The Community for Technology Leaders
2013 Eleventh Annual Conference on Privacy, Security and Trust (PST) (2013)
Tarragona, Spain
July 10, 2013 to July 12, 2013
ISBN: 978-1-4673-5839-2
TABLE OF CONTENTS

[Front cover] (PDF)

pp. c1

[Title page] (PDF)

pp. 1

Coalitional games for the management of anonymous access in online social networks (Abstract)

Esther Palomar , Computer Science Department Carlos III University of Madrid Madrid, Spain
Almudena Alcaide , Computer Science Department Carlos III University of Madrid Madrid, Spain
Elisenda Molina , Statistic Department Carlos III University of Madrid Madrid, Spain
Yan Zhang , Network Systems Department Simula Research Laboratory Oslo, Norway
pp. 1-10

Key privacy and anonymous protocols (Abstract)

Paolo D'Arco , Dipartimento di Informatica Via Giovanni Paolo II, 132 I-84084 Fisciano (SA) University of Salerno, Italy
Alfredo De Santis , Dipartimento di Informatica Via Giovanni Paolo II, 132 I-84084 Fisciano (SA) University of Salerno, Italy
pp. 11-18

Selective cloaking: Need-to-know for location-based apps (Abstract)

Benjamin Henne , Distributed Computing & Security Group Leibniz Universität Hannover Germany
Christian Kater , Distributed Computing & Security Group Leibniz Universität Hannover Germany
Matthew Smith , Distributed Computing & Security Group Leibniz Universität Hannover Germany
Michael Brenner , Distributed Computing & Security Group Leibniz Universität Hannover Germany
pp. 19-26

Differential privacy via t-closeness in data publishing (Abstract)

Jordi Soria-Comas , Universitat Rovira i Virgili Dept. of Computer Engineering and Maths UNESCO Chair in Data Privacy Av. Països Catalans 26 43007 Tarragona, Catalonia
Josep Domingo-Ferrert , Universitat Rovira i Virgili Dept. of Computer Engineering and Maths UNESCO Chair in Data Privacy Av. Països Catalans 26 43007 Tarragona, Catalonia
pp. 27-35

Allowing privacy-preserving analysis of social network likes (Abstract)

Francesco Buccafurri , DIIES University of Reggio Calabria Via Graziella, Località Feo di Vito 89122 Reggio Calabria, Italy
Lidia Fotia , DIIES University of Reggio Calabria Via Graziella, Località Feo di Vito 89122 Reggio Calabria, Italy
Gianluca Lax , DIIES University of Reggio Calabria Via Graziella, Località Feo di Vito 89122 Reggio Calabria, Italy
pp. 36-43

A self-adaptive classification for the dissociating privacy agent (Abstract)

Marc Juarez , IIIA (Inst. d'Investig. en Intell. Artificial), Bellaterra, Spain
Vicenc Torra , IIIA (Inst. d'Investig. en Intell. Artificial), Bellaterra, Spain
pp. 44-50

Blend me in: Privacy-preserving input generalization for personalized online services (Abstract)

Alegria Baquero , Institute for Software Research University of California, Irvine
Allan M. Schiffman , CommerceNet Palo Alto, California
Jeff Shrager , CommerceNet & Stanford Palo Alto, California
pp. 51-60

Traceability analysis of quadratic residue-based RFID authentication protocols (Abstract)

Zahra Sohrabi-Bonab , Information System and Security Lab (ISSL) Electrical Engineering Department, Sharif University of Technology, Tehran, Iran
Mahdi R. Alagheband , Information System and Security Lab (ISSL) Electrical Engineering Department, Sharif University of Technology, Tehran, Iran
Mohammad Reza Aref , Information System and Security Lab (ISSL) Electrical Engineering Department, Sharif University of Technology, Tehran, Iran
pp. 61-68

Privacy-preserving social recommendations in geosocial networks (Abstract)

Bisheng Liu , Cheriton School of Computer Science University of Waterloo
Urs Hengartner , Cheriton School of Computer Science University of Waterloo
pp. 69-76

A novel privacy preserving keyword searching for cloud storage (Abstract)

