A Trusted Information Sharing Project From
Syracuse University, Electrical Engineering &
Using Subject- and Object-specific Attributes for
Access Control in Web-based Knowledge Management
Systems From Vienna University of Economics and
Auditable Security Controls Of Best In Class
Security and IT Operations Organizations By Gene
Kim, CTO, Tripwire, Inc.
A Queuing Formulation of Intrusion Detection with
Active and Passive Responses From Department of
Information Systems and Operations Management,
School of Management, The University of Texas at
Ferret By T.J.
Smith, Research Triangle Park, NC
Detecting the Misappropriation of Sensitive
Information through Bottleneck Monitoring By T.J
Goan, Stottler Henke Associates Inc.
Network Log Anonymization: Application of Crypto-PAn
to Cisco Netflows From National Center for
Supercomputing Applications (NCSA), University of
Illinois at Urbana-Champaign
A Control Flow Integrity Based Trust Model, By
Ge Zhu, Akhilesh Tyagi, Iowa State University.
Trust Management and Theory Revision By Ji Ma,
School of Computer and Information Science,
University of South Australia.
Using Entropy to Trade Privacy for Trust From
Department of Computer Sciences, Purdue University.
Statistical Privacy For Privacy Preserving
Information Sharing, Johannes Gehrke, Cornell
On Privacy and Anonymity in Knowledge
Externalization From The Chinese University of
Trust-based Privacy Preservation for Peer-to-peer
Data Sharing From Department of Computer
Sciences, Purdue University
Securing Information through Trust Management in
Wireless Networks From Computer Science and
Engineering, The State University of New York at
PBKM: A Secure Knowledge Management Framework
From Dept. Computer Science, UT @ San Antonio