Dr Ron Poet

  • Honorary Lecturer (School of Computing Science)

email: Ron.Poet@glasgow.ac.uk

Room S132, Computing Science, 13 Lilybank Gardens, Glasgow G12 8QQ

Import to contacts

Research interests

Publications

List by: Type | Date

Jump to: 2021 | 2020 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2009 | 2007
Number of items: 31.

2021

Baalous, R. S. A. and Poet, R. (2021) Utilizing sentence embedding for dangerous permissions detection in android apps' privacy policies. International Journal of Information Security and Privacy, 15(1), pp. 173-189. (doi: 10.4018/IJISP.2021010109)

2020

Baalous, R. and Poet, R. (2020) Factors Affecting Users' Disclosure Decisions in Android Runtime Permissions Model. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 29 Dec 2020 - 01 Jan 2021, pp. 1113-1118. ISBN 9780738143804 (doi: 10.1109/TrustCom50675.2020.00147)

2018

Baalous, R., Poet, R. and Storer, T. (2018) Analyzing Privacy Policies of Zero Knowledge Cloud Storage Applications on Mobile Devices. In: 2018 IEEE International Conference on Cloud Engineering (IC2E), Orlando, Florida, USA, 17-20 April 2018, pp. 218-224. ISBN 9781538650097 (doi: 10.1109/IC2E.2018.00047)

Baalous, R. and Poet, R. (2018) How Dangerous Permissions are Described in Android Apps' Privacy Policies? In: 11th International Conference on Security of Information and Networks (SIN 18), Cardiff, Wales, 10-12 Sept 2018, ISBN 9781450366083 (doi: 10.1145/3264437.3264477)

2017

Ferdous, M. S. and Poet, R. (2017) Formalising Identity Management Protocols. In: 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 12-14 Dec 2016, pp. 137-146. ISBN 9781509043798 (doi: 10.1109/PST.2016.7906948)

Labrosse, N. et al. (2017) Preparing for the Journey: Supporting Students to Make Successful Transitions Into and Out of Taught Postgraduate Study. 10th Annual University of Glasgow Learning and Teaching Conference, Glasgow, UK, 30 Mar 2017.

2016

Hussain, S., Sinnott, R. O. and Poet, R. (2016) A Security-Oriented Workflow Framework for Collaborative Environments. Trustcom/BigDataSE/I​SPA 2016, IEEE, 23-26 Aug 2016. pp. 707-714. ISBN 9781509032051 (doi: 10.1109/TrustCom.2016.0129)

2015

Ferdous, M. S., Norman, G. , Jøsang, A. and Poet, R. (2015) Mathematical modelling of trust issues in federated identity management. In: Damsgaard Jensen, C., Marsh, S., Dimitrakos, T. and Murayama, Y. (eds.) Trust Management IX: 9th Ifip Wg 11.11 International Conference, Ifiptm 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. Series: IFIP Advances in Information and Communication Technology (454). Springer International Publishing, pp. 13-29. ISBN 9783319184906 (doi: 10.1007/978-3-319-18491-3_2)

2014

Ferdous, M. S. and Poet, R. (2014) CAFS: A Framework for Context-Aware Federated Services. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 Sep 2014, pp. 130-139. ISBN 9781479965137 (doi: 10.1109/TrustCom.2014.21)

Chowdhury, S., Poet, R. and Mackenzie, L. (2014) Exploring the Guessability of Image Passwords. In: SIN 2014: 7th International Conference on Security of Information and Networks, Glasgow, UK, 09-11 Sep 2014, pp. 264-271. (doi: 10.1145/2659651.2659699)

Chowdhury, S., Poet, R. and Mackenzie, L. (2014) A Study of Mnemonic Image Passwords. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, 23-24 Jul 2014, pp. 207-214. ISBN 9781479935031 (doi: 10.1109/PST.2014.6890941)

Chowdhury, S., Poet, R. and Mackenzie, L. (2014) Do Graphical Authentication Systems Solve the Password Memorability Problem? In: Tryfonas, T. and Askoxylakis, I. (eds.) Human Aspects of Information Security, Privacy, and Trust: Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings. Series: Lecture notes in computer science (8533). Springer International Publishing: Cham, pp. 138-148. ISBN 9783319076195 (doi: 10.1007/978-3-319-07620-1_13)

Chowdhury, S., Poet, R. and Mackenzie, L. (2014) Passhint: Memorable and Secure Authentication. In: CHI 2014: ACM CHI Conference on Human Factors in Computing Systems, Toronto, Canada, 26 April - 1 May 2014, pp. 2917-2926. ISBN 9781450324731 (doi: 10.1145/2556288.2557153)