Lin Cheng , State Key Laboratory of Networking and Switch Technology Beijing University of Posts and Telecommunications, Beijing 100876, China
Zhengping Jin , State Key Laboratory of Networking and Switch Technology Beijing University of Posts and Telecommunications, Beijing 100876, China
Oiaovan Wen , State Key Laboratory of Networking and Switch Technology Beijing University of Posts and Telecommunications, Beijing 100876, China
Hua Zhang , State Key Laboratory of Networking and Switch Technology Beijing University of Posts and Telecommunications, Beijing 100876, China
pp. 77-81

Secure rendering process in cloud computing (Abstract)

Mohd Rizuan Baharon , School of Computing and Mathematical Sciences Liverpool John Moores University Liverpool, United Kingdom
Qi Shi , School of Computing and Mathematical Sciences Liverpool John Moores University Liverpool, United Kingdom
David Llewellyn-Jones , School of Computing and Mathematical Sciences Liverpool John Moores University Liverpool, United Kingdom
Madjid Merabti , School of Computing and Mathematical Sciences Liverpool John Moores University Liverpool, United Kingdom
pp. 82-87

Aegis: A semantic implementation of privacy as contextual integrity in social ecosystems (Abstract)

Imrul Kayes , Computer Science and Engineering University of South Florida Tampa, Florida USA 33620
Adriana Iamnitchi , Computer Science and Engineering University of South Florida Tampa, Florida USA 33620
pp. 88-97

Pseudonymous communications in secure industrial wireless sensor networks (Abstract)

Nouha Oualha , Communicating Systems Laboratory, CEA, LIST Gif-sur-Yvette, 91191, France
Alexis Olivereau , Communicating Systems Laboratory, CEA, LIST Gif-sur-Yvette, 91191, France
Aymen Boudguiga , Communicating Systems Laboratory, CEA, LIST Gif-sur-Yvette, 91191, France
pp. 98-102

A peer-to-peer agent community for digital oblivion in online social networks (Abstract)

Klara Stokes , Department of Computer and Information Science University of Linköping Linköping Sweden
Niklas Carlsson , Department of Computer and Information Science University of Linköping Linköping Sweden
pp. 103-110

How people care about their personal data released on social media (Abstract)

Kellyton dos Santos Brito , DEINFO - Universidade Federal Rural de Pernambuco CIn - Universidade Federal de Pernambuco Recife, Brazil
Frederico Araujo Durao , DCC - Universidade Federal da Bahia Salvador, Brazil
Vinicius Cardoso Garcia , CIn - Universidade Federal de Pernambuco Recife, Brazil
Silvio Romero de Lemos Meira , Centro de Estudos e Sistemas Avancados de Recife CIn - Universidade Federal de Pernambuco Recife, Brazil
pp. 111-118

Identifying individual vulnerability based on public data (Abstract)

John Ferro , Georgetown University Washington, DC 20057
Lisa Singh , Georgetown University Washington, DC 20057
Micah Sherr , Georgetown University Washington, DC 20057
pp. 119-126

HALT: Hybrid anonymization of longitudinal transactions (Abstract)

Morvarid Sehatkar , School of Electrical Engineering and Computer Science University of Ottawa Ottawa, Canada
Stan Matwin , School of Electrical Engineering and Computer Science University of Ottawa Ottawa, Canada
pp. 127-134

An NFC based consumer-level counterfeit detection framework (Abstract)

Muhammad Qasim Saeed , Information Security Group Royal Holloway University of London Egham, UK
Zeeshan Bilal , Information Security Group Royal Holloway University of London Egham, UK
Colin D. Walter , Information Security Group Royal Holloway University of London Egham, UK
pp. 135-142

Hot-patching a web server: A case study of ASAP code repair (Abstract)

Mathias Payer , ETH Zurich and UC Berkeley
Thomas R. Gross , ETH Zurich
pp. 143-150

An efficient and provably-secure coercion-resistant e-voting protocol (Abstract)

Alireza Toroghi Haghighat , Data and Network Security Lab Department of Computer Engineering Sharif University of Technology Tehran, Iran
Mohammad Sadeq Dousti , Data and Network Security Lab Department of Computer Engineering Sharif University of Technology Tehran, Iran
Rasool Jalili , Data and Network Security Lab Department of Computer Engineering Sharif University of Technology Tehran, Iran
pp. 161-168

