PST 2006:
Markham,
Ontario,
Canada
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006.
ACM International Conference Proceeding Series 380 ACM 2006
Keynotes
Industry keynotes
- Mike Gurski:
From concept to commercialiazed product: the challenges of privacy technologies.
5
- Brian O'Higgins:
Deep packet inspection comes to the desktop.
6
- Walid Rjaibi:
Label-based access control (LBAC) in DB2 LUW.
7
Trust computing
- Honglei Zeng, Maher A. Alhossaini, Li Ding, Richard Fikes, Deborah L. McGuinness:
Computing trust from revision history.
8
- Jennifer Horkoff, Eric S. K. Yu, Lin Liu:
Analyzing trust in technology strategies.
9
- Zhengping Wu, Alfred C. Weaver:
Requirements of federated trust management for service-oriented architectures.
10
- Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor:
Trust modelling for online transactions: a phishing scenario.
11
- John B. Folkerts, Hans-Peter Bischof:
A comparison of reputation-based trust systems.
12
Security computing
Trust modeling
- Reto Kohlas, Jacek Jonczy, Rolf Haenni:
Towards a precise semantics for authenticity and trust.
18
- Jie Zhang, Ali A. Ghorbani, Robin Cohen:
An improved familiarity measurement for formalization of trust in e-commerce based multiagent systems.
19
- Michel Deriaz, Jean-Marc Seigneur:
Trust and security in spatial messaging: FoxyTag, the speed camera case study.
20
- Reid Kerr, Robin Cohen:
Modeling trust using transactional, numerical units.
21
- Thomas W. Lauer, Xiaodong Deng:
Building online trust through privacy policies.
22
- Harshit Nayyar, Ali A. Ghorbani:
Approximate autoregressive modeling for network attack detection.
23
Privacy technologies
- Xiangdong An, Dawn N. Jutla, Nick Cercone:
Dynamic inference control in privacy preference enforcement.
24
- Marco Casassa Mont, Robert Thyne:
Privacy policy enforcement in enterprises with identity management solutions.
25
- Yin Hua Li, Hye-Young Paik, Boualem Benatallah:
Formal consistency verification between BPEL process and privacy policy.
26
- George Yee:
A privacy-preserving UBICOMP architecture.
27
- Vikram Goyal, Shyam K. Gupta, Shobhit Saxena:
Query rewriting for detection of privacy violation through inferencing.
28
- Torsten Spindler, Christoph Wartmann, Ludger Hovestadt, Daniel Roth, Luc J. Van Gool, Andreas Steffen:
Privacy in video surveilled areas.
29
Protection and defense
Trust monitoring and reputation
Short papers:
Security and privacy issues
- Aaditeshwar Seth, Mirza Beg:
Achieving privacy and security in radio frequency identification.
41
- Mohd M. Anwar, Jim E. Greer, Christopher A. Brooks:
Privacy enhanced personalization in e-learning.
42
- Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
Security hardening of open source software.
43
- Muhammad Alam, Michael Hafner, Ruth Breu:
Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET.
44
- Dima Alhadidi, Nadia Belblidia, Mourad Debbabi:
Security crosscutting concerns and AspectJ.
45
- Yunhai Tong, Guohui Sun, Peng Zhang, Shiwei Tang:
Privacy-preserving OLAP based on output perturbation across multiple sites.
46
- Dhiah el Diehn I. Abou-Tair:
A framework ensuring privacy in a distributed environment.
47
- Edward Brown, Khandaker Ahamed:
An early release heuristic for k-anonymization.
48
Short papers:
Trust applications
- Xuejun Yang, Xiangli Qu:
Towards reliable trust establishment in grid: a pre-evaluating set based bias-tuned method for dishonest feedback filtering.
49
- Carsten D. Schultz:
A trust framework model for situational contexts.
50
- Eugenia Kondratova, Stephen Marsh, Ali A. Ghorbani:
Trust-based contextual information filtering.
51
- Johnson P. Thomas, Sudha Chinni, George Ghinea:
Trust determination in ad hoc networks.
52
- EunJoung Byun, SeokIn Kim, HongSoo Kim, SungJin Choi, JangWon Choi, Chong-Sun Hwang:
MTRMS: mutual-trust-based reputation management system in community-based peer-to-peer environment.
53
- Scott Buffett, T. A. Kosa:
Towards a model for risk and consent management of personal health information.
54
- Svetlana N. Yanushkevich:
A concept of intelligent biometric-based early detection and warning system.
55
- Merv Matson, Mihaela Ulieru:
The 'how' and 'why' of persistent information security.
56
Short papers:
Authentication and authorization
- Santiago Zapata Hernandez, Antonio F. Gómez-Skarmeta:
Virtual identities in authentication and authorization scenarios.
57
- Candido Rodriguez, Ajay Daryanani, Diego R. Lopez, Jose M. Macias:
AA-RR: working with authentication and authorization infrastructures.
58
- Kalman C. Toth:
Persona concept for web-based identity management.
59
- Kenji Imamoto, Kouichi Sakurai:
Off-line verification of one-time ID in distributed environment.
60
- Zhang Wenyin, Jin Ningde:
Chinese text watermarking based on occlusive components.
61
- Ajith Kamath, Ramiro Liscano, Abdulmotaleb El-Saddik:
User-credential based role mapping in multi-domain environment.
62
- Hongxia Jin:
Privacy, traceability, and anonymity for content protection.
63
- Jie Liu, Lei Fan, Jianhua Li:
Cryptanalysis and improvement on Yang-Shieh authentication schemes.
64
Short papers:
Security applications
- Deepak Venugopal, Guoning Hu, Nicoleta Roman:
Intelligent virus detection on mobile devices.
65
- Ebrahim Bagheri, Ali A. Ghorbani:
Towards an MDA-oriented UML profile for critical infrastructure modeling.
66
- Quan Zhou, Lin-gang Gu, Chong-Jun Wang, Jun Wang, Shifu Chen:
Using an improved C4.5 for imbalanced dataset of intrusion.
67
- Barrington Young, Raj Bhatnagar:
Secure algorithm for finding K nearest neighbors in distributed databases.
68
- Mehran Nadjarbashi-Noghani, Ali A. Ghorbani:
Design and implementation of a behavioral difference analyzer for network intrusion detection.
69
- Gilbert Ornelas, Paulo Pinheiro da Silva:
Towards believing answers from cyber-infrastructure-based applications.
70
Student poster papers
- Alex Pandelidis:
Defining the security required for WAP based mobile ticket sales.
71
- A. K. M. Harun-Ar-Rashid:
The quantum nature of cryptography: problems of public-key cryptography and the prospect of quantum key distribution.
72
- Anasuya Bulkan:
Is privacy an attainable goal?: a review of the privacy rights dilemma.
73
- Mustapha Refai:
Exploiting a buffer overflow using metasploit framework.
74
- Stephanie Chow:
Ontario healthcare privacy act: compliant ad hoc healthcare applications.
75
- Jude Andrade:
Mobile access control policy for healthcare applications with XACML.
76
- Michelle Watson:
Mobile healthcare applications: a study of access control.
77
- Vic Chung:
Considering role-based conflicts of interest in analyzing and designing e-health systems with goal-oriented methodologies.
78
- Catalin Bidian:
From stakeholder goals to product features: towards a role-based variability framework with decision boundary.
79
Copyright © Sun Mar 14 23:22:02 2010
by Michael Ley (ley@uni-trier.de)