The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Privacy, Security and Trust (pst)
2006 (conf/pst/2006)

  1. Digital identity management and protection. [Citation Graph (, )][DBLP]

  2. Topological analysis of network attack vulnerability. [Citation Graph (, )][DBLP]

  3. Paths to creativity in security careers. [Citation Graph (, )][DBLP]

  4. Role-based access control: past, present and future. [Citation Graph (, )][DBLP]

  5. From concept to commercialiazed product: the challenges of privacy technologies. [Citation Graph (, )][DBLP]

  6. Deep packet inspection comes to the desktop. [Citation Graph (, )][DBLP]

  7. Label-based access control (LBAC) in DB2 LUW. [Citation Graph (, )][DBLP]

  8. Computing trust from revision history. [Citation Graph (, )][DBLP]

  9. Analyzing trust in technology strategies. [Citation Graph (, )][DBLP]

  10. Requirements of federated trust management for service-oriented architectures. [Citation Graph (, )][DBLP]

  11. Trust modelling for online transactions: a phishing scenario. [Citation Graph (, )][DBLP]

  12. A comparison of reputation-based trust systems. [Citation Graph (, )][DBLP]

  13. A constraint based role based access control in the SECTET a model-driven approach. [Citation Graph (, )][DBLP]

  14. Protected data paths: delivering sensitive data via untrusted proxies. [Citation Graph (, )][DBLP]

  15. Architecture-based refinements for secure computer systems design. [Citation Graph (, )][DBLP]

  16. A new fair non-repudiation protocol for secure negotiation and contract signing. [Citation Graph (, )][DBLP]

  17. Detecting low-profile scans in TCP anomaly event data. [Citation Graph (, )][DBLP]

  18. Towards a precise semantics for authenticity and trust. [Citation Graph (, )][DBLP]

  19. An improved familiarity measurement for formalization of trust in e-commerce based multiagent systems. [Citation Graph (, )][DBLP]

  20. Trust and security in spatial messaging: FoxyTag, the speed camera case study. [Citation Graph (, )][DBLP]

  21. Modeling trust using transactional, numerical units. [Citation Graph (, )][DBLP]

  22. Building online trust through privacy policies. [Citation Graph (, )][DBLP]

  23. Approximate autoregressive modeling for network attack detection. [Citation Graph (, )][DBLP]

  24. Dynamic inference control in privacy preference enforcement. [Citation Graph (, )][DBLP]

  25. Privacy policy enforcement in enterprises with identity management solutions. [Citation Graph (, )][DBLP]

  26. Formal consistency verification between BPEL process and privacy policy. [Citation Graph (, )][DBLP]

  27. A privacy-preserving UBICOMP architecture. [Citation Graph (, )][DBLP]

  28. Query rewriting for detection of privacy violation through inferencing. [Citation Graph (, )][DBLP]

  29. Privacy in video surveilled areas. [Citation Graph (, )][DBLP]

  30. Is workplace surveillance legal in Canada? [Citation Graph (, )][DBLP]

  31. Bridging the gap: software specification meets intrusion detector. [Citation Graph (, )][DBLP]

  32. Phishing defense against IDN address spoofing attacks. [Citation Graph (, )][DBLP]

  33. Using self-organizing maps to build an attack map for forensic analysis. [Citation Graph (, )][DBLP]

  34. An efficient traitor tracing scheme based on MDS code. [Citation Graph (, )][DBLP]

  35. Using web service enhancements to bridge business trust relationships. [Citation Graph (, )][DBLP]

  36. An incentive compatible reputation mechanism for ubiquitous computing environments. [Citation Graph (, )][DBLP]

  37. Alert correlation survey: framework and techniques. [Citation Graph (, )][DBLP]

  38. Execution monitoring enforcement for limited-memory systems. [Citation Graph (, )][DBLP]

  39. Embedding verifiable information flow analysis. [Citation Graph (, )][DBLP]

  40. Behavior analysis through reputation propagation in a multi-context environment. [Citation Graph (, )][DBLP]

  41. Achieving privacy and security in radio frequency identification. [Citation Graph (, )][DBLP]

  42. Privacy enhanced personalization in e-learning. [Citation Graph (, )][DBLP]

  43. Security hardening of open source software. [Citation Graph (, )][DBLP]

  44. Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET. [Citation Graph (, )][DBLP]

