Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
PST
PST 2014
Generate Citations
2014 Twelfth Annual Conference on Privacy, Security and Trust (PST)
July 23 2014 to July 24 2014
Toronto, ON, Canada
Table of Contents
[Title page]
Freely available from IEEE.
pp. 1-1
[Copyright notice]
Freely available from IEEE.
pp. 1-1
Welcome message from the general chair
Freely available from IEEE.
pp. 1-1
by
Ali Miri
Table of contents
Freely available from IEEE.
pp. 1-3
Can apps play by the COPPA Rules?
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Ilaria Liccardi
,
Monica Bulger
,
Hal Abelson
,
Daniel J. Weitzner
,
Wendy Mackay
Privacy-preserving mobility-casting in opportunistic networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-18
by
Gianpiero Costantino
,
Fabio Martinelli
,
Paolo Santi
Undetectable communication: The Online Social Networks case
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-26
by
Filipe Beato
,
Emiliano De Cristofaro
,
Kasper B. Rasmussen
Building privacy-preserving location-based apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-30
by
Brian Sweatt
,
Sharon Paradesi
,
Ilaria Liccardi
,
Lalana Kagal
,
Alex Pentlandz
“You are what you play”: Breaching privacy and identifying users in online gaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-39
by
Dragana Martinovic
,
Victor Ralevich
,
Joshua McDougall
,
Michael Perklin
Inferring social relationships from technology-level device connections
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-47
by
Jason R. C. Nurse
,
Jess Pumphrey
,
Thomas Gibson-Robinson
,
Michael Goldsmith
,
Sadie Creese
MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-56
by
Yuuki Takano
,
Satoshi Ohta
,
Takeshi Takahashi
,
Ruo Ando
,
Tomoya Inoue
A secure two-party bartering protocol using privacy-preserving interval operations
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-66
by
Fabian Forg
,
Daniel Mayer
,
Susanne Wetzel
,
Stefan Wuller
,
Ulrike Meyer
Direct Anonymous Attestation in practice: Implementation and efficient revocation
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-74
by
Li Xi
,
Dengguo Feng
,
Yu Qin
,
Feng Wei
,
Jianxiong Shao
,
Bo Yang
Using biometric key commitments to prevent unauthorized lending of cryptographic credentials
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-83
by
David Bissessar
,
Carlisle Adams
,
Dong Liu
Mining YouTube metadata for detecting privacy invading harassment and misdemeanor videos
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-93
by
Nisha Aggarwal
,
Swati Agrawal
,
Ashish Sureka
Who Uses Bitcoin? An exploration of the Bitcoin community
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-101
by
Jeremiah Bohr
,
Masooda Bashir
Desperately seeking assurances: Segmenting users by their information-seeking preferences
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-111
by
Anthony Morton
,
M. Angela Sasse
Private intersection of regular languages
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-120
by
Roberto Guanciale
,
Dilian Gurov
,
Peeter Laud
Enabling privacy through transparency
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-128
by
Oshani Seneviratne
,
Lalana Kagal
Privacy-respecting digital investigation
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-138
by
Ali Dehghantanha
,
Katrin Franke
ZARATHUSTRA: Extracting Webinject signatures from banking trojans
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-148
by
Claudio Criscione
,
Fabio Bosatelli
,
Stefano Zanero
,
Federico Maggi
Quantifying the financial impact of it security breaches on business processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-155
by
Clemens Martin
,
Amina Kadry
,
Ghada Abu-Shady
Semi-synthetic data set generation for security software evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-163
by
Florian Skopik
,
Giuseppe Settanni
,
Roman Fiedler
,
Ivo Friedberg
Towards efficient evaluation of XACML policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-171
by
Azzam Mourad
,
Hussein Jebbaoui
A forensic analysis framework for recovering encryption keys and BB10 backup decryption
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-178
by
Halima Al Shehhi
,
Dua'a Abu Hamdi
,
IzzEddin Asad
,
Farkhund Iqbal
Continuous authentication using micro-messages
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-188
by
Marcelo Luiz Brocardo
,
Issa Traore
Improving usability of passphrase authentication
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-198
by
Glen Nielsen
,
Michael Vedel
,
Christian D. Jensen
Secure VANET applications with a refined group signature
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-206
by
Mohammad Saiful Islam Mamun
,
Atsuko Miyaji
A study of mnemonic image passwords
Full-text access may be available. Sign in or learn about subscription options.
pp. 207-214
by
Soumyadeb Chowdhury
,
Ron Poet
,
Lewis Mackenzie
Data-centric phishing detection based on transparent virtualization technologies
Full-text access may be available. Sign in or learn about subscription options.
pp. 215-223
by
Sebastian Biedermann
,
Tobias Ruppenthal
,
Stefan Katzenbeisser
Clickjuggler: Checking for incomplete defenses against clickjacking
Full-text access may be available. Sign in or learn about subscription options.
