Search Results - "2014 Twelfth Annual International Conference on Privacy, Security and Trust"
-
1
Who Uses Bitcoin? An exploration of the Bitcoin community
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01-07-2014)“…Many cryptocurrencies have come into existence in recent years, with Bitcoin the most prominent among them. Although its short history has been volatile, the…”
Get full text
Conference Proceeding -
2
Privacy-respecting digital investigation
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01-07-2014)“…The forensics investigation requirements are in direct conflict with the privacy rights of those whose actions are being investigated. At the same time, once…”
Get full text
Conference Proceeding -
3
Secure VANET applications with a refined group signature
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01-07-2014)“…This paper proposes an application-friendly group signature (GS) model for wireless ad hoc network like Wireless Sensor Networks (WSN) or Vehicle ad hoc…”
Get full text
Conference Proceeding -
4
Automated generation of models for fast and precise detection of HTTP-based malware
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01-07-2014)“…Malicious software and especially botnets are among the most important security threats in the Internet. Thus, the accurate and timely detection of such…”
Get full text
Conference Proceeding -
5
Distributed Searchable Symmetric Encryption
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01-07-2014)“…Searchable Symmetric Encryption (SSE) allows a client to store encrypted data on a storage provider in such a way, that the client is able to search and…”
Get full text
Conference Proceeding -
6
Desperately seeking assurances: Segmenting users by their information-seeking preferences
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01-07-2014)“…Users of technology services try to evaluate the risks of disclosing personal information in light of the benefits they believe they will receive. However,…”
Get full text
Conference Proceeding -
7
Specifying and enforcing constraints in dynamic access control policies
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01-07-2014)“…Constraints in access control models are used to organize access privileges in order to avoid fraudulent situations. Ensuring that the constraints are…”
Get full text
Conference Proceeding -
8
A trust based Information sharing model (TRUISM) in MANET in the presence of uncertainty
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01-07-2014)“…In the absence of centralized trusted authorities (CTA), security is one of the foremost concern in Mobile Ad-hoc Networks (MANET) as the network is open to…”
Get full text
Conference Proceeding -
9
Undetectable communication: The Online Social Networks case
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01-07-2014)“…Online Social Networks (OSNs) provide users with an easy way to share content, communicate, and update others about their activities. They also play an…”
Get full text
Conference Proceeding -
10
A typed natural deduction calculus to reason about secure trust
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01-07-2014)“…System integrity can be put at risk by unintentional transitivity of resource access. We present a natural deduction calculus for an access control model with…”
Get full text
Conference Proceeding -
11
Semi-synthetic data set generation for security software evaluation
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01-07-2014)“…Threats to modern ICT systems are rapidly changing these days. Organizations are not mainly concerned about virus infestation, but increasingly need to deal…”
Get full text
Conference Proceeding -
12
Enabling privacy through transparency
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01-07-2014)“…Many access control systems, particularly those utilized in hospital environments, exercise optimistic security, because preventing access to information may…”
Get full text
Conference Proceeding -
13
Identifying users with application-specific command streams
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01-07-2014)“…This paper proposes and describes an active authentication model based on user profiles built from user-issued commands when interacting with GUI-based…”
Get full text
Conference Proceeding -
14
Mining YouTube metadata for detecting privacy invading harassment and misdemeanor videos
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01-07-2014)“…YouTube is one of the most popular and largest video sharing websites (with social networking features) on the Internet. A significant percentage of videos…”
Get full text
Conference Proceeding -
15
Inferring social relationships from technology-level device connections
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01-07-2014)“…Technology is present in every area of our lives and, for many, life without it has become unthinkable. As a consequence of this dependence and the extent to…”
Get full text
Conference Proceeding -
16
TRAAC: Trust and risk aware access control
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01-07-2014)“…Systems for allowing users to manage access to their personal data are important for a wide variety of applications including healthcare, where authorised…”
Get full text
Conference Proceeding -
17
MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01-07-2014)“…Third-party Web tracking is a serious privacy issue. Advertisement sites and social networking sites stealthily collect users' Web browsing history for…”
Get full text
Conference Proceeding -
18
Continuous authentication using micro-messages
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01-07-2014)“…Authorship verification consists of checking whether a target document was written or not by a specific individual. In this paper, we study the problem of…”
Get full text
Conference Proceeding -
19
Using biometric key commitments to prevent unauthorized lending of cryptographic credentials
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01-07-2014)“…We present a technique that uses privacy enhancing technologies and biometrics to prevent the unauthorized lending of credentials. Current credential schemes…”
Get full text
Conference Proceeding -
20
Automata-based approach to design and analyze security policies
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01-07-2014)“…Information systems must be controlled by security policies to protect them from undue accesses. Security policies are often designed by rules expressed using…”
Get full text
Conference Proceeding