Formalizing Trust, Fraud, and Vulnerability

[People] [News] [Papers] [Presentations] [Proposals] [Software]

People

Faculty

    1. Prof. Bharat Bhargava

Collaborator

    1. Dr. Mamata Jenamani
    2. Dr. Leszek Lilien
    3. Prof. Sanjay Madria

Graduate Students

    1. Yuhui Zhong
    2. Yi Lu
    3. Weichao Wang
    4. Yunhua Lu

In the News

1.    ACM Tech News for IT Professionals                          

1.    Purdue computer scientist balances access and safety    

  1. Researchers study Internet trust issues, create solution  

Papers

  1. Y. Lu, B. Bhargava, W. Wang, Y. Zhong, and X. Wu "Secure Wireless Network with Movable Base Stations", to appear in IEICE/IEEE Joint Special Issue on Assurance Systems and Networks, October 2003.
  2. B. Bhargava, "Vulnerabilities and Fraud in Computing Systems," in Proc. of the Intl. Conf. on Advances in Internet, Processing, Systems, and Interdisciplinary Research (IPSI-2003), Sv. Stefan, Serbia and Montenegro, October 2003.
  3. L. Lilien and A. Bhargava, "From Vulnerabilities to Trust: A Road to Trusted Computing," in Proc. of the Intl. Conf. on Advances in Internet, Processing, Systems, and Interdisciplinary Research (IPSI-2003), Sv. Stefan, Serbia and Montenegro, October 2003.
  4. B. Bhargava, Y. Zhong, and Y. Lu, "Fraud Formalization and Detection", in Proceeding of Data Warehouse and Knowledge Management Conference (DaWak), September 2003.
  5. B. Bhargava, M. Jenamani, and Y. Zhong, "Impact of Privacy Violation on The Fairness of Internet Auctions", submitted to IEEE Security & Privacy.
  6. Y. Zhong, Y. Lu, and B. Bhargava, "Dynamic Trust Production Based on Interaction Sequence", CSD-TR 03-006, Department of Computer Sciences, Purdue University.
  7. B. Bhargava and Y. Zhong, "Authorization Based on Evidence and Trust", in Proceeding of Data Warehouse and Knowledge Management Conference (DaWak), September 2002.
  8. E. Terzi, Y. Zhong, B. Bhargava, Pankaj, and S. Madria, "An Algorithm for Building User-Role Profiles in a Trust Environment", in Proceeding of Data Warehouse and Knowledge Management Conference (DaWak), September 2002.
  9. Y. Zhong, B. Bhargava and M. Mahoui, "Trustworthiness Based Role Assignment in Dynamic Web Environment", in Proceeding of IEEE Workshop on "Security in Distributed Data Warehousing", Oct. 2001.

Presentations

  1. Trust and Privacy in Authorization
  2. Building A Trustworthy, Secure, And Privacy Preserving Network
  3. Private and Trusted Interactions
  4. Fraud Formalization and Detection
  5. NSF Seattle Workshop 2003
  6. Yuhui’s Final Exam

Proposals

  1. Formalizing Evidence and Trust for User Authorization, funded by NSF
  2. Vulnerability Analysis and Threat Assessment/Avoidance, funded by NSF

Software

  1. Simulation on token-based fraud detection model (Implemented using Matlab script)