pp. 224-231
by
Yusuke Takamatsu
,
Kenji Kono
Identifying users with application-specific command streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-238
by
Alaa El Masri
,
Harry Wechsler
,
Peter Likarish
,
Brent ByungHoon Kang
Granularity based flow control
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-248
by
Omar Abahmane
,
Luigi Logrippo
Automated generation of models for fast and precise detection of HTTP-based malware
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-256
by
Apostolis Zarras
,
Antonis Papadogiannakis
,
Robert Gawlik
,
Thorsten Holz
P-SPADE: GPU accelerated malware packer detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 257-263
by
Neha Gupta
,
Smita Naval
,
Vijay Laxmi
,
M.S. Gaur
,
Muttukrishnan Rajarajan
Detection and mitigation of malicious JavaScript using information flow control
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-273
by
Bassam Sayed
,
Issa Traore
,
Amany Abdelhalim
Secure exams despite malicious management
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-281
by
Giampaolo Bella
,
Rosario Giustolisi
,
Gabriele Lenzini
Another free app: Does it have the right intentions?
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-289
by
Mohamed Fazeen
,
Ram Dantu
Specifying and enforcing constraints in dynamic access control policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 290-297
by
Nada Essaouini
,
Frederic Cuppens
,
Nora Cuppens-Boulahia
,
Anas Abou El Kalam
Design requirements to counter parallel session attacks in security protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-305
by
Anca D. Jurcut
,
Tom Coffey
,
Reiner Dojen
Automata-based approach to design and analyze security policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 306-313
by
Wadie Krombi
,
Mohammed Erradi
,
Ahmed Khoumsi
Efficient verification of data encryption on cloud servers
Full-text access may be available. Sign in or learn about subscription options.
pp. 314-321
by
Keji Hu
,
Wensheng Zhang
Assessing cryptographic signature schemes from a legal perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 322-329
by
Dan T.F. Chan
,
Lucas C.K. Hui
,
S.M. Yiu
Distributed Searchable Symmetric Encryption
Full-text access may be available. Sign in or learn about subscription options.
pp. 330-337
by
Christoph Bosch
,
Andreas Peter
,
Bram Leenders
,
Hoon Wei Lim
,
Qiang Tang
,
Huaxiong Wang
,
Pieter Hartel
,
Willem Jonker
Generalization of socio-rational secret sharing with a new utility function
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-341
by
Mehrdad Nojoumian
Crypto-assistant: Towards facilitating developer's encryption of sensitive data
Full-text access may be available. Sign in or learn about subscription options.
pp. 342-346
by
Ricardo Rodriguez Garcia
,
Julie Thorpe
,
Miguel Vargas Martin
A trust based Information sharing model (TRUISM) in MANET in the presence of uncertainty
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-354
by
Khalid Zaman Bijon
,
Md Munirul Haque
,
Ragib Hasan
Validating trust models against realworld data sets
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-362
by
Noel Sardana
,
Robin Cohen
Demonstrating the value of credibility modeling for trust-based approaches to online message recommendation
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-370
by
Noel Sardana
,
Robin Cohen
TRAAC: Trust and risk aware access control
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-378
by
Chris Burnett
,
Liang Chen
,
Peter Edwards
,
Timothy J. Norman
A typed natural deduction calculus to reason about secure trust
Full-text access may be available. Sign in or learn about subscription options.
pp. 379-382
by
Giuseppe Primiero
,
Franco Raimondi
Two trust networks in one: Using bipolar structures to fuse trust and distrust
Full-text access may be available. Sign in or learn about subscription options.
pp. 383-390
by
Stefano Bistarelli
,
Francesco Santini
Communicating and visualising multicriterial trustworthiness under uncertainty
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-397
by
Florian Volk
,
Sascha Hauke
,
Daniel Dieth
,
Max Muhlhauser
What can the hashtag #trust tell us about how users conceptualise trust?
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-402
by
Natasha Dwyer
,
Stephen Marsh
Analyzing trustworthiness of virtual machines in data-intensive cloud computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 403-406
by
Dipen Contractor
,
Dhiren Patel
i/k-Contact: A context-aware user authentication using physical social trust
Full-text access may be available. Sign in or learn about subscription options.
pp. 407-413
by
Shiori Arimura
,
Masahiro Fujita
,
Shinya Kobayashi
,
Junya Kani
,
Masakatsu Nishigaki
,
Akira Shiba
Weighting peer reviewers
Full-text access may be available. Sign in or learn about subscription options.
pp. 414-419
by
A. Spalvieri
,
S. Mandelli
,
M. Magarini
,
G. Bianchi
TrustCV: Reputation-based trust for collectivist digital business ecosystems
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-424
by
Donovan Isherwood
,
Marijke Coetzee
Author index
Freely available from IEEE.
pp. 425-426
Showing 59 out of 59