Sciweavers

PST
2004
14 years 5 days ago
The Sensitivities of User Profile Information in Music Recommender Systems
Personalized services can cause privacy concerns, due to the acquisition, storage and application of sensitive personal information. This paper describes empirical research into th...
Evelien van de Garde-Perik, Boris E. R. de Ruyter,...
PST
2004
14 years 5 days ago
Familiarity and Trust: Measuring Familiarity with a Web Site
Abstract-- This work aims at measuring familiarity to contribute to the formalization of trust. Trust has always been bundled with familiarity to become a popular topic in the area...
Jie Zhang, Ali A. Ghorbani
PST
2004
14 years 5 days ago
Syntax-based Vulnerability Testing of Frame-based Network Protocols
Syntax-based vulnerability testing is a static black-box testing method for protocol implementations. It involves testing the Implementation Under Test (IUT) with a large number o...
Oded Tal, Scott Knight, Tom Dean
PST
2004
14 years 5 days ago
Practical Remote Electronic Elections for the UK
Abstract-- The United Kingdom (UK) government has repeatedly expressed a desire to employ a Remote Electronic Voting (REV) system in a general election after 2006. Most existing RE...
Tim Storer, Ishbel Duncan
PST
2004
14 years 5 days ago
A Diagrammatical Framework for Information Systems Attacks
All information systems can be represented by a conceptual and abstracted systems diagram. Therefore all attacks against information systems can also be ted. By studying the securi...
Terry Roebuck
PST
2004
14 years 5 days ago
Structural Concepts for Trust, Contract and Security Management for a Virtual Chemical Engineering Organisation
The paper reports on ongoing research into the development of a management system to co-ordinate a set of activities of a virtual organisation for the production of chemicals. The...
Panayiotis Periorellis, Christopher J. W. Townson,...
PST
2004
14 years 5 days ago
A novel visualization technique for network anomaly detection
Visualized information is a technique that can encode large amounts of complex interrelated data, being at the same time easily quantified, manipulated, and processed by a human us...
Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani
PST
2004
14 years 5 days ago
Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities
This paper presents the first mediated hierarchical identity-based encryption and signature schemes. Both schemes are designed to support information access control in hierarchical...
Deholo Nali, Ali Miri, Carlisle M. Adams