The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Risks to the privacy and security of the information carried on wired and wireless networks and risks to the networks themselves are matters of serious concern to citizens, corporations, and governments. There is every indication that cyber threats are increasing in number, complexity and severity. Given the magnitude of this problem, security and privacy rise to the top of the list of concerns about...
Welcome to the 14th annual international Privacy, Security and Trust conference. On behalf of Unitec Institute of Technology, it is my pleasure to welcome you to PST 2016 in Auckland, New Zealand. I hope that you enjoy the conference and find meeting and sharing ideas with one another an enriching experience.
As General Chair of the PST2016, I am honoured and delighted to welcome you to the 14th International Conference on Privacy, Security and Trust hosted this year in the beautiful city of Auckland, New Zealand. We have chosen two venues that guarantees a successful technical conference amid the scenery of Auckland City and the culture of our Mt Albert Campus.
Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
This paper examines the impact of privacy, security, and trust (PST) on the Technology Acceptance Model (TAM) and Task-Technology Fit (TTF) model for consumers of e-commerce. The findings of this pilot study were drawn by designing a structural equation model (SEM) on the impact of privacy, security, and trust (PST) on TAM and TTF models for consumers of e-commerce. The population for this pilot study...
We discuss two related forms of trust. One form of trust is related to the perceived knowledge of other agents; we accept the information that another agent provides if we believe they have sufficient expertise in a particular domain. The second form is related to action; we trust another agent to act on our behalf if we believe they will choose acceptable actions. In this paper, we explore the relationship...
Attribute-based access control (ABAC) is well known for flexible policy specification and dynamic decision-making capabilities. Unlike the other access control models, in ABAC, privileges are granted on the basis of the values (e.g., manager, deputy manager, secret, etc.) of the attributes (e.g., role, security level, etc.) of various entities (e.g., users, objects, environment, etc.). Therefore,...
In this paper, we introduce new methods for releasing differentially private graphs. Our techniques are based on a new way to distribute noise among edge weights. More precisely, we rely on the addition of noise whose amplitude is edge-calibrated and optimize the distribution of the privacy budget among subsets of edges. The generic privacy framework that we propose can capture most of the privacy...
We address security vulnerabilities for a smart thermostat. As this kind of smart appliance is adopted in homes around the world, every user will be opening up a new avenue for cyber attack. Since these devices have known vulnerabilities and they are being managed by non-technical users, we anticipate that smart thermostats are likely to be targetted by unsophisticated attackers relying on publicly...
Smartphone apps are becoming a popular vehicle to collect users' personal interests, demographics and other private information. Due to lack of regulation, a curious party can covertly link and aggregate sensitive information from independent sources (sessions or apps) over time to conduct unwanted user profiling, targeted advertising or surveillance. Such unregulated aggregation is rooted at the...
Something in our mind does not always reflect with our fingers on keyboard and mouse, but we respect our blood which might be the way out of the wariness in usage of social media networks today. Social media networks are already the largest network among the population across our globe and for sure, it will not stop expanding its territory. Security vulnerabilities on the other side have been mounting...
Malware detection has been widely explored in recent years due to an increased rate of information theft, ransom demands and money laundering cases. It is known that MS Windows Operating System family is susceptible to attacks due to the extensive number of found vulnerabilities across many outdated versions that are still in use. As a result, multiple malware categories and families have emerged...
Protecting Critical Infrastructures (CIs) against contemporary cyber attacks has become a crucial as well as complex task. Modern attack campaigns, such as Advanced Persistent Threats (APTs), leverage weaknesses in the organization's business processes and exploit vulnerabilities of several systems to hit their target. Although their life-cycle can last for months, these campaigns typically go undetected...
In this paper, we introduce a study on privacy setting acceptance of drivers for data utilization on vehicles, and factors related to privacy setting. This qualitative research is based on the factors extracted from former research on privacy setting acceptance for ICT services. That is conducted through questionnaires and depth interviews on connected car services. As a result, we show acquiring...
In a context of Cybersecurity and development of Cloud or Big Data, Data Security Classification is becoming these days a real issue in most organization.
Industrial control systems have become ubiquitous, enabling the remote, electronic control of physical equipment and sensors. Originally designed to operate on closed networks, the protocols used by these devices have no built-in security. However, despite this, an alarming number of systems are connected to the public Internet and an attacker who finds a device often can cause catastrophic damage...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.