2013

Aljahdali, H. and Poet, R. (2013) The affect of familiarity on the usability of recognition-based graphical password. In: TrustCom 2013, Melbourne, Australia, 16-18 Jul 2013,

Chowdhury, S., Poet, R. and Mackenzie, L. (2013) A comprehensive study of the usability of multiple graphical passwords. In: Kotzé, P., Marsden, G., Lindgaard, G., Wesson, J. and Winckler, M. (eds.) Human-Computer Interaction – INTERACT 2013: 14th IFIP TC 13 International Conference, Cape Town, South Africa, September 2-6, 2013, Proceedings, Part III. Series: Lecture Notes in Computer Science (8119). Springer, pp. 421-441. ISBN 9783642404764 (doi: 10.1007/978-3-642-40477-1_26)

Chowdhury, S., Poet, R. and Mackenzie, L. (2013) Exploring the guessability of image passwords using verbal descriptions. In: TrustCom 2013, Melbourne, Australia, 16-18 Jul 2013,

Chowdhury, S., Poet, R. and Mackenzie, L. (2013) Multicriteria optimization to select images as passwords in recognition based graphical authentication systems. In: HCI International 2013, Las Vegas, NV, USA, 21 - 26 Jul 2013, pp. 13-22. (doi: 10.1007/978-3-642-39345-7_2)

Ferdous, M.S. and Poet, R. (2013) Dynamic identity federation using security assertion markup language (SAML). In: IFIP IDMAN 2013: Policies and Research in Identity Management, London, UK, 8-9 Apr 2013,

Ferdous, M.S. and Poet, R. (2013) Portable personal identity provider in mobile phones. In: TrustCom 2013, Melbourne, Australia, 16-18 Jul 2013,

Ferdous, M. S. and Poet, R. (2013) Analysing attribute aggregation models in federated identity management. SIN '13 Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey, 26-28 Nov 2013. pp. 181-188. ISBN 9781450324984 (doi: 10.1145/2523514.2526998)

2012

Poet, R. and Ferdous, M.S. (2012) Analysing power consumption of different browsers and identity management systems in mobile phones. International Journal of Distributed and Parallel Systems, 3(2), pp. 21-41.

English, R. and Poet, R. (2012) The effectiveness of intersection attack countermeasures for graphical passwords. In: 11th IEEE Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), Liverpool, UK, 25-27 June 2012, (doi: 10.1109/TrustCom.2012.271)

Ferdous, M.S. and Poet, R. (2012) A comparative analysis of identity management systems. In: 7th International Workshop on Security and High Performance Computing Systems (SHPCS), Madrid, Spain, 2-6 July 2012, pp. 454-461. (doi: 10.1109/HPCSim.2012.6266958)

2011

Poet, R. and Chowdhury, S. (2011) Comparing the usability of different levels of user involvement in producing password images. In: International Conference on Information Theory and Information Security, Hangzhou, China, 4-6 Nov 2011,

English, R. and Poet, R. (2011) Measuring the revised guessability of graphical passwords. In: 5th International Conference on Network and System Security (NSS), Milan, Italy, 6-8 Sep 2011, pp. 364-368. (doi: 10.1109/ICNSS.2011.6060031)

Chowdhury, S. and Poet, R. (2011) Comparing the usability of doodle and Mikon images to be used as authenticators in graphical authentication systems. In: 2011 International Conference on User Science and Engineering (i-USEr), Kuala Lumpur, Malaysia, 29 Nov - 1 Dec 2011, pp. 54-58. (doi: 10.1109/iUSEr.2011.6150536)

English, R. and Poet, R. (2011) Towards a metric for recognition-based graphical password security. In: 5th International Conference on Network and System Security (NSS), Milan, Italy, 6-8 Sep 2011, pp. 239-243. (doi: 10.1109/ICNSS.2011.6060007)

Jebriel, S.M. and Poet, R. (2011) Preventing shoulder-surfing when selecting pass-images in challenge set. In: International Conference on Innovations and Information Technology (IIT), Abu Dhabi, 25-27 April 2011, pp. 437-442. (doi: 10.1109/INNOVATIONS.2011.5893865)

2009

Poet, R. and Renaud, K. (2009) An algorithm for automatically choosing distractors for recognition based authentication using minimal image types. Ergonomics Open Journal, 2, pp. 178-184.

Poet, R. and Renaud, K. (2009) A mechanism for filtering distractors for Doodle passwords. International Journal of Pattern Recognotion and Artificial Intelligence, 23(5), pp. 1005-1029. (doi: 10.1142/S0218001409007430)

2007

Poet, R. and Renaud, K. (2007) A mechanism for filtering distractors for graphical passwords. In: International Graphonomics Society (IGS2007), Melbourne, Australia, 11-14 Nov 2007,

This list was generated on Sun Oct 13 18:36:22 2024 BST.
Number of items: 31.

