Default Cover Image

2008 Sixth Annual Conference on Privacy, Security and Trust

Oct. 1 2008 to Oct. 3 2008

Fredericton, NB

Table of Contents

Papers
Conference organizersFreely available from IEEE.pp. x-xi
Papers
[Roster]Freely available from IEEE.pp. 256
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-vii
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Message from the Conference ChairFreely available from IEEE.pp. viii
Papers
PrefaceFreely available from IEEE.pp. ix
Papers
An Effective Defense against Intrusive Web AdvertisingFull-text access may be available. Sign in or learn about subscription options.pp. 3-14
Papers
OpenHouse: A Secure Platform for Distributed Home ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 15-23
Papers
An Access Control Scheme for Protecting Personal DataFull-text access may be available. Sign in or learn about subscription options.pp. 24-35
Papers
A Multiple-Control Fuzzy VaultFull-text access may be available. Sign in or learn about subscription options.pp. 36-47
Papers
Unlinkable CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 51-55
Papers
Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 56-64
Papers
Confidence-Compensating Privacy ProtectionFull-text access may be available. Sign in or learn about subscription options.pp. 65-74
Papers
IT Security and Privacy Issues in Global Financial Services Institutions: Do Socio-Economic and Cultural Factors Matter?Full-text access may be available. Sign in or learn about subscription options.pp. 75-84
Papers
Cross-Language Weaving Approach Targeting Software Security HardeningFull-text access may be available. Sign in or learn about subscription options.pp. 87-98
Papers
LogView: Visualizing Event Log ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 99-108
Papers
Encoding the Program Correctness Proofs as Programs in PCC TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 121-132
Papers
Model-Checking for Software Vulnerabilities Detection with Multi-Language SupportFull-text access may be available. Sign in or learn about subscription options.pp. 133-142
Papers
The Effect of Behavior Change on Honesty Checking in Peer-to-Peer SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 145-150
Papers
An Efficient Reputation-Based Routing Mechanism for Wireless Sensor Networks: Testing the Impact of Mobility and Hostile NodesFull-text access may be available. Sign in or learn about subscription options.pp. 151-155
Papers
Investigating Two Different Approaches for Encrypted Traffic ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 156-166
Papers
CCTB: Context Correlation for Trust Bootstrapping in Pervasive EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 167-174
Papers
The Uncertainty of the TruthFull-text access may be available. Sign in or learn about subscription options.pp. 177-188
Papers
A Detailed Comparison of Probabilistic Approaches for Coping with Unfair Ratings in Trust and Reputation SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 189-200
Papers
AttributeTrust ? A Framework for Evaluating Trust in Aggregated Attributes via a Reputation SystemFull-text access may be available. Sign in or learn about subscription options.pp. 201-212
Papers
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?Full-text access may be available. Sign in or learn about subscription options.pp. 213-223
Papers
Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized DataFull-text access may be available. Sign in or learn about subscription options.pp. 227-231
Papers
Incorporating Privacy Outcomes: Teaching an Old Dog New TricksFull-text access may be available. Sign in or learn about subscription options.pp. 232-239
Papers
Private and Cheating-Free Outsourcing of Algebraic ComputationsFull-text access may be available. Sign in or learn about subscription options.pp. 240-245
Papers
A Protocol for Building Secure and Reliable Covert ChannelFull-text access may be available. Sign in or learn about subscription options.pp. 246-253
Papers
Author IndexFreely available from IEEE.pp. 255
Showing 34 out of 34