Model-based specification and refinement of usage control policies (Abstract)

Ricardo Neisse , European Commission Joint Research Center Institute for the Protection and Security of the Citizen Ispra, Italy
Joerg Doerr , Fraunhofer Institute for Experimental Software Engineering Kaiserslautern, Germany
pp. 169-176

Design and implementation of multi-user secure indices for encrypted cloud storage (Abstract)

Mao-Pang Pang Lin , Trend Micro, Taiwan
Wei-Chih Hong , Institute of Information Science, Academia Sinica, Taiwan
Chih-Hung Chen , 104 Coporation, Taiwan
Chen-Mou Cheng , Research Center for Information Technology Innovation, Academia Sinica, Taiwan
pp. 177-184

Targeted attacks detection with SPuNge (Abstract)

Marco Balduzzi , Trend Micro Research, EMEA
Vincenzo Ciangaglini , Trend Micro Research, EMEA
Robert McArdle , Trend Micro Research, EMEA
pp. 185-194

Contextual feature based one-class classifier approach for detecting video response spam on YouTube (Abstract)

Vidushi Chaudhary , Indraprastha Institute of Information Technology (IIITD), Delhi New Delhi, India
Ashish Sureka , Indraprastha Institute of Information Technology (IIITD), Delhi New Delhi, India
pp. 195-204

Voice calls for free: How the black market establishes free phone calls — Trapped and uncovered by a VoIP honeynet (Abstract)

Markus Gruber , Vienna University of Technology Research Group for Industrial Software (INSO) 1040 Vienna, Austria
Christian Schanes , Vienna University of Technology Research Group for Industrial Software (INSO) 1040 Vienna, Austria
Florian Fankhauser , Vienna University of Technology Research Group for Industrial Software (INSO) 1040 Vienna, Austria
Thomas Grechenig , Vienna University of Technology Research Group for Industrial Software (INSO) 1040 Vienna, Austria
pp. 205-212

The role of phone numbers in understanding cyber-crime schemes (Abstract)

Andrei Costin , Eurecom Sophia Antipolis, France
Jelena Isacenkova , Eurecom Sophia Antipolis, France
Marco Balduzzi , Trend Micro Research, EMEA
Aurelien Francillon , Eurecom Sophia Antipolis, France
Davide Balzarotti , Eurecom Sophia Antipolis, France
pp. 213-220

Policy templates for relationship-based access control (Abstract)

Evangelos Aktoudianakis , Department of Computing, University of Surrey
Jason Crampton , Information Security Group, Royal Holloway, University of London
Steve Schneider , Department of Computing, University of Surrey
Helen Treharne , Department of Computing, University of Surrey
Adrian Waller , Thales UK Research & Technology
pp. 221-228

A multi-tenant RBAC model for collaborative cloud services (Abstract)

Bo Tang , Institute for Cyber Security University of Texas at San Antonio One UTSA Circle, San Antonio, Texas 78249
Qi Li , Institute for Cyber Security University of Texas at San Antonio One UTSA Circle, San Antonio, Texas 78249
Ravi Sandhu , Institute for Cyber Security University of Texas at San Antonio One UTSA Circle, San Antonio, Texas 78249
pp. 229-238

A provenance-based access control model for dynamic separation of duties (Abstract)

Dang Nguyen , Institute for Cyber Security University of Texas at San Antonio
Jaehong Park , Institute for Cyber Security University of Texas at San Antonio
Ravi Sandhu , Institute for Cyber Security University of Texas at San Antonio
pp. 247-256

Multi-data-types interval decision diagrams for XACML evaluation engine (Abstract)

Canh Ngo , University of Amsterdam Science Park 904, 1089XH Amsterdam, The Netherlands
Marc X. Makkes , University of Amsterdam Science Park 904, 1089XH Amsterdam, The Netherlands
Yuri Demchenko , University of Amsterdam Science Park 904, 1089XH Amsterdam, The Netherlands
Cees de Laat , University of Amsterdam Science Park 904, 1089XH Amsterdam, The Netherlands
pp. 257-266

Writing down your password: Does it help? (Abstract)

Vanessa Boothroyd , Carleton University Ottawa, Canada
Sonia Chiasson , Carleton University Ottawa, Canada
pp. 267-274

