The Community for Technology Leaders
2012 Tenth Annual International Conference on Privacy, Security and Trust (2012)
Paris, France France
July 16, 2012 to July 18, 2012
ISBN: 978-1-4673-2323-9
TABLE OF CONTENTS
Papers

[Front cover] (Abstract)

pp. c1

Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions (Abstract)

Matthew Smith , Distributed Computing and Security Group, Leibniz University Hannover, Schloßwender Str. 5, 30159, Germany
Thomas Muders , Distributed Computing and Security Group, Leibniz University Hannover, Schloßwender Str. 5, 30159, Germany
Michael Brenner , Distributed Computing and Security Group, Leibniz University Hannover, Schloßwender Str. 5, 30159, Germany
Sascha Fahl , Distributed Computing and Security Group, Leibniz University Hannover, Schloßwender Str. 5, 30159, Germany
Marian Harbach , Distributed Computing and Security Group, Leibniz University Hannover, Schloßwender Str. 5, 30159, Germany
pp. 17-24

SIPPA-2.0 - Secure information processing with privacy assurance (version 2.0) (Abstract)

Bon K. Sy , Department of Computer Science, Queens College - CUNY, New York, USA
Kumara Krishnan , Department of Computer Science, Queens College - CUNY, New York, USA
Arun Prakash , Department of Computer Science, Queens College - CUNY, New York, USA
pp. 25-34

Exploring re-identification risks in public domains (Abstract)

Edward Porter , US Census Bureau, USA
Lisa Singh , Georgetown University, USA
Aditi Ramachandran , Georgetown University, USA
Frank Nagle , Harvard Business School, USA
pp. 35-42

WhACKY! - What anyone could know about you from Twitter (Abstract)

Raghav Sethi , Indraprastha Institute of Information Technology - Delhi (IIITD), New Delhi, India
Ashish Sureka , Indraprastha Institute of Information Technology - Delhi (IIITD), New Delhi, India
Denzil Correa , Indraprastha Institute of Information Technology - Delhi (IIITD), New Delhi, India
pp. 43-50

Privacy-preserving resource evaluation in social networks (Abstract)

Gianluca Lax , DIMET, University of Reggio Calabria, Via Graziella, Località Feo di Vito, 89122, Italy
Lidia Fotia , DIMET, University of Reggio Calabria, Via Graziella, Località Feo di Vito, 89122, Italy
Francesco Buccafurri , DIMET, University of Reggio Calabria, Via Graziella, Località Feo di Vito, 89122, Italy
pp. 51-58

Limiting data collection in application forms: A real-case application of a founding privacy principle (Abstract)

Michalis Vazirgiannis , Athens U. of Economics & Business, Greece
Benjamin Nguyen , INRIA, Le Chesnay, France
Nicolas Anciaux , INRIA, Le Chesnay, France
pp. 59-66

Aggregation and privacy in multi-relational databases (Abstract)

Eric Paquet , Information Technology and Communication, National Research Council of Canada, Canada
Herna L. Viktor , School of Electrical Engineering and Computer Science, University of Ottawa, Canada
Yasser Jafer , School of Electrical Engineering and Computer Science, University of Ottawa, Canada
pp. 67-74

Sticky policies for data control in the cloud (Abstract)

Jakub Sendor , SAP Research, 805, Av du Docteur Maurice Donat, 06250 Mougins - France
Slim Trabelsi , SAP Research, 805, Av du Docteur Maurice Donat, 06250 Mougins - France
pp. 75-80

A secure data deduplication framework for cloud environments (Abstract)

Isaac Woungang , Department of Computer Science, Ryerson University, Toronto, ON., Canada
Ali Miri , Department of Computer Science, Ryerson University, Toronto, ON., Canada
Fatema Rashid , Department of Computer Science, Ryerson University, Toronto, ON., Canada
pp. 81-87

Risk perception of internet-related activities (Abstract)

Robert Biddle , School of Computer Science, Carleton University, Ottawa, Canada
Daniel LeBlanc , Department of Psychology, Carleton University, Ottawa, Canada
pp. 88-95

An integrated key management and secure routing framework for Mobile Ad-Hoc Networks (Abstract)

Akshai Aggarwal , School of Computer Science, University of Windsor, Canada
Robert D. Kent , School of Computer Science, University of Windsor, Canada
Shushan Zhao , School of Computer Science, University of Windsor, Canada
pp. 96-103

PDF Scrutinizer: Detecting JavaScript-based attacks in PDF documents (Abstract)

Elmar Gerhards-Padilla , Fraunhofer FKIE, Friedrich-Ebert-Allee 144, 53113 Bonn, Germany
Jan Gassen , Fraunhofer FKIE, Friedrich-Ebert-Allee 144, 53113 Bonn, Germany
Florian Schmitt , University of Bonn - Institute of Computer Science 4, Friedrich-Ebert-Allee 144, 53113, Germany
pp. 104-111

Automated detection of session management vulnerabilities in web applications (Abstract)

