default search action
PST 2004: Fredericton, New Brunswick, Canada
- Second Annual Conference on Privacy, Security and Trust, October 13-15, 2004, Wu Centre, University of New Brunswick, Fredericton, New Brunswick, Canada, Proceedings. 2004
Session 1: Commerce and Society
- Ali Grami, Bernadette Schell:
Future Trends in Mobile Commerce: Service Offerings, Technological Advances and Security Challenges. 1-14 - Milena M. Head, Khaled Hassanein:
Building Online Trust through Socially Rich Web Interfaces. 15-22 - Jie Zhang, Ali A. Ghorbani:
Familiarity and Trust: Measuring Familiarity with a Web Site. 23-28 - Anna Shubina, Sean W. Smith:
Design and Prototype of a Coercion-Resistant, Verifiable Electronic Voting System. 29-39 - Tim Storer, Ishbel Duncan:
Practical Remote Electronic Elections for the UK. 41-45
Session 2: Privacy and Identity
- Jean-Marc Seigneur, Nathan Dimmock, Ciarán Bryce, Christian Damsgaard Jensen:
Combating Spam with TEA. 47-58 - Lori Kettel, Christopher A. Brooks, Jim E. Greer:
Supporting Privacy in E-Learning with Semantic Streams. 59-67 - Mohammad Mannan, Paul C. van Oorschot:
Secure Public Instant Messaging. 69-77 - Scott Buffett, Nathan Scott, Bruce Spencer, Michael Richter, Michael W. Fleming:
Determining Internet Users' Values for Private Information. 79-88 - Stephan J. Engberg, Morten Borup Harning, Christian Damsgaard Jensen:
Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience. 89-101
Session 3: Short Papers
- Brian R. Richardson, Jim E. Greer:
An Architecture for Identity Management (August 2004). 103-108 - Terry Roebuck:
A Diagrammatical Framework for Information Systems Attacks. 109-117 - Panayiotis Periorellis, Christopher J. W. Townson, Philip English:
Structural Concepts for Trust, Contract and Security Management for a Virtual Chemical Engineering Organisation. 119-130 - Ying-Chieh Chen, Patrick S. Chen, Ronggong Song, Larry Korba:
Online Gaming Crime and Security Issue - Cases and Countermeasures from Taiwan. 131-136 - Evelien van de Garde-Perik, Boris E. R. de Ruyter, Panos Markopoulos, Berry Eggen:
The Sensitivities of User Profile Information in Music Recommender Systems. 137-141 - Bastin Tony Roy Savarimuthu, Martin K. Purvis, Marcos de Oliveira, Maryam Purvis:
Towards secure interaction in agent societies. 143-148 - Stephen Marsh:
infoDNA (Version 2) Agent Enhanced Trustworthy Distributed Information. 149-153 - Oded Tal, Scott Knight, Tom Dean:
Syntax-based Vulnerability Testing of Frame-based Network Protocols. 155-160
Session 4: Security Methods
- Alexandre Lacasse, Mohamed Mejri, Béchir Ktari:
Formal Implementation of Network Security Policies. 161-166 - Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani:
A novel visualization technique for network anomaly detection. 167-174 - Mathieu Couture, Béchir Ktari, Mohamed Mejri, Frédéric Massicotte:
A Declarative Approach to Stateful Intrusion Detection and Network Monitoring. 175-179 - Mehdi Shajari, Ali A. Ghorbani:
Application of Belief-Desire-Intention Agents in Intrusion Detection & Response. 181-191 - Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray Sweidan:
Detection of New Malicious Code Using N-grams Signatures. 193-196
Session 5: Information Access and Assurance
- Nabil Seddigh, Peter Pieda, Ashraf Matrawy, Biswajit Nandy, Ioannis Lambadaris, Adam Hatfield:
Current Trends and Advances in Information Assurance Metrics. 197-205 - Marc Branchaud, Scott Flinn:
xTrust: A Scalable Trust Management Infrastructure. 207-218 - Deholo Nali, Ali Miri, Carlisle M. Adams:
Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities. 219-223
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.