Formalizing Trust, Fraud, and Vulnerability
People
Faculty
- Prof. Bharat Bhargava
Collaborator
- Dr. Mamata Jenamani
- Dr. Leszek Lilien
- Prof. Sanjay Madria
Graduate Students
- Yuhui Zhong
- Yi Lu
- Weichao Wang
- Yunhua Lu
In the News
1. ACM Tech
News for IT Professionals
1. Purdue
computer scientist balances access and safety
- Researchers study Internet trust issues,
create solution
Papers
- Y.
Lu, B. Bhargava, W. Wang, Y. Zhong, and X. Wu "Secure
Wireless Network with Movable Base Stations", to appear in
IEICE/IEEE Joint Special Issue on Assurance Systems and Networks, October
2003.
- B. Bhargava, "Vulnerabilities
and Fraud in Computing Systems," in Proc. of the Intl. Conf. on
Advances in Internet, Processing, Systems, and Interdisciplinary Research
(IPSI-2003), Sv. Stefan, Serbia and Montenegro, October 2003.
- L. Lilien and A. Bhargava, "From
Vulnerabilities to Trust: A
Road to Trusted Computing," in Proc. of
the Intl. Conf. on Advances in Internet, Processing, Systems, and
Interdisciplinary Research (IPSI-2003), Sv. Stefan,
Serbia and Montenegro,
October 2003.
- B. Bhargava, Y. Zhong, and Y. Lu,
"Fraud
Formalization and Detection", in Proceeding of Data Warehouse and
Knowledge Management Conference (DaWak), September 2003.
- B. Bhargava, M. Jenamani, and Y.
Zhong, "Impact of Privacy Violation on The Fairness of Internet
Auctions", submitted to IEEE Security & Privacy.
- Y. Zhong, Y. Lu, and B. Bhargava,
"Dynamic Trust Production Based on Interaction Sequence", CSD-TR
03-006, Department of Computer Sciences, Purdue University.
- B. Bhargava and Y. Zhong, "Authorization
Based on Evidence and Trust", in Proceeding of Data Warehouse and
Knowledge Management Conference (DaWak), September 2002.
- E. Terzi, Y. Zhong, B. Bhargava,
Pankaj, and S. Madria, "An
Algorithm for Building User-Role Profiles in a Trust Environment",
in Proceeding of Data Warehouse and Knowledge Management Conference
(DaWak), September 2002.
- Y. Zhong, B. Bhargava and M. Mahoui,
"Trustworthiness
Based Role Assignment in Dynamic Web Environment", in Proceeding
of IEEE Workshop on "Security in Distributed Data Warehousing",
Oct. 2001.
Presentations
- Trust and
Privacy in Authorization
- Building A
Trustworthy, Secure, And Privacy Preserving Network
- Private and
Trusted Interactions
- Fraud
Formalization and Detection
- NSF Seattle
Workshop 2003
- Yuhui’s
Final Exam
Proposals
- Formalizing Evidence
and Trust for User Authorization, funded by NSF
- Vulnerability
Analysis and Threat Assessment/Avoidance, funded by NSF
Software
- Simulation on
token-based fraud detection model (Implemented using Matlab script)