Kenji Kono , Department of Information and Computer Science Keio University, Japan
Yuji Kosuga , Department of Information and Computer Science Keio University, Japan
Yusuke Takamatsu , Department of Information and Computer Science Keio University, Japan
pp. 112-119

Towards a BPEL model-driven approach for Web services security (Abstract)

Chamseddine Talhi , Computer Science Department, ETS Montreal, Canada
Hamdi Yahyaoui , Computer Science Department, Kuwait University, Kuwait
Azzam Mourad , Department of Computer Science and Mathematics, Lebanese American University, Beirut, Lebanon
Hanine Tout , Department of Computer Science and Mathematics, Lebanese American University, Beirut, Lebanon
Hadi Otrok , ECE Department, Khalifa University of Science, Technology & Research, UAE
pp. 120-127

Out of sight, out of mind: Effects of displaying access-control information near the item it controls (Abstract)

Michael K. Reiter , University of North Carolina at Chapel Hill, Chapel Hill, USA
Lorrie Faith Cranor , Carnegie Mellon University, Pittsburgh, PA, USA
Lujo Bauer , Carnegie Mellon University, Pittsburgh, PA, USA
Kami Vaniea , Carnegie Mellon University, Pittsburgh, PA, USA
pp. 128-136

A provenance-based access control model (Abstract)

Ravi Sandhu , Institute for Cyber Security, University of Texas at San Antonio, USA
Dang Nguyen , Institute for Cyber Security, University of Texas at San Antonio, USA
Jaehong Park , Institute for Cyber Security, University of Texas at San Antonio, USA
pp. 137-144

Obligations in risk-aware access control (Abstract)

Timothy J. Norman , dot.rural Digital Economy Hub, University of Aberdeen, UK
Martin J. Kollingbaum , dot.rural Digital Economy Hub, University of Aberdeen, UK
Jason Crampton , dot.rural Digital Economy Hub, University of Aberdeen, UK
Liang Chen , dot.rural Digital Economy Hub, University of Aberdeen, UK
pp. 145-152

A concordance framework for building trust evidences (Abstract)

Stephen Naicken , Department of Informatics, University of Sussex, Brighton BN1 9QJ, UK
Natasha Dwyer , Victoria University, Footscray Park Campus, Ballarat Road, 3011, Australia
Anirban Basu , Graduate School of Engineering, Tokai University, 2-3-23 Takanawa, Minato-ku, Tokyo 108-8619, Japan
pp. 153-154

Making trusted attribute assertions online with the publish trust framework (Abstract)

Eva Winer , American Psychological Association, Washington DC, UK
Hal Warren , American Psychological Association, Washington DC, UK
Jennifer Golbeck , Department of Computer Science, University of Maryland, College Park, 20742, USA
pp. 155-156

Advice and trust in games of choice (Abstract)

Sarit Kraus , Department of Computer Science, Bar-Ilan University, Ramat Gan, 52900 Israel
Dana Nau , Department of Computer Science, University of Maryland, College Park, 20742, USA
Jennifer Golbeck , Department of Computer Science, University of Maryland, College Park, 20742, USA
Cody Buntain , Department of Computer Science, University of Maryland, College Park, 20742, USA
pp. 157-158

Towards requirements for trust management (Abstract)

Mark Vinkovits , User Centered Ubiquitous Computing, Fraunhofer FIT, Sankt Augustin, Germany
pp. 159-160

Social secret sharing in cloud computing using a new trust function (Abstract)

Douglas R. Stinson , David R. Cheriton School of Computer Science, University of Waterloo, Ontario N2L 3G1, Canada
Mehrdad Nojoumian , David R. Cheriton School of Computer Science, University of Waterloo, Ontario N2L 3G1, Canada
pp. 161-167

Building robust Reputation Systems for travel-related services (Abstract)

Peng Yang , Department of Computer Science, University Saarland, Germany
Huiying Duan , Heidelberg Institute for Theoretical Studies gGmbH, Germany
pp. 168-175

Collaborative trust evaluation for wiki security (Abstract)

Christian Damsgaard Jensen , Department of Informatics and Mathematical Modelling, Technical University of Denmark, Denmark
Kasper Lindberg , Department of Informatics and Mathematical Modelling, Technical University of Denmark, Denmark
pp. 176-184

The theory of creating trust with a set of mistrust-parties (Abstract)

Johannes Viehmann , Fraunhofer Institut FOKUS (MOTION), Kaiserin-Augusta-Allee 31, D-10589 Berlin, Germany
pp. 185-194

CENTER: A Centralized Trust-Based Efficient Routing protocol for wireless sensor networks (Abstract)

Ali Chehab , Department of Electrical and Computer Engineering, American University of Beirut, 1107 2020, Lebanon
Ayman Kayssi , Department of Electrical and Computer Engineering, American University of Beirut, 1107 2020, Lebanon
Ayman Tajeddine , Department of Electrical and Computer Engineering, American University of Beirut, 1107 2020, Lebanon
pp. 195-202

