Nayot Poolsappasit

According to our database1, Nayot Poolsappasit authored at least 12 papers between 2007 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
ETIS - Efficient Trust and Identity Management System for Federated Service Providers.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Dynamic Security Risk Management Using Bayesian Attack Graphs.
IEEE Trans. Dependable Secur. Comput., 2012

Optimal security hardening on attack tree models of networks: a cost-benefit analysis.
Int. J. Inf. Sec., 2012

Trust Management of Encrypted Data Aggregation in a Sensor Network Environment.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012

2011
Challenges in Secure Sensor-Cloud Computing.
Proceedings of the Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, 2011

A Secure Data Aggregation Based Trust Management Approach for Dealing with Untrustworthy Motes in Sensor Network.
Proceedings of the International Conference on Parallel Processing, 2011

2009
Towards Achieving Personalized Privacy for Location-Based Services.
Trans. Data Priv., 2009

2008
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents.
Int. J. Secur. Networks, 2008

Towards a scalable model for location privacy.
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, 2008

An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems.
Proceedings of the Data and Applications Security XXII, 2008

2007
Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments.
Proceedings of the Data and Applications Security XXI, 2007

Optimal security hardening using multi-objective optimization on attack tree models of networks.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007


  Loading...