The Community for Technology Leaders
2010 Eighth International Conference on Privacy, Security and Trust (2010)
Ottawa, ON Canada
Aug. 17, 2010 to Aug. 19, 2010
ISBN: 978-1-4244-7551-3
TABLE OF CONTENTS

Transaction signing in applications using identity federation (PDF)

Paul Rabinovich , Exostar LLC, Herndon, Virginia 20171, USA
pp. 144-149

Analysis of Privacy Impact Assessments within Major jurisdictions (PDF)

David Tancock , HP Labs, Long Down Avenue, Bristol, UK. BS34 8QZ
Siani Pearson , HP Labs, Long Down Avenue, Bristol, UK. BS34 8QZ
Andrew Charlesworth , Centre for IT and Law, University of Bristol, Queens Road, UK. BS8 1RJ
pp. 118-125

Trust-aware monitoring scheme for WiMAX networks (PDF)

Haidar Safa , Department of Computer Science, American University of Beirut, Lebanon
Farah Abu Shahla , Department of Computer Science, American University of Beirut, Lebanon
pp. 88-95

Keystroke dynamics: Characteristics and opportunities (PDF)

Heather Crawford , Department of Computing Science, Sir Alwyn Williams Building, University of Glasgow, United Kingdom G12 8RZ
pp. 205-212

Secure Information Processing with Privacy Assurance - standard based design and development for biometric applications (PDF)

Bon K. Sy , Computer Science Department, Queens College, USA
Adam Ramirez , Computer Science Department, Queens College, USA
Arun P. Kumara Krishnan , Computer Science Department, Queens College, USA
pp. 223-230

The relationship of trust, demand, and utility: Be more trustworthy, then i will buy more (PDF)

Amirali Salehi-Abari , School of Computer Science, Carleton University, Ottawa, Canada
Tony White , School of Computer Science, Carleton University, Ottawa, Canada
pp. 72-79

A new perspective of privacy protection: Unique distinct l-SR diversity (PDF)

Yunli Wang , Institute for Information Technology, National Research Council Canada Fredericton, NB, Canada E3B 9W4
Yan Cui , Institute for Information Technology, National Research Council Canada Fredericton, NB, Canada E3B 9W4
Liqiang Geng , Institute for Information Technology, National Research Council Canada Fredericton, NB, Canada E3B 9W4
Hongyu Liu , Institute for Information Technology, National Research Council Canada Fredericton, NB, Canada E3B 9W4
pp. 110-117

On achieving a digital identity management system with support for non-transferability (PDF)

Brent Carrara , University of Ottawa, Canada
Carlisle Adams , University of Ottawa, Canada
pp. 150-159

You are the key: Generating cryptographic keys from voice biometrics (PDF)

Brent Carrara , University of Ottawa, Canada
Carlisle Adams , University of Ottawa, Canada
pp. 213-222

Social networks for health care: Addressing regulatory gaps with privacy-by-design (PDF)

James B. Williams , Ontario Telemedicine Network, Toronto, ON M3B0A2 Canada
Jens H. Weber-Jahnke , University of Victoria, BC V8W3P6 Canada
pp. 134-143

Guessing click-based graphical passwords by eye tracking (PDF)

Daniel LeBlanc , Department of Psychology, Carleton University, Ottawa, Ontario K1S 5B6, Canada
Alain Forget , School of Computer Science, Carleton University, Ottawa, Ontario K1S 5B6, Canada
Robert Biddle , School of Computer Science, Carleton University, Ottawa, Ontario K1S 5B6, Canada
pp. 197-204

A model-driven penetration test framework for Web applications (PDF)

Pulei Xiong , University of Ottawa, Canada
Liam Peyton , University of Ottawa, Canada
pp. 173-180

Design of distributed security architecture for multihop WiMAX networks (PDF)

Perumalraja Rengaraju , Department of Systems and Computer Engineering, Carleton University, Ottawa, Ontario, Canada
Chung-Horng Lung , Department of Systems and Computer Engineering, Carleton University, Ottawa, Ontario, Canada
Anand Srinivasan , EION Inc., Ottawa, Ontario, Canada
pp. 54-61

Risk analysis in access control systems (PDF)

J. Ma , Department of Computer Science and Engineering, Université du Québec en Outaouais, Canada
K. Adi , Department of Computer Science and Engineering, Université du Québec en Outaouais, Canada
M. Mejri , Computer Science and Software Engineering Department, Laval University, Québec, Canada
L. Logrippo , Department of Computer Science and Engineering, Université du Québec en Outaouais, Canada
pp. 160-166

Efficient privacy preserving reputation protocols inspired by secure sum (PDF)

Omar Hasan , INSA Lyon, France
Elisa Bertino , Purdue University, IN, USA
Lionel Brunie , INSA Lyon, France
pp. 126-133

Security of Error Correcting Code for biometric Encryption (PDF)

Alex Stoianov , Office of Information and Privacy Commissioner of Ontario, Canada
pp. 231-235

Achieving critical infrastructure protection through the interaction of computer security and network forensics (PDF)

Ray Hunt , Department of Computer Science & Software Engineering, University of Canterbury, Christchurch, New Zealand
Jill Slay , Division IT Engineering and the Environment, University of South Australia
pp. 23-30

Security advances and challenges in 4G wireless networks (PDF)

N. Seddigh , Solana Networks, Ottawa, Canada
B. Nandy , Solana Networks, Ottawa, Canada
R. Makkar , Solana Networks, Ottawa, Canada
J.F. Beaumont , Defence Research & Development Canada, Ottawa, Canada
pp. 62-71