Articles

Baalous, R. S. A. and Poet, R. (2021) Utilizing sentence embedding for dangerous permissions detection in android apps' privacy policies. International Journal of Information Security and Privacy, 15(1), pp. 173-189. (doi: 10.4018/IJISP.2021010109)

Poet, R. and Ferdous, M.S. (2012) Analysing power consumption of different browsers and identity management systems in mobile phones. International Journal of Distributed and Parallel Systems, 3(2), pp. 21-41.

Poet, R. and Renaud, K. (2009) An algorithm for automatically choosing distractors for recognition based authentication using minimal image types. Ergonomics Open Journal, 2, pp. 178-184.

Poet, R. and Renaud, K. (2009) A mechanism for filtering distractors for Doodle passwords. International Journal of Pattern Recognotion and Artificial Intelligence, 23(5), pp. 1005-1029. (doi: 10.1142/S0218001409007430)

Book Sections

Ferdous, M. S., Norman, G. , Jøsang, A. and Poet, R. (2015) Mathematical modelling of trust issues in federated identity management. In: Damsgaard Jensen, C., Marsh, S., Dimitrakos, T. and Murayama, Y. (eds.) Trust Management IX: 9th Ifip Wg 11.11 International Conference, Ifiptm 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. Series: IFIP Advances in Information and Communication Technology (454). Springer International Publishing, pp. 13-29. ISBN 9783319184906 (doi: 10.1007/978-3-319-18491-3_2)

Chowdhury, S., Poet, R. and Mackenzie, L. (2014) Do Graphical Authentication Systems Solve the Password Memorability Problem? In: Tryfonas, T. and Askoxylakis, I. (eds.) Human Aspects of Information Security, Privacy, and Trust: Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings. Series: Lecture notes in computer science (8533). Springer International Publishing: Cham, pp. 138-148. ISBN 9783319076195 (doi: 10.1007/978-3-319-07620-1_13)

Chowdhury, S., Poet, R. and Mackenzie, L. (2013) A comprehensive study of the usability of multiple graphical passwords. In: Kotzé, P., Marsden, G., Lindgaard, G., Wesson, J. and Winckler, M. (eds.) Human-Computer Interaction – INTERACT 2013: 14th IFIP TC 13 International Conference, Cape Town, South Africa, September 2-6, 2013, Proceedings, Part III. Series: Lecture Notes in Computer Science (8119). Springer, pp. 421-441. ISBN 9783642404764 (doi: 10.1007/978-3-642-40477-1_26)

Conference or Workshop Item

Labrosse, N. et al. (2017) Preparing for the Journey: Supporting Students to Make Successful Transitions Into and Out of Taught Postgraduate Study. 10th Annual University of Glasgow Learning and Teaching Conference, Glasgow, UK, 30 Mar 2017.

Hussain, S., Sinnott, R. O. and Poet, R. (2016) A Security-Oriented Workflow Framework for Collaborative Environments. Trustcom/BigDataSE/I​SPA 2016, IEEE, 23-26 Aug 2016. pp. 707-714. ISBN 9781509032051 (doi: 10.1109/TrustCom.2016.0129)

Ferdous, M. S. and Poet, R. (2013) Analysing attribute aggregation models in federated identity management. SIN '13 Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey, 26-28 Nov 2013. pp. 181-188. ISBN 9781450324984 (doi: 10.1145/2523514.2526998)

Conference Proceedings

Baalous, R. and Poet, R. (2020) Factors Affecting Users' Disclosure Decisions in Android Runtime Permissions Model. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 29 Dec 2020 - 01 Jan 2021, pp. 1113-1118. ISBN 9780738143804 (doi: 10.1109/TrustCom50675.2020.00147)

Baalous, R., Poet, R. and Storer, T. (2018) Analyzing Privacy Policies of Zero Knowledge Cloud Storage Applications on Mobile Devices. In: 2018 IEEE International Conference on Cloud Engineering (IC2E), Orlando, Florida, USA, 17-20 April 2018, pp. 218-224. ISBN 9781538650097 (doi: 10.1109/IC2E.2018.00047)

Baalous, R. and Poet, R. (2018) How Dangerous Permissions are Described in Android Apps' Privacy Policies? In: 11th International Conference on Security of Information and Networks (SIN 18), Cardiff, Wales, 10-12 Sept 2018, ISBN 9781450366083 (doi: 10.1145/3264437.3264477)

