Search Results - "2014 Twelfth Annual International Conference on Privacy, Security and Trust"

Refine Results
  1. 1

    Who Uses Bitcoin? An exploration of the Bitcoin community by Bohr, Jeremiah, Bashir, Masooda

    “…Many cryptocurrencies have come into existence in recent years, with Bitcoin the most prominent among them. Although its short history has been volatile, the…”
    Get full text
    Conference Proceeding
  2. 2

    Privacy-respecting digital investigation by Dehghantanha, Ali, Franke, Katrin

    “…The forensics investigation requirements are in direct conflict with the privacy rights of those whose actions are being investigated. At the same time, once…”
    Get full text
    Conference Proceeding
  3. 3

    Secure VANET applications with a refined group signature by Mamun, Mohammad Saiful Islam, Miyaji, Atsuko

    “…This paper proposes an application-friendly group signature (GS) model for wireless ad hoc network like Wireless Sensor Networks (WSN) or Vehicle ad hoc…”
    Get full text
    Conference Proceeding
  4. 4

    Automated generation of models for fast and precise detection of HTTP-based malware by Zarras, Apostolis, Papadogiannakis, Antonis, Gawlik, Robert, Holz, Thorsten

    “…Malicious software and especially botnets are among the most important security threats in the Internet. Thus, the accurate and timely detection of such…”
    Get full text
    Conference Proceeding
  5. 5

    Distributed Searchable Symmetric Encryption by Bosch, Christoph, Peter, Andreas, Leenders, Bram, Hoon Wei Lim, Qiang Tang, Huaxiong Wang, Hartel, Pieter, Jonker, Willem

    “…Searchable Symmetric Encryption (SSE) allows a client to store encrypted data on a storage provider in such a way, that the client is able to search and…”
    Get full text
    Conference Proceeding
  6. 6

    Desperately seeking assurances: Segmenting users by their information-seeking preferences by Morton, Anthony, Sasse, M. Angela

    “…Users of technology services try to evaluate the risks of disclosing personal information in light of the benefits they believe they will receive. However,…”
    Get full text
    Conference Proceeding
  7. 7

    Specifying and enforcing constraints in dynamic access control policies by Essaouini, Nada, Cuppens, Frederic, Cuppens-Boulahia, Nora, Abou El Kalam, Anas

    “…Constraints in access control models are used to organize access privileges in order to avoid fraudulent situations. Ensuring that the constraints are…”
    Get full text
    Conference Proceeding
  8. 8

    A trust based Information sharing model (TRUISM) in MANET in the presence of uncertainty by Bijon, Khalid Zaman, Haque, Md Munirul, Hasan, Ragib

    “…In the absence of centralized trusted authorities (CTA), security is one of the foremost concern in Mobile Ad-hoc Networks (MANET) as the network is open to…”
    Get full text
    Conference Proceeding
  9. 9

    Undetectable communication: The Online Social Networks case by Beato, Filipe, De Cristofaro, Emiliano, Rasmussen, Kasper B.

    “…Online Social Networks (OSNs) provide users with an easy way to share content, communicate, and update others about their activities. They also play an…”
    Get full text
    Conference Proceeding
  10. 10

    A typed natural deduction calculus to reason about secure trust by Primiero, Giuseppe, Raimondi, Franco

    “…System integrity can be put at risk by unintentional transitivity of resource access. We present a natural deduction calculus for an access control model with…”
    Get full text
    Conference Proceeding
  11. 11

    Semi-synthetic data set generation for security software evaluation by Skopik, Florian, Settanni, Giuseppe, Fiedler, Roman, Friedberg, Ivo

    “…Threats to modern ICT systems are rapidly changing these days. Organizations are not mainly concerned about virus infestation, but increasingly need to deal…”
    Get full text
    Conference Proceeding
  12. 12

    Enabling privacy through transparency by Seneviratne, Oshani, Kagal, Lalana

    “…Many access control systems, particularly those utilized in hospital environments, exercise optimistic security, because preventing access to information may…”
    Get full text
    Conference Proceeding
  13. 13

    Identifying users with application-specific command streams by El Masri, Alaa, Wechsler, Harry, Likarish, Peter, Kang, Brent ByungHoon

    “…This paper proposes and describes an active authentication model based on user profiles built from user-issued commands when interacting with GUI-based…”
    Get full text
    Conference Proceeding
  14. 14

    Mining YouTube metadata for detecting privacy invading harassment and misdemeanor videos by Aggarwal, Nisha, Agrawal, Swati, Sureka, Ashish

    “…YouTube is one of the most popular and largest video sharing websites (with social networking features) on the Internet. A significant percentage of videos…”
    Get full text
    Conference Proceeding
  15. 15

    Inferring social relationships from technology-level device connections by Nurse, Jason R. C., Pumphrey, Jess, Gibson-Robinson, Thomas, Goldsmith, Michael, Creese, Sadie

    “…Technology is present in every area of our lives and, for many, life without it has become unthinkable. As a consequence of this dependence and the extent to…”
    Get full text
    Conference Proceeding
  16. 16

    TRAAC: Trust and risk aware access control by Burnett, Chris, Liang Chen, Edwards, Peter, Norman, Timothy J.

    “…Systems for allowing users to manage access to their personal data are important for a wide variety of applications including healthcare, where authorised…”
    Get full text
    Conference Proceeding
  17. 17

    MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking by Takano, Yuuki, Ohta, Satoshi, Takahashi, Takeshi, Ando, Ruo, Inoue, Tomoya

    “…Third-party Web tracking is a serious privacy issue. Advertisement sites and social networking sites stealthily collect users' Web browsing history for…”
    Get full text
    Conference Proceeding
  18. 18

    Continuous authentication using micro-messages by Brocardo, Marcelo Luiz, Traore, Issa

    “…Authorship verification consists of checking whether a target document was written or not by a specific individual. In this paper, we study the problem of…”
    Get full text
    Conference Proceeding
  19. 19

    Using biometric key commitments to prevent unauthorized lending of cryptographic credentials by Bissessar, David, Adams, Carlisle, Dong Liu

    “…We present a technique that uses privacy enhancing technologies and biometrics to prevent the unauthorized lending of credentials. Current credential schemes…”
    Get full text
    Conference Proceeding
  20. 20

    Automata-based approach to design and analyze security policies by Krombi, Wadie, Erradi, Mohammed, Khoumsi, Ahmed

    “…Information systems must be controlled by security policies to protect them from undue accesses. Security policies are often designed by rules expressed using…”
    Get full text
    Conference Proceeding