Default Cover Image

2014 Twelfth Annual Conference on Privacy, Security and Trust (PST)

July 23 2014 to July 24 2014

Toronto, ON, Canada

Table of Contents

[Title page]Freely available from IEEE.pp. 1-1
[Copyright notice]Freely available from IEEE.pp. 1-1
Welcome message from the general chairFreely available from IEEE.pp. 1-1
Table of contentsFreely available from IEEE.pp. 1-3
Can apps play by the COPPA Rules?Full-text access may be available. Sign in or learn about subscription options.pp. 1-9
Privacy-preserving mobility-casting in opportunistic networksFull-text access may be available. Sign in or learn about subscription options.pp. 10-18
Undetectable communication: The Online Social Networks caseFull-text access may be available. Sign in or learn about subscription options.pp. 19-26
Building privacy-preserving location-based appsFull-text access may be available. Sign in or learn about subscription options.pp. 27-30
A secure two-party bartering protocol using privacy-preserving interval operationsFull-text access may be available. Sign in or learn about subscription options.pp. 57-66
Direct Anonymous Attestation in practice: Implementation and efficient revocationFull-text access may be available. Sign in or learn about subscription options.pp. 67-74
Using biometric key commitments to prevent unauthorized lending of cryptographic credentialsFull-text access may be available. Sign in or learn about subscription options.pp. 75-83
Mining YouTube metadata for detecting privacy invading harassment and misdemeanor videosFull-text access may be available. Sign in or learn about subscription options.pp. 84-93
Who Uses Bitcoin? An exploration of the Bitcoin communityFull-text access may be available. Sign in or learn about subscription options.pp. 94-101
Desperately seeking assurances: Segmenting users by their information-seeking preferencesFull-text access may be available. Sign in or learn about subscription options.pp. 102-111
Private intersection of regular languagesFull-text access may be available. Sign in or learn about subscription options.pp. 112-120
Enabling privacy through transparencyFull-text access may be available. Sign in or learn about subscription options.pp. 121-128
Privacy-respecting digital investigationFull-text access may be available. Sign in or learn about subscription options.pp. 129-138
ZARATHUSTRA: Extracting Webinject signatures from banking trojansFull-text access may be available. Sign in or learn about subscription options.pp. 139-148
Quantifying the financial impact of it security breaches on business processesFull-text access may be available. Sign in or learn about subscription options.pp. 149-155
Semi-synthetic data set generation for security software evaluationFull-text access may be available. Sign in or learn about subscription options.pp. 156-163
Towards efficient evaluation of XACML policiesFull-text access may be available. Sign in or learn about subscription options.pp. 164-171
A forensic analysis framework for recovering encryption keys and BB10 backup decryptionFull-text access may be available. Sign in or learn about subscription options.pp. 172-178
Continuous authentication using micro-messagesFull-text access may be available. Sign in or learn about subscription options.pp. 179-188
Improving usability of passphrase authenticationFull-text access may be available. Sign in or learn about subscription options.pp. 189-198
Secure VANET applications with a refined group signatureFull-text access may be available. Sign in or learn about subscription options.pp. 199-206
A study of mnemonic image passwordsFull-text access may be available. Sign in or learn about subscription options.pp. 207-214
Data-centric phishing detection based on transparent virtualization technologiesFull-text access may be available. Sign in or learn about subscription options.pp. 215-223
Clickjuggler: Checking for incomplete defenses against clickjackingFull-text access may be available. Sign in or learn about subscription options.pp. 224-231
Identifying users with application-specific command streamsFull-text access may be available. Sign in or learn about subscription options.pp. 232-238
Granularity based flow controlFull-text access may be available. Sign in or learn about subscription options.pp. 239-248
Automated generation of models for fast and precise detection of HTTP-based malwareFull-text access may be available. Sign in or learn about subscription options.pp. 249-256
P-SPADE: GPU accelerated malware packer detectionFull-text access may be available. Sign in or learn about subscription options.pp. 257-263
Detection and mitigation of malicious JavaScript using information flow controlFull-text access may be available. Sign in or learn about subscription options.pp. 264-273
Secure exams despite malicious managementFull-text access may be available. Sign in or learn about subscription options.pp. 274-281
Another free app: Does it have the right intentions?Full-text access may be available. Sign in or learn about subscription options.pp. 282-289
Specifying and enforcing constraints in dynamic access control policiesFull-text access may be available. Sign in or learn about subscription options.pp. 290-297
Design requirements to counter parallel session attacks in security protocolsFull-text access may be available. Sign in or learn about subscription options.pp. 298-305
Automata-based approach to design and analyze security policiesFull-text access may be available. Sign in or learn about subscription options.pp. 306-313
Efficient verification of data encryption on cloud serversFull-text access may be available. Sign in or learn about subscription options.pp. 314-321
Assessing cryptographic signature schemes from a legal perspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 322-329
Distributed Searchable Symmetric EncryptionFull-text access may be available. Sign in or learn about subscription options.pp. 330-337
Generalization of socio-rational secret sharing with a new utility functionFull-text access may be available. Sign in or learn about subscription options.pp. 338-341
Crypto-assistant: Towards facilitating developer's encryption of sensitive dataFull-text access may be available. Sign in or learn about subscription options.pp. 342-346
A trust based Information sharing model (TRUISM) in MANET in the presence of uncertaintyFull-text access may be available. Sign in or learn about subscription options.pp. 347-354
Validating trust models against realworld data setsFull-text access may be available. Sign in or learn about subscription options.pp. 355-362
Demonstrating the value of credibility modeling for trust-based approaches to online message recommendationFull-text access may be available. Sign in or learn about subscription options.pp. 363-370
TRAAC: Trust and risk aware access controlFull-text access may be available. Sign in or learn about subscription options.pp. 371-378
A typed natural deduction calculus to reason about secure trustFull-text access may be available. Sign in or learn about subscription options.pp. 379-382
Two trust networks in one: Using bipolar structures to fuse trust and distrustFull-text access may be available. Sign in or learn about subscription options.pp. 383-390
Communicating and visualising multicriterial trustworthiness under uncertaintyFull-text access may be available. Sign in or learn about subscription options.pp. 391-397
What can the hashtag #trust tell us about how users conceptualise trust?Full-text access may be available. Sign in or learn about subscription options.pp. 398-402
Analyzing trustworthiness of virtual machines in data-intensive cloud computingFull-text access may be available. Sign in or learn about subscription options.pp. 403-406
Weighting peer reviewersFull-text access may be available. Sign in or learn about subscription options.pp. 414-419
TrustCV: Reputation-based trust for collectivist digital business ecosystemsFull-text access may be available. Sign in or learn about subscription options.pp. 420-424
Author indexFreely available from IEEE.pp. 425-426
Showing 59 out of 59