Dr Ron Poet
- Honorary Lecturer (School of Computing Science)
email:
Ron.Poet@glasgow.ac.uk
Room S132, Computing Science, 13 Lilybank Gardens, Glasgow G12 8QQ
Research interests
Personal site: http://www.dcs.gla.ac.uk/~ron
Publications
2021
Baalous, R. S. A. and Poet, R. (2021) Utilizing sentence embedding for dangerous permissions detection in android apps' privacy policies. International Journal of Information Security and Privacy, 15(1), pp. 173-189. (doi: 10.4018/IJISP.2021010109)
2020
Baalous, R. and Poet, R. (2020) Factors Affecting Users' Disclosure Decisions in Android Runtime Permissions Model. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 29 Dec 2020 - 01 Jan 2021, pp. 1113-1118. ISBN 9780738143804 (doi: 10.1109/TrustCom50675.2020.00147)
2018
Baalous, R., Poet, R. and Storer, T. (2018) Analyzing Privacy Policies of Zero Knowledge Cloud Storage Applications on Mobile Devices. In: 2018 IEEE International Conference on Cloud Engineering (IC2E), Orlando, Florida, USA, 17-20 April 2018, pp. 218-224. ISBN 9781538650097 (doi: 10.1109/IC2E.2018.00047)
Baalous, R. and Poet, R. (2018) How Dangerous Permissions are Described in Android Apps' Privacy Policies? In: 11th International Conference on Security of Information and Networks (SIN 18), Cardiff, Wales, 10-12 Sept 2018, ISBN 9781450366083 (doi: 10.1145/3264437.3264477)
2017
Ferdous, M. S. and Poet, R. (2017) Formalising Identity Management Protocols. In: 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 12-14 Dec 2016, pp. 137-146. ISBN 9781509043798 (doi: 10.1109/PST.2016.7906948)
Labrosse, N. et al. (2017) Preparing for the Journey: Supporting Students to Make Successful Transitions Into and Out of Taught Postgraduate Study. 10th Annual University of Glasgow Learning and Teaching Conference, Glasgow, UK, 30 Mar 2017.
2016
Hussain, S., Sinnott, R. O. and Poet, R. (2016) A Security-Oriented Workflow Framework for Collaborative Environments. Trustcom/BigDataSE/ISPA 2016, IEEE, 23-26 Aug 2016. pp. 707-714. ISBN 9781509032051 (doi: 10.1109/TrustCom.2016.0129)
2015
Ferdous, M. S., Norman, G. , Jøsang, A. and Poet, R. (2015) Mathematical modelling of trust issues in federated identity management. In: Damsgaard Jensen, C., Marsh, S., Dimitrakos, T. and Murayama, Y. (eds.) Trust Management IX: 9th Ifip Wg 11.11 International Conference, Ifiptm 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. Series: IFIP Advances in Information and Communication Technology (454). Springer International Publishing, pp. 13-29. ISBN 9783319184906 (doi: 10.1007/978-3-319-18491-3_2)
2014
Ferdous, M. S. and Poet, R. (2014) CAFS: A Framework for Context-Aware Federated Services. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 Sep 2014, pp. 130-139. ISBN 9781479965137 (doi: 10.1109/TrustCom.2014.21)
Chowdhury, S., Poet, R. and Mackenzie, L. (2014) Exploring the Guessability of Image Passwords. In: SIN 2014: 7th International Conference on Security of Information and Networks, Glasgow, UK, 09-11 Sep 2014, pp. 264-271. (doi: 10.1145/2659651.2659699)
Chowdhury, S., Poet, R. and Mackenzie, L. (2014) A Study of Mnemonic Image Passwords. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, 23-24 Jul 2014, pp. 207-214. ISBN 9781479935031 (doi: 10.1109/PST.2014.6890941)
Chowdhury, S., Poet, R. and Mackenzie, L. (2014) Do Graphical Authentication Systems Solve the Password Memorability Problem? In: Tryfonas, T. and Askoxylakis, I. (eds.) Human Aspects of Information Security, Privacy, and Trust: Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings. Series: Lecture notes in computer science (8533). Springer International Publishing: Cham, pp. 138-148. ISBN 9783319076195 (doi: 10.1007/978-3-319-07620-1_13)
Chowdhury, S., Poet, R. and Mackenzie, L. (2014) Passhint: Memorable and Secure Authentication. In: CHI 2014: ACM CHI Conference on Human Factors in Computing Systems, Toronto, Canada, 26 April - 1 May 2014, pp. 2917-2926. ISBN 9781450324731 (doi: 10.1145/2556288.2557153)
2013
Aljahdali, H. and Poet, R. (2013) The affect of familiarity on the usability of recognition-based graphical password. In: TrustCom 2013, Melbourne, Australia, 16-18 Jul 2013,
Chowdhury, S., Poet, R. and Mackenzie, L. (2013) A comprehensive study of the usability of multiple graphical passwords. In: Kotzé, P., Marsden, G., Lindgaard, G., Wesson, J. and Winckler, M. (eds.) Human-Computer Interaction – INTERACT 2013: 14th IFIP TC 13 International Conference, Cape Town, South Africa, September 2-6, 2013, Proceedings, Part III. Series: Lecture Notes in Computer Science (8119). Springer, pp. 421-441. ISBN 9783642404764 (doi: 10.1007/978-3-642-40477-1_26)
Chowdhury, S., Poet, R. and Mackenzie, L. (2013) Exploring the guessability of image passwords using verbal descriptions. In: TrustCom