The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Privacy, Security and Trust (pst)
2005 (conf/pst/2005)

  1. Ahmed Awad E. Ahmed, Issa Traoré
    Detecting Computer Intrusions Using Behavioral Biometrics. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  2. Jacek Jonczy, Rolf Haenni
    Credential Networks: a General Model for Distributed Trust and Authenticity Management. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  3. Hilmi Günes Kayacik, A. Nur Zincir-Heywood, Malcolm I. Heywood
    Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  4. Glenn Mahoney, Wendy J. Myrvold, Gholamali C. Shoja
    Generic Reliability Trust Model. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  5. John Marchesini, Sean W. Smith
    SHEMP: Secure Hardware Enhanced MyProxy. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  6. Frédéric Massicotte, Mathieu Couture, Yvan Labiche
    Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq Databases. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  7. Stephen Neville
    Are Deeper Levels of Risk Analysis a Requirement for Enabling Optimal Tactical Responses in INFOSEC Alert Correlation Systems? [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  8. Kevin Regan, Robin Cohen, Pascal Poupart
    The Advisor-POMDP: A Principled Approach to Trust through Reputation in Electronic Markets. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  9. Carsten Roecker
    Providing Personalized Privacy Support in Public Places. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  10. Mike Smit, Michael McAllister, Jacob Slonim
    Public Trust and Electronic Health Records. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  11. Tim Storer, Ishbel Duncan
    Electronic Voting in the UK: Current Trends in Deployment , Requirements and Technologies. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  12. Anthony Whitehead
    Towards Eliminating Steganographic Communication. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  13. Zhengping Wu, Alfred C. Weaver
    A Privacy Preserving Enhanced Trust Building Mechanism for Web Services. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  14. George Yee, Larry Korba
    Specifying Personal Privacy Policies to Avoid Unexpected Outcomes. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  15. Patrick C. K. Hung
    Towards a Privacy Access Control Model for e-Healthcare Services. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  16. Andreas Hirt, Michael J. Jacobson Jr., Carey L. Williamson
    A Practical Buses Protocol for Anonymous Internet Communication. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  17. Jeff Gilchrist
    Solitary Confinement: Using Artificial Cells to Control Access and Facilitate Apoptosis in Computer Systems. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  18. George Bakos, Sergey Bratus
    Ubiquitous Redirection as Access Control Response. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  19. James Blustein, Daniel L. Silver, Ching-Lung Fu
    Information Visualization for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  20. Narjès Boufaden, William Elazmeh, Stan Matwin, Nathalie Japkowicz
    PEEP- Privacy Enforcement in Email Project. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  21. Lars Brückner, Marco Voss
    MozPETs - a privacy enhanced Web Browser. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  22. Scott Buffett, Luc Comeau, Michael W. Fleming, Bruce Spencer
    MONOLOGUE: A Tool for Negotiating Exchanges of Private Information in E-Commerce. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  23. Elizabeth Chang, Farookh Khadeer Hussain, Tharam S. Dillon
    Trustworthiness Measure for e-Service. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  24. Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
    Security Analysis of Wireless Java. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  25. Nazar Elfadil
    Graphical and Digital signature Combination for fulfilling the cultural gap between traditional signature and current smart card digital certificate/signature. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  26. Scott Flinn, Jo Lumsden
    User Perceptions of Privacy and Security on the Web. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  27. Philip W. L. Fong
    Link-Time Enforcement of Confined Types for JVM Bytecode. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  28. Ariel Futoransky, Ariel Waissbein
    Enforcing Privacy in Web Applications. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  29. Weiwei Geng, Scott Flinn, John M. DeDourek
    Usable Firewall Configuration. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  30. Jiong Zhang, Mohammad Zulkernine
    Network Intrusion Detection using Random Forests. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  31. Sabah S. Al-Fedaghi
    How to Calculate the Information Privacy. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:3-13 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002