STAST 2012 Proc. of the 2nd Int. Workshop on Socio-Technical Aspects in Security and Trust

Interdisciplinary Research Group in Socio-technical CybersecuritySTAST 2012 Proc. of the 2nd Int. Workshop on Socio-Technical Aspects in Security and TrustLenzini Gabriele, Bella Giampaolo🗎 Abstract:The last few years have consolidated our understanding that security and trust are a socio-technical matter. Hence a call for researchers from different disciplines, such as sociology, psychology and informatics, to construct … Continued

Implementation and Validation of a Localisation Assurance Service Provider

Interdisciplinary Research Group in Socio-technical CybersecurityImplementation and Validation of a Localisation Assurance Service ProviderChen Xihui, Harpes Carlo, Lenzini Gabriele, Martins Miguel, Mauw Sjouke, Pang Jun🗎 Abstract:Existing Global Navigation Satellite Systems offer no authentication to the open service signals and so stand-alone receivers are vulnerable to meaconing and spoofing attacks. These attacks interfere with the integrity … Continued

A group signature based electronic toll pricing system

Interdisciplinary Research Group in Socio-technical CybersecurityA group signature based electronic toll pricing systemChen Xihui, Lenzini Gabriele, Mauw Sjouke, Pang Jun🗎 Abstract:With the prevalence and development of GNSS technologies, location-based vehicle services (LBVS) have experienced a rapid growth in recent years. However, location is a sensitive and private piece of information, so the design and development … Continued

Trustworthy agent-based recommender system in a mobile P2P environment

Interdisciplinary Research Group in Socio-technical CybersecurityTrustworthy agent-based recommender system in a mobile P2P environmentSahli Nabil, Lenzini Gabriele, Eertink Henk🗎 Abstract:Current major P2P systems focus on PCs and do not provide services for the mobile environment. Compared to traditional P2P, characteristics of Mobile P2P include unreliable connections, limited bandwidth and constraints of mobile devices. In addition, … Continued

Defending against insider threats and internal data leakage

Interdisciplinary Research Group in Socio-technical CybersecurityDefending against insider threats and internal data leakageYou Ilsun, Lenzini Gabriele, Ogiela Marek R., Bertino Elisa🗎 Abstract:In the last decade, computer science researchers have been working hard to prevent attacks against the security of information systems. Different adversary models have incarnated the malicious entities against which researchers have defined security … Continued