The Community for Technology Leaders
2015 13th Annual Conference on Privacy, Security and Trust (PST) (2015)
Izmir, Turkey
July 21, 2015 to July 23, 2015
ISBN: 978-1-4673-7827-7
TABLE OF CONTENTS

Front cover (PDF)

pp. 1

Title page (PDF)

pp. 1

InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocol (Abstract)

Per Hallgren , Chalmers University of Technology, Sweden
Martin Ochoa , Siemens AG & Technische Universität München, Germany
Andrei Sabelfeld , Chalmers University of Technology, Sweden
pp. 1-6

Recommendation of categories in an agents world: The role of (not) local communicative environments (Abstract)

Rino Falcone , Institute of Cognitive Science and Technologies, ISTC-CNR, Rome, Italy
Alessandro Sapienza , Institute of Cognitive Science and Technologies, ISTC-CNR, Rome, Italy
Cristiano Castelfranchi , Institute of Cognitive Science and Technologies, ISTC-CNR, Rome, Italy
pp. 7-13

Zipf distribution model for quantifying risk of re-identification from trajectory data (Abstract)

Hiroaki Kikuchi , Department of Frontier Media Science, School of Interdisciplinary Mathematical Sciences, Meiji University, 4-21-1 Nakano, Nakano Ku, Tokyo, 164-8525 Japan
Katsumi Takahashi , NTT Secure Platform Laboratories, Musashino, Tokyo 280-8585, Japan
pp. 14-21

Who manages the manager? Identity management and user ownership in the age of data (Abstract)

Jonas Breuer , iMinds-Smit, Vrije Universiteit Brussel, Brussels, Belgium
Heritiana Ranaivoson , iMinds-Smit, Vrije Universiteit Brussel, Brussels, Belgium
Uschi Buchinger , iMinds-Smit, Vrije Universiteit Brussel, Brussels, Belgium
Pieter Ballon , iMinds-Smit, Vrije Universiteit Brussel, Brussels, Belgium
pp. 22-27

Disclosure risk assessment via record linkage by a maximum-knowledge attacker (Abstract)

Josep Domingo-Ferrer , Universitat Rovira i Virgili, Dept. of Computer Engineering and Maths, UNESCO Chair in Data Privacy, Av. Països Catalans 26, 43007 Tarragona, Catalonia
Sara Ricci , Universitat Rovira i Virgili, Dept. of Computer Engineering and Maths, UNESCO Chair in Data Privacy, Av. Països Catalans 26, 43007 Tarragona, Catalonia
Jordi Soria-Comas , Universitat Rovira i Virgili, Dept. of Computer Engineering and Maths, UNESCO Chair in Data Privacy, Av. Països Catalans 26, 43007 Tarragona, Catalonia
pp. 28-35

Privacy preserving business process matching (Abstract)

Dilian Gurov , KTH Royal Institute of Technology
Peeter Laud , Cybernetica
Roberto Guanciale , KTH Royal Institute of Technology
pp. 36-43

Privacy-preserving conditional random selection (Abstract)

Stefan Wuller , RWTH Aachen University, Aachen, Germany
Ulrike Meyer , RWTH Aachen University, Aachen, Germany
Fabian Forg , Stevens Institute of Technology, Hoboken, NJ, USA
Susanne Wetzel , Stevens Institute of Technology, Hoboken, NJ, USA
pp. 44-53

Laplace noise generation for two-party computational differential privacy (Abstract)

Balamurugan Anandan , Department of Computer Science, Purdue University, West Lafayette, Indiana, USA
Chris Clifton , Department of Computer Science, Purdue University, West Lafayette, Indiana, USA
pp. 54-61

A framework for a privacy-aware feature selection evaluation measure (Abstract)

Yasser Jafer , School of Electrical Engineering and Computer Science, University of Ottawa, Canada
Stan Matwin , School of Electrical Engineering and Computer Science, University of Ottawa, Canada
Marina Sokolova , School of Electrical Engineering and Computer Science, University of Ottawa, Canada
pp. 62-69

An adaptive algorithm for multivariate data-oriented microaggregation (Abstract)

Balkis Abidi , Université Tunis El Manar, Faculté des Sciences de Tunis, LIPAH-LR 11ES14,2092, Tunis, Tunisie
Sadok Ben Yahia , Université Tunis El Manar, Faculté des Sciences de Tunis, LIPAH-LR 11ES14,2092, Tunis, Tunisie
pp. 70-76

Is privacy a human right? An empirical examination in a global context (Abstract)

Hsiao-Ying Huang , Illinois Informatics Institute, University of Illinois at Urbana-Champaign, Illinois, United States
Masooda Bashir , Graduate School of Library and Information Science, University of Illinois at Urbana-Champaign, Illinois, United States
pp. 77-84

Towards automatic real time identification of malicious posts on Facebook (Abstract)

Prateek Dewan , Indraprastha Institute of Information Technology, Delhi (IIIT-D) Cybersecurity Education and Research Centre (CERC), IIIT-Delhi
Ponnurangam Kumaraguru , Indraprastha Institute of Information Technology, Delhi (IIIT-D) Cybersecurity Education and Research Centre (CERC), IIIT-Delhi
pp. 85-92

What they do in shadows: Twitter underground follower market (Abstract)

Anupama Aggarwal , Indraprastha Institute of Information Technology, Delhi (IIIT-D) Cybersecurity Education and Research Centre (CERC), IIIT-Delhi
Ponnurangam Kumaraguru , Indraprastha Institute of Information Technology, Delhi (IIIT-D) Cybersecurity Education and Research Centre (CERC), IIIT-Delhi
pp. 93-100