SSAS: A simple secure addressing scheme for IPv6 autoconfiguration (Abstract)

Hosnieh Rafiee , Hasso-Plattner-Institut, University of Potsdam P.O. Box 900460, 14440 Potsdam, Germany
Christoph Meinel , Hasso-Plattner-Institut, University of Potsdam P.O. Box 900460, 14440 Potsdam, Germany
pp. 275-282

Extended structural balance theory for modeling trust in social networks (Abstract)

Yi Qian , Department of Computer Science Rensselaer Polytechnic Institute
Sibel Adali , Department of Computer Science Rensselaer Polytechnic Institute
pp. 283-290

TrustForge: Flexible access control for collaborative crowd-sourced environment (Abstract)

Jian Chang , Department of Computer and Information Science University of Pennsylvania, Philadelphia, PA, 19104
Peter Gebhard , Department of Computer and Information Science University of Pennsylvania, Philadelphia, PA, 19104
Andreas Haeberlen , Department of Computer and Information Science University of Pennsylvania, Philadelphia, PA, 19104
Zack Ives , Department of Computer and Information Science University of Pennsylvania, Philadelphia, PA, 19104
Insup Lee , Department of Computer and Information Science University of Pennsylvania, Philadelphia, PA, 19104
Oleg Sokolsky , Department of Computer and Information Science University of Pennsylvania, Philadelphia, PA, 19104
Krishna K. Venkatasubramanian , Department of Computer Science Worcester Polytechnic Institute Worcester, MA, 01609
pp. 291-300

Efficient polynomial delegation under standard assumptions (Abstract)

Paz Morillo , Escola Tècnica Superior d'Enginyeria de Telecomunicació de Barcelona Universitat Politècnica de Catalunya, Barcelona Tech
Marc Obrador , Escola Tècnica Superior d'Enginyeria de Telecomunicació de Barcelona Universitat Politècnica de Catalunya, Barcelona Tech
pp. 301-308

Socio-technical formal analysis of TLS certificate validation in modern browsers (Abstract)

Giampaolo Bella , Dipartimento di Matematica e Informatica, Università di Catania, Italy
Rosario Giustolisi , Interdisciplinary Centre for Security, Reliability and Trust University of Luxembourg
Gabriele Lenzini , Interdisciplinary Centre for Security, Reliability and Trust University of Luxembourg
pp. 309-316

Trust-based decision-making for the adaptation of public displays in changing social contexts (Abstract)

Ekaterina Kurdjokova , Human Centered Multimedia Augsburg University Augsburg, Germany
Michael Wibner , Human Centered Multimedia Augsburg University Augsburg, Germany
Stephan Hammer , Human Centered Multimedia Augsburg University Augsburg, Germany
Elisabeth Andre , Human Centered Multimedia Augsburg University Augsburg, Germany
pp. 317-324

Semi-automated assessment of annotation trustworthiness (Abstract)

Davide Ceolin , VU University Amsterdam
Archana Nottamkandath , VU University Amsterdam
Wan Fokkink , VU University Amsterdam
pp. 325-332

Communicating trustworthiness using radar graphs: A detailed look (Abstract)

Jason R. C. Nurse , Cyber Security Centre, Department of Computer Science, University of Oxford, UK
Ioannis Agrafiotis , Cyber Security Centre, Department of Computer Science, University of Oxford, UK
Sadie Creese , Cyber Security Centre, Department of Computer Science, University of Oxford, UK
Michael Goldsmith , Cyber Security Centre, Department of Computer Science, University of Oxford, UK
Koen Lamberts , Department of Psychology, University of Warwick, UK
pp. 333-339

Leveraging platoon dispersion for Sybil detection in vehicular networks (Abstract)

Muhammad Al Mutaz , Dept. of Computer Science Missouri University of Science and Technology Rolla, MO, 65409
Levi Malott , Dept. of Computer Science Missouri University of Science and Technology Rolla, MO, 65409
Sriram Chellappan , Dept. of Computer Science Missouri University of Science and Technology Rolla, MO, 65409
pp. 340-347

Towards engineering trust systems: Template-based, component-oriented assembly (Abstract)