Lightweight protection against brute force login attacks on Web applications (PDF)

Carlisle Adams , School of Information Technology and Engineering, University of Ottawa, Canada
Guy-Vincent Jourdan , School of Information Technology and Engineering, University of Ottawa, Canada
Jean-Pierre Levac , School of Information Technology and Engineering, University of Ottawa, Canada
Francois Prevost , School of Information Technology and Engineering, University of Ottawa, Canada
pp. 181-188

Detection, correlation, and visualization of attacks against critical infrastructure systems (PDF)

Linda Briesemeister , SRI International, Menlo Park, CA, USA
Steven Cheung , SRI International, Menlo Park, CA, USA
Ulf Lindqvist , SRI International, Menlo Park, CA, USA
Alfonso Valdes , SRI International, Menlo Park, CA, USA
pp. 15-22

Co-located Physical-Layer Network Coding to mitigate passive eavesdropping (PDF)

Michael Hay , Department of Systems and Computer Engineering, Carleton University, Ottawa, Ontario, Canada
Basil Saeed , Department of Systems and Computer Engineering, Carleton University, Ottawa, Ontario, Canada
Chung-Horng Lung , Department of Systems and Computer Engineering, Carleton University, Ottawa, Ontario, Canada
Anand Srinivasan , EION Inc., Ottawa, Ontario, Canada
pp. 1-2

On the analysis of the Zeus botnet crimeware toolkit (PDF)

H. Binsalleeh , National Cyber Forensics and Training Alliance Canada, Montreal, Quebec, Canada
T. Ormerod , National Cyber Forensics and Training Alliance Canada, Montreal, Quebec, Canada
A. Boukhtouta , National Cyber Forensics and Training Alliance Canada, Montreal, Quebec, Canada
P. Sinha , National Cyber Forensics and Training Alliance Canada, Montreal, Quebec, Canada
A. Youssef , National Cyber Forensics and Training Alliance Canada, Montreal, Quebec, Canada
M. Debbabi , National Cyber Forensics and Training Alliance Canada, Montreal, Quebec, Canada
L. Wang , National Cyber Forensics and Training Alliance Canada, Montreal, Quebec, Canada
pp. 31-38

Method ontology for intelligent network forensics analysis (PDF)

Sherif Saad , Electrical and Computer Engineering, University Of Victoria, Canada
Issa Traore , Electrical and Computer Engineering, University Of Victoria, Canada
pp. 7-14

On the representation and verification of cryptographic protocols in a theory of action (PDF)

James P. Delgrande , School of Computing Science, Simon Fraser University, Burnaby, B.C., Canada V5A 1S6
Aaron Hunter , School of Computing Science, Simon Fraser University, Burnaby, B.C., Canada V5A 1S6
Torsten Grote , Institut für Informatik, Universität Potsdam, D-14482, Germany
pp. 39-45

Secure architecture for RFID enabled supply chain hierarchy (PDF)

Nauman Abdullah Shah , Dept. of Information Security, Military College of Signals, NUST, Pakistan
M. Arif Wahla , Dept. of Information Security, Military College of Signals, NUST, Pakistan
pp. 167-172

Assessing trustworthiness of nodes to enhance performance in mobile ad hoc networks (PDF)

Sanat Kumar Bista , AI Research Group, University of Bradford, BD7 1DP, United Kingdom
Keshav Dahal , AI Research Group, University of Bradford, BD7 1DP, United Kingdom
Peter Cowling , AI Research Group, University of Bradford, BD7 1DP, United Kingdom
Aziz Bouras , IUT Lumière, Universitè Lumière Lyon 2, France
pp. 80-87

Ray - a secure micro kernel architecture (PDF)

Stefan Nurnberger , CASED - Center for Advanced Security Research Darmstadt, Germany
Thomas Feller , CASED - Center for Advanced Security Research Darmstadt, Germany
Sorin A. Huss , CASED - Center for Advanced Security Research Darmstadt, Germany
pp. 3-6

New approach for the dynamic enforcement of Web services security (PDF)

Azzam Mourad , Department of Computer Science and Mathematics, Lebanese American University, Beirut, Lebanon
Sara Ayoubi , Department of Computer Science and Mathematics, Lebanese American University, Beirut, Lebanon
Hamdi Yahyaoui , Department of Computer Science, Kuwait University, Kuwait
Hadi Otrok , Department of Computer Engineering, Khalifa University of Science, Technology & Research, Abu Dhabi, UAE
pp. 189-196

Towards a privacy preserving policy based infrastructure for social data access to enable scientific research (PDF)

Palanivel Kodeswaran , University of Maryland, Baltimore County, 1000 Hilltop Circle, MD 21250, USA
Evelyne Viegas , Microsoft Research, One Microsoft Way, Redmond, WA 98052, USA
pp. 103-109

J3: High payload histogram neutral JPEG steganography (PDF)

Mahendra Kumar , Department of Computer and Information Sciences and Engineering, University of Florida, Gainesville, 32611, USA
Richard Newman , Department of Computer and Information Sciences and Engineering, University of Florida, Gainesville, 32611, USA
pp. 46-53

Vampire bats: Trust in Privacy (PDF)

Tracy Ann Kosa , Faculty of Science, University of Ontario Institute of Technology, Oshawa, Canada
pp. 96-102
87 ms
(Ver 3.3 (11022016))