Revealing the relationship network behind link spam (Abstract)

Apostolis Zarras , Ruhr-University Bochum
Sotiris Ioannidis , FORTH-ICS
Thorsten Holz , Ruhr-University Bochum
pp. 101-108

A secure revocable personal health record system with policy-based fine-grained access control (Abstract)

Mitu Kumar Debnath , Department of Computer Science, Faculty of Science, Memorial University
Saeed Samet , E-Health Research Unit, Faculty of Medicine, Memorial University
Krishnamurthy Vidyasankar , Department of Computer Science, Faculty of Science, Memorial University
pp. 109-116

An efficient ID-based message recoverable privacy-preserving auditing scheme (Abstract)

Mehmet Sabir Kiraz , Mathematical and Computational Sciences, TÜBITAK BILGEM, Turkey
Isa Sertkaya , Mathematical and Computational Sciences, TÜBITAK BILGEM, Turkey
Osmanbey Uzunkol , Mathematical and Computational Sciences, TÜBITAK BILGEM, Turkey
pp. 117-124

An access control model for protecting provenance graphs (Abstract)

Liang Chen , dot.rural Digital Economy Hub, University of Aberdeen, UK
Peter Edwards , dot.rural Digital Economy Hub, University of Aberdeen, UK
John D. Nelson , dot.rural Digital Economy Hub, University of Aberdeen, UK
Timothy J. Norman , dot.rural Digital Economy Hub, University of Aberdeen, UK
pp. 125-132

ECA rules for controlling authorisation plan to satisfy dynamic constraints (Abstract)

Meriam Jemel , University of Tunis, SOIE Laboratory, Tunis, Tunisia
Nadia Ben Azzouna , University of Tunis, SOIE Laboratory, Tunis, Tunisia
Khaled Ghedira , University of Tunis, SOIE Laboratory, Tunis, Tunisia
pp. 133-138

Devil in a box: Installing backdoors in electronic door locks (Abstract)

Seongyeol Oh , College of Information and Communication Engineering, Sungkyunkwan University, Republic of Korea
Joon-Sung Yang , College of Information and Communication Engineering, Sungkyunkwan University, Republic of Korea
Andrea Bianchi , College of Information and Communication Engineering, Sungkyunkwan University, Republic of Korea
Hyoungshick Kim , College of Information and Communication Engineering, Sungkyunkwan University, Republic of Korea
pp. 139-144

Embedded systems security: Threats, vulnerabilities, and attack taxonomy (Abstract)

Dorottya Papp , CrySyS Lab, Budapest University of Technology and Economics, Hungary
Zhendong Ma , Digital Safety & Security Department, AIT Austrian Institute of Technology, Austria
Levente Buttyan , CrySyS Lab, Budapest University of Technology and Economics, Hungary
pp. 145-152

Performance evaluation of ECC scalar multiplication using parallel modular algorithms on mobile devices (Abstract)

Tiago Vanderlei de Arruda , Computer Department, Federal University of São Carlos, Sorocaba, São Paulo, Brazil
Yeda Regina Venturini , Computer Department, Federal University of São Carlos, Sorocaba, São Paulo, Brazil
Tiemi Christine Sakata , Computer Department, Federal University of São Carlos, Sorocaba, São Paulo, Brazil
pp. 153-156

Real-time signature-based detection approach for SMS botnet (Abstract)

Abdullah J. Alzahrani , Information Security Center of Excellence, Faculty of Computer Science, University of New Brunswick, Canada
Ali A. Ghorbani , Information Security Center of Excellence, Faculty of Computer Science, University of New Brunswick, Canada
pp. 157-164

Network security supported by arguments (Abstract)

Fabio Martinelli , IIT-CNR Via Moruzzi 1, 56124 Pisa, Italy
Francesco Santini , IIT-CNR Via Moruzzi 1, 56124 Pisa, Italy
Artsiom Yautsiukhin , IIT-CNR Via Moruzzi 1, 56124 Pisa, Italy
pp. 165-172

Keyboard or keylogger?: A security analysis of third-party keyboards on Android (Abstract)

Junsung Cho , Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea
Geumhwan Cho , Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea
Hyoungshick Kim , Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea
pp. 173-176

A model for calculating user-identity trustworthiness in online transactions (Abstract)

Brian Soeder , The Center for Identity, The University of Texas at Austin, Austin, TX, U.S.A
K. Suzanne Barber , The Center for Identity, The University of Texas at Austin, Austin, TX, U.S.A.
pp. 177-185

Physical trust-based persistent authentication (Abstract)

Masahiro Fujita , Graduate School of Science and Technology, Shizuoka University, Hamamatsu, Japan
Christian D. Jensen , Department of Applied Mathematics and Computer Science, Technical University of Denmark, Kgs. Lyngby, Denmark
Shiori Arimura , Graduate School of Informatics, Shizuoka University, Hamamatsu, Japan
Yuki Ikeya , Graduate School of Informatics, Shizuoka University, Hamamatsu, Japan
Masakatsu Nishigaki , Graduate School of Science and Technology, Shizuoka University, Hamamatsu, Japan
pp. 186-190

Minimizing transitive trust threats in software management systems (Abstract)

Jaap Boender , Department of Computer Science, Middlesex University, United Kingdom
Giuseppe Primiero , Department of Computer Science, Middlesex University, United Kingdom
Franco Raimondi , Department of Computer Science, Middlesex University, United Kingdom
pp. 191-198

Author index (PDF)

pp. 199

Cover spine (PDF)

pp. 1
93 ms
(Ver 3.3 (11022016))