Sarah Magin , Telecooperation Group, Dept. of Computer Science Technische Universität Darmstadt Darmstadt, Germany
Sascha Hauke , Telecooperation Group, Dept. of Computer Science Technische Universität Darmstadt Darmstadt, Germany
pp. 348-351

Improving security of virtual machines during live migrations (Abstract)

Sebastian Biedermann , Security Engineering Group, Department of Computer Science, Technische Universität Darmstadt
Martin Zittel , Security Engineering Group, Department of Computer Science, Technische Universität Darmstadt
Stefan Katzenbeisser , Security Engineering Group, Department of Computer Science, Technische Universität Darmstadt
pp. 352-357

Providing useful and private Web search by means of social network profiling (Abstract)

Alexandre Viejo , Universitat Rovira i Virgili, UNESCO Chair in Data Privacy Departament d'Enginyeria Informàtica i Matemàtiques Av. Països Catalans 26, E-43007 Tarragona, Spain
David Sanchez , Universitat Rovira i Virgili, UNESCO Chair in Data Privacy Departament d'Enginyeria Informàtica i Matemàtiques Av. Països Catalans 26, E-43007 Tarragona, Spain
pp. 358-361

Define privacy-preserving setbase drawer size standard: A ∊-closeness perspective (Abstract)

Benjamin Justus , Lab-STICC, Télécom Bretagne, Cesson Sévigné, France
Frederic Cuppens , Lab-STICC, Télécom Bretagne, Cesson Sévigné, France
Nora Cuppens-Boulahia , Lab-STICC, Télécom Bretagne, Cesson Sévigné, France
Julien Bringer , Morpho, Paris, France
Herve Chabanne , Morpho, Paris, France
Olivier Cipiere , Morpho, Paris, France
pp. 362-365

Encouraging second thoughts: Obstructive user interfaces for raising security awareness (Abstract)

Tim Storer , University of Glasgow
Stephen Marsh , University of Ontario Institute of Technology
Sylvie Noel , Univcrsity of Trento
Babak Esfandiari , Carleton University
Khalil El-Khatib , University of Ontario Institute of Technology
Pam Briggs , Northumbria University
Karen Renaud , University of Glasgow
Mehmet Vefa Bicakci , Carleton University
pp. 366-368

Real-time malicious fast-flux detection using DNS and bot related features (Abstract)

Sergi Martinez-Bea , Artificial Intelligence Research Institute, 08193 Bellaterra, Spain
Sergio Castillo-Perez , Autonomous University of Barcelona, 08193 Bellaterra, Spain
Joaquin Garcia-Alfaro , Telecom SudParis, CNRS Samovar UMR 5157, Evry, France
pp. 369-372

Top-down itemset recoding for releasing private complex data (Abstract)

Tsubasa Takahashi , Cloud System Research Laboratories, NEC Corporation, Kawasaki, Kanagawa Japan
Koji Sobataka , Cloud System Research Laboratories, NEC Corporation, Kawasaki, Kanagawa Japan
Takao Takenouchi , Cloud System Research Laboratories, NEC Corporation, Kawasaki, Kanagawa Japan
Yuki Toyoda , Cloud System Research Laboratories, NEC Corporation, Kawasaki, Kanagawa Japan
Takuya Mori , Cloud System Research Laboratories, NEC Corporation, Kawasaki, Kanagawa Japan
Takahide Kohro , Jichi Medical University Hospital, Shimotsuke, Tochigi Japan
pp. 373-376

Device Comfort for mobile health information accessibility (Abstract)

Stephen Marsh , Faculty of Business and IT, Unviersity of Ontario Institute of Technology, Oshawa, Canada
Yao Wang , University of Saskatchewan, Saskatoon, Canada
Sylvie Noel , Department of Information Engineering and Computer Science, University of Trento, Italy
Lewis Robart , Canadian Intellectual Property Office, Ottawa, Canada
John Stewart , Communications Research Centre. Ottawa. Canada
pp. 377-380

An implementation of secure multi-party computations to preserve privacy when processing EMR data (Abstract)

Anders Andersen , Department of Computer Science Faculty of Science and Technology University of Troms⊘9037 Troms⊘Norway
pp. 381-384

Author index (PDF)

pp. 387-390

[Cover spine] (PDF)

pp. 1
81 ms
(Ver 3.3 (11022016))