Ferdous, M. S. and Poet, R. (2017) Formalising Identity Management Protocols. In: 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 12-14 Dec 2016, pp. 137-146. ISBN 9781509043798 (doi: 10.1109/PST.2016.7906948)

Ferdous, M. S. and Poet, R. (2014) CAFS: A Framework for Context-Aware Federated Services. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 Sep 2014, pp. 130-139. ISBN 9781479965137 (doi: 10.1109/TrustCom.2014.21)

Chowdhury, S., Poet, R. and Mackenzie, L. (2014) Exploring the Guessability of Image Passwords. In: SIN 2014: 7th International Conference on Security of Information and Networks, Glasgow, UK, 09-11 Sep 2014, pp. 264-271. (doi: 10.1145/2659651.2659699)

Chowdhury, S., Poet, R. and Mackenzie, L. (2014) A Study of Mnemonic Image Passwords. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, 23-24 Jul 2014, pp. 207-214. ISBN 9781479935031 (doi: 10.1109/PST.2014.6890941)

Chowdhury, S., Poet, R. and Mackenzie, L. (2014) Passhint: Memorable and Secure Authentication. In: CHI 2014: ACM CHI Conference on Human Factors in Computing Systems, Toronto, Canada, 26 April - 1 May 2014, pp. 2917-2926. ISBN 9781450324731 (doi: 10.1145/2556288.2557153)

Aljahdali, H. and Poet, R. (2013) The affect of familiarity on the usability of recognition-based graphical password. In: TrustCom 2013, Melbourne, Australia, 16-18 Jul 2013,

Chowdhury, S., Poet, R. and Mackenzie, L. (2013) Exploring the guessability of image passwords using verbal descriptions. In: TrustCom 2013, Melbourne, Australia, 16-18 Jul 2013,

Chowdhury, S., Poet, R. and Mackenzie, L. (2013) Multicriteria optimization to select images as passwords in recognition based graphical authentication systems. In: HCI International 2013, Las Vegas, NV, USA, 21 - 26 Jul 2013, pp. 13-22. (doi: 10.1007/978-3-642-39345-7_2)

Ferdous, M.S. and Poet, R. (2013) Dynamic identity federation using security assertion markup language (SAML). In: IFIP IDMAN 2013: Policies and Research in Identity Management, London, UK, 8-9 Apr 2013,

Ferdous, M.S. and Poet, R. (2013) Portable personal identity provider in mobile phones. In: TrustCom 2013, Melbourne, Australia, 16-18 Jul 2013,

English, R. and Poet, R. (2012) The effectiveness of intersection attack countermeasures for graphical passwords. In: 11th IEEE Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), Liverpool, UK, 25-27 June 2012, (doi: 10.1109/TrustCom.2012.271)

Ferdous, M.S. and Poet, R. (2012) A comparative analysis of identity management systems. In: 7th International Workshop on Security and High Performance Computing Systems (SHPCS), Madrid, Spain, 2-6 July 2012, pp. 454-461. (doi: 10.1109/HPCSim.2012.6266958)

Poet, R. and Chowdhury, S. (2011) Comparing the usability of different levels of user involvement in producing password images. In: International Conference on Information Theory and Information Security, Hangzhou, China, 4-6 Nov 2011,

English, R. and Poet, R. (2011) Measuring the revised guessability of graphical passwords. In: 5th International Conference on Network and System Security (NSS), Milan, Italy, 6-8 Sep 2011, pp. 364-368. (doi: 10.1109/ICNSS.2011.6060031)

Chowdhury, S. and Poet, R. (2011) Comparing the usability of doodle and Mikon images to be used as authenticators in graphical authentication systems. In: 2011 International Conference on User Science and Engineering (i-USEr), Kuala Lumpur, Malaysia, 29 Nov - 1 Dec 2011, pp. 54-58. (doi: 10.1109/iUSEr.2011.6150536)

English, R. and Poet, R. (2011) Towards a metric for recognition-based graphical password security. In: 5th International Conference on Network and System Security (NSS), Milan, Italy, 6-8 Sep 2011, pp. 239-243. (doi: 10.1109/ICNSS.2011.6060007)

Jebriel, S.M. and Poet, R. (2011) Preventing shoulder-surfing when selecting pass-images in challenge set. In: International Conference on Innovations and Information Technology (IIT), Abu Dhabi, 25-27 April 2011, pp. 437-442. (doi: 10.1109/INNOVATIONS.2011.5893865)

Poet, R. and Renaud, K. (2007) A mechanism for filtering distractors for graphical passwords. In: International Graphonomics Society (IGS2007), Melbourne, Australia, 11-14 Nov 2007,

This list was generated on Sun Oct 13 18:36:22 2024 BST.