  45. Security crosscutting concerns and AspectJ. [Citation Graph (, )][DBLP]

  46. Privacy-preserving OLAP based on output perturbation across multiple sites. [Citation Graph (, )][DBLP]

  47. A framework ensuring privacy in a distributed environment. [Citation Graph (, )][DBLP]

  48. An early release heuristic for k-anonymization. [Citation Graph (, )][DBLP]

  49. Towards reliable trust establishment in grid: a pre-evaluating set based bias-tuned method for dishonest feedback filtering. [Citation Graph (, )][DBLP]

  50. A trust framework model for situational contexts. [Citation Graph (, )][DBLP]

  51. Trust-based contextual information filtering. [Citation Graph (, )][DBLP]

  52. Trust determination in ad hoc networks. [Citation Graph (, )][DBLP]

  53. MTRMS: mutual-trust-based reputation management system in community-based peer-to-peer environment. [Citation Graph (, )][DBLP]

  54. Towards a model for risk and consent management of personal health information. [Citation Graph (, )][DBLP]

  55. A concept of intelligent biometric-based early detection and warning system. [Citation Graph (, )][DBLP]

  56. The 'how' and 'why' of persistent information security. [Citation Graph (, )][DBLP]

  57. Virtual identities in authentication and authorization scenarios. [Citation Graph (, )][DBLP]

  58. AA-RR: working with authentication and authorization infrastructures. [Citation Graph (, )][DBLP]

  59. Persona concept for web-based identity management. [Citation Graph (, )][DBLP]

  60. Off-line verification of one-time ID in distributed environment. [Citation Graph (, )][DBLP]

  61. Chinese text watermarking based on occlusive components. [Citation Graph (, )][DBLP]

  62. User-credential based role mapping in multi-domain environment. [Citation Graph (, )][DBLP]

  63. Privacy, traceability, and anonymity for content protection. [Citation Graph (, )][DBLP]

  64. Cryptanalysis and improvement on Yang-Shieh authentication schemes. [Citation Graph (, )][DBLP]

  65. Intelligent virus detection on mobile devices. [Citation Graph (, )][DBLP]

  66. Towards an MDA-oriented UML profile for critical infrastructure modeling. [Citation Graph (, )][DBLP]

  67. Using an improved C4.5 for imbalanced dataset of intrusion. [Citation Graph (, )][DBLP]

  68. Secure algorithm for finding K nearest neighbors in distributed databases. [Citation Graph (, )][DBLP]

  69. Design and implementation of a behavioral difference analyzer for network intrusion detection. [Citation Graph (, )][DBLP]

  70. Towards believing answers from cyber-infrastructure-based applications. [Citation Graph (, )][DBLP]

  71. Defining the security required for WAP based mobile ticket sales. [Citation Graph (, )][DBLP]

  72. The quantum nature of cryptography: problems of public-key cryptography and the prospect of quantum key distribution. [Citation Graph (, )][DBLP]

  73. Is privacy an attainable goal?: a review of the privacy rights dilemma. [Citation Graph (, )][DBLP]

  74. Exploiting a buffer overflow using metasploit framework. [Citation Graph (, )][DBLP]

  75. Ontario healthcare privacy act: compliant ad hoc healthcare applications. [Citation Graph (, )][DBLP]

  76. Mobile access control policy for healthcare applications with XACML. [Citation Graph (, )][DBLP]

  77. Mobile healthcare applications: a study of access control. [Citation Graph (, )][DBLP]

  78. Considering role-based conflicts of interest in analyzing and designing e-health systems with goal-oriented methodologies. [Citation Graph (, )][DBLP]

  79. From stakeholder goals to product features: towards a role-based variability framework with decision boundary. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002