Service provider authentication assurance (Abstract)

Rajendra Kumar , Ministry of Communications and Information Technology, Government of India, India
Christophe Rosenberger , ENSICAEN, France
Audun Josang , University of Oslo, Norway
Kent A. Varmedal , University of Oslo, Norway
pp. 203-210

Ethical and legal considerations of reCAPTCHA (Abstract)

Jonathan Lung , Department of Computer Science, University of Toronto, 40 St. George St., Canada
pp. 211-216

Platform for privacy preferences (P3P): Current status and future directions (Abstract)

Luigi Logrippo , Département d'informatique et ingénierie, Université du Québec en Outaouais, Gatineau, Canada
Carlisle Adams , School of Electrical Engineering and Computer Science, University of Ottawa, Canada
Muyiwa Olurin , School of Electrical Engineering and Computer Science, University of Ottawa, Canada
pp. 217-220

Privacy invasion in business environments (Abstract)

Esma Aimeur , Département d'informatique et recherche opérationnelle, Université de Montréal, Canada
Pierre-Olivier Brosseau , Département d'informatique et recherche opérationnelle, Université de Montréal, Canada
Manuel Lafond , Département d'informatique et recherche opérationnelle, Université de Montréal, Canada
pp. 221-224

DLAS: Data Location Assurance Service for cloud computing environments (Abstract)

Ali Noman , School of Electrical Engineering & Computer Science (EECS), University of Ottawa, ON, Canada
pp. 225-228

A distributed platform of high interaction honeypots and experimental results (Abstract)

Mohamed Kaaniche , CNRS, LAAS, 7 Avenue du colonel Roche, F-31400 Toulouse, France
Vincent Nicomette , CNRS, LAAS, 7 Avenue du colonel Roche, F-31400 Toulouse, France
Ivan Studnia , CNRS, LAAS, 7 Avenue du colonel Roche, F-31400 Toulouse, France
Eric Alata , CNRS, LAAS, 7 Avenue du colonel Roche, F-31400 Toulouse, France
pp. 229-230

REM: A runtime browser extension manager with fine-grained access control (Abstract)

Adharsh Desikan , University of North Carolina, Charlotte, USA
Mohamed Shehab , University of North Carolina, Charlotte, USA
Said M. Marouf , University of North Carolina, Charlotte, USA
pp. 231-232

Combining the setbase approach with negative databases (Abstract)

Olivier Cipiere , Morpho, France
Herve Chabanne , Morpho, France
Julien Bringer , Morpho, France
pp. 233-234

3rd edition of the workshop on trustworthy self-organizing systems (TSOS 2012) (Abstract)

Jan-Philipp Steghofer , Institute for Software & Systems Engineering, Augsburg University, Germany
Wolfgang Reif , Institute for Software & Systems Engineering, Augsburg University, Germany
Christian Muller-Schloer , Institut für Systems Engineering - SRA, Leibniz Universität Hannover, Germany
pp. 235

The role of trust in computer security (Abstract)

Christian Damsgaard Jensen , DTU Informatics, Technical University of Denmark, Denmark
pp. 236

Distributive and retributive justice in self-organising electronic institutions (Abstract)

Jeremy Pitt , Department of Electrical & Electronic Engineering, Institute for Security Science and Technology, Imperial College London, UK
pp. 237

Using conventional reasoning techniques for self-organising systems (Abstract)

J.W. Sanders , African Institute for Mathematical Sciences and Department of Mathematical Sciences, Stellenbosch University, South Africa
Graeme Smith , School of Information Technology and Electrical Engineering, The University of Queensland, Australia
pp. 238-243

Visualization of processes in self-learning systems (Abstract)

Thomas Villmann , Computational Intelligence Group, University of Applied Sciences Mittweida, Germany
Michael Biehl , Johann Bernoulli Inst. for Mathematics & Computer Science, University of Groningen, The Netherlands
Marc Strickert , Department of Computer Science and Mathematics, University of Marburg, Germany
Kerstin Bunte , CITEC-Cognitive Interaction Technology Center of Excellence, Bielefeld University, Germany
Gabriele Peters , Human-Computer Interaction, FernUniversität in Hagen, Germany
pp. 244-249

Using Trust to reduce wasteful computation in open Desktop Grid Systems (Abstract)

Jorg Hahner , Institute of Systems Engineering, Leibniz Universität Hannover, Germany
Christian Muller-Schloer , Institute of Systems Engineering, Leibniz Universität Hannover, Germany
Yvonne Bernard , Institute of Systems Engineering, Leibniz Universität Hannover, Germany
Lukas Klejnowski , Institute of Systems Engineering, Leibniz Universität Hannover, Germany
pp. 250-255

Secure collaboration in on boarding companies (Abstract)

Pratap Chillakanti , School of Engineering and Information Sciences, Middlesex University, London, UK
pp. 256-259

Author index (Abstract)

pp. 260-262

[Title page] (Abstract)

pp. i
106 ms
(Ver 3.1 (10032016))