Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
PST
PST 2008
Generate Citations
2008 Sixth Annual Conference on Privacy, Security and Trust
Oct. 1 2008 to Oct. 3 2008
Fredericton, NB
Table of Contents
Papers
Conference organizers
Freely available from IEEE.
pp. x-xi
Papers
[Roster]
Freely available from IEEE.
pp. 256
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-vii
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Message from the Conference Chair
Freely available from IEEE.
pp. viii
Papers
Preface
Freely available from IEEE.
pp. ix
Papers
An Effective Defense against Intrusive Web Advertising
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-14
by
Viktor Krammer
Papers
OpenHouse: A Secure Platform for Distributed Home Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-23
by
Jani Suomalainen
,
Seamus Moloney
,
Juha Koivisto
,
Kari Kein?nen
Papers
An Access Control Scheme for Protecting Personal Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-35
by
Wilfred Villegas
,
Bader Ali
,
Muthucumaru Maheswaran
Papers
A Multiple-Control Fuzzy Vault
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-47
by
Marianne Hirschbichler
,
Colin Boyd
,
Wageeh Boles
Papers
Unlinkable Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-55
by
Volker Fusenig
,
Eugen Staab
,
Uli Sorger
,
Thomas Engel
Papers
Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-64
by
Kamil Reddy
,
H.S. Venter
,
Martin Olivier
,
Iain Currie
Papers
Confidence-Compensating Privacy Protection
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-74
by
Piotr Cofta
Papers
IT Security and Privacy Issues in Global Financial Services Institutions: Do Socio-Economic and Cultural Factors Matter?
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-84
by
Princely Ifinedo
Papers
Cross-Language Weaving Approach Targeting Software Security Hardening
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-98
by
Azzam Mourad
,
Dima Alhadidi
,
Mourad Debbabi
Papers
LogView: Visualizing Event Log Clusters
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-108
by
Adetokunbo Makanju
,
Stephen Brooks
,
A. Nur Zincir-Heywood
,
Evangelos E. Milios
Papers
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-120
by
S. Sharmila Deva Selvi
,
S. Sree Vivek
,
Naga Naresh Karuturi
,
Ragavendran Gopalakrishnan
,
Pandu Rangan Chandrasekaran
Papers
Encoding the Program Correctness Proofs as Programs in PCC Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-132
by
Heidar Pirzadeh
,
Danny Dub?
Papers
Model-Checking for Software Vulnerabilities Detection with Multi-Language Support
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-142
by
Rachid Hadjidj
,
Xiaochun Yang
,
Syrine Tlili
,
Mourad Debbabi
Papers
The Effect of Behavior Change on Honesty Checking in Peer-to-Peer Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-150
by
Farag Azzedin
,
Ahmad Ridha
Papers
An Efficient Reputation-Based Routing Mechanism for Wireless Sensor Networks: Testing the Impact of Mobility and Hostile Nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-155
by
Nathan Lewis
,
Noria Foukia
Papers
Investigating Two Different Approaches for Encrypted Traffic Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-166
by
Riyad Alshammari
,
A. Nur Zincir-Heywood
Papers
CCTB: Context Correlation for Trust Bootstrapping in Pervasive Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-174
by
Sheikh I. Ahamed
,
Mehrab Monjur
,
Mohammad Saiful Islam
Papers
The Uncertainty of the Truth
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-188
by
Michel Deriaz
Papers
A Detailed Comparison of Probabilistic Approaches for Coping with Unfair Ratings in Trust and Reputation Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-200
by
Jie Zhang
,
Murat Sensoy
,
Robin Cohen
Papers
AttributeTrust ? A Framework for Evaluating Trust in Aggregated Attributes via a Reputation System
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-212
by
Apurva Mohan
,
Douglas M. Blough
Papers
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-223
by
Hilmi G? Kayacik
,
A. Nur Zincir-Heywood
Papers
Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 227-231
by
Michal Sramka
,
Reihaneh Safavi-Naini
,
J? Denzinger
,
Mina Askari
,
Jie Gao
Papers
Incorporating Privacy Outcomes: Teaching an Old Dog New Tricks
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-239
by
Ed Brown
,
Tracy Ann Kosa
Papers
Private and Cheating-Free Outsourcing of Algebraic Computations
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-245
by
David Benjamin
,
Mikhail J. Atallah
Papers
A Protocol for Building Secure and Reliable Covert Channel
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-253
by
Baishakhi Ray
,
Shivakant Mishra
Papers
Author Index
Freely available from IEEE.
pp. 255
Showing 34 out of 34