. Greer, Christopher A. Brooks:
Privacy enhanced personalization in e-learning. 42 - Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
Security hardening of open source software. 43 - Muhammad Alam, Michael Hafner, Ruth Breu:
Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET. 44 - Dima Alhadidi, Nadia Belblidia, Mourad Debbabi:
Security crosscutting concerns and AspectJ. 45 - Yunhai Tong, Guohui Sun, Peng Zhang, Shiwei Tang:
Privacy-preserving OLAP based on output perturbation across multiple sites. 46 - Dhiah el Diehn I. Abou-Tair:
A framework ensuring privacy in a distributed environment. 47 - Edward Brown, Khandaker Ahamed:
An early release heuristic for k-anonymization. 48
Short papers: Trust applications
- Xuejun Yang, Xiangli Qu:
Towards reliable trust establishment in grid: a pre-evaluating set based bias-tuned method for dishonest feedback filtering. 49 - Carsten D. Schultz
:
A trust framework model for situational contexts. 50 - Eugenia Kondratova, Stephen Marsh, Ali A. Ghorbani:
Trust-based contextual information filtering. 51 - Johnson P. Thomas, Sudha Chinni, George Ghinea:
Trust determination in ad hoc networks. 52 - EunJoung Byun, SeokIn Kim, HongSoo Kim, SungJin Choi, JangWon Choi, Chong-Sun Hwang:
MTRMS: mutual-trust-based reputation management system in community-based peer-to-peer environment. 53 - Scott Buffett, T. A. Kosa:
Towards a model for risk and consent management of personal health information. 54 - Svetlana N. Yanushkevich
:
A concept of intelligent biometric-based early detection and warning system. 55 - Merv Matson, Mihaela Ulieru:
The 'how' and 'why' of persistent information security. 56
Short papers: Authentication and authorization
- Santiago Zapata Hernandez, Antonio Fernandez Gómez-Skarmeta:
Virtual identities in authentication and authorization scenarios. 57 - Candido Rodriguez, Ajay Daryanani, Diego R. López, Jose M. Macias:
AA-RR: working with authentication and authorization infrastructures. 58 - Kalman C. Toth:
Persona concept for web-based identity management. 59 - Kenji Imamoto, Kouichi Sakurai:
Off-line verification of one-time ID in distributed environment. 60 - Wenyin Zhang, Ningde Jin:
Chinese text watermarking based on occlusive components. 61 - Ajith Kamath, Ramiro Liscano, Abdulmotaleb El-Saddik:
User-credential based role mapping in multi-domain environment. 62 - Hongxia Jin:
Privacy, traceability, and anonymity for content protection. 63 - Jie Liu, Lei Fan, Jianhua Li:
Cryptanalysis and improvement on Yang-Shieh authentication schemes. 64
Short papers: Security applications
- Deepak Venugopal, Guoning Hu, Nicoleta Roman:
Intelligent virus detection on mobile devices. 65 - Ebrahim Bagheri, Ali A. Ghorbani:
Towards an MDA-oriented UML profile for critical infrastructure modeling. 66 - Quan Zhou, Lin-gang Gu, Chong-Jun Wang, Jun Wang, Shifu Chen:
Using an improved C4.5 for imbalanced dataset of intrusion. 67 - Barrington Young, Raj Bhatnagar:
Secure algorithm for finding K nearest neighbors in distributed databases. 68 - Mehran Nadjarbashi-Noghani, Ali A. Ghorbani:
Design and implementation of a behavioral difference analyzer for network intrusion detection. 69 - Gilbert Ornelas, Paulo Pinheiro da Silva:
Towards believing answers from cyber-infrastructure-based applications. 70
Student poster papers
- Alex Pandelidis:
Defining the security required for WAP based mobile ticket sales. 71 - A. K. M. Harun-Ar-Rashid:
The quantum nature of cryptography: problems of public-key cryptography and the prospect of quantum key distribution. 72 - Anasuya Bulkan:
Is privacy an attainable goal?: a review of the privacy rights dilemma. 73 - Mustapha Refai:
Exploiting a buffer overflow using metasploit framework. 74 - Stephanie Chow:
Ontario healthcare privacy act: compliant ad hoc healthcare applications. 75 - Jude Andrade:
Mobile access control policy for healthcare applications with XACML. 76 - Michelle Watson:
Mobile healthcare applications: a study of access control. 77 - Vic Chung:
Considering role-based conflicts of interest in analyzing and designing e-health systems with goal-oriented methodologies. 78 - Catalin Bidian:
From stakeholder goals to product features: towards a role-based variability framework with decision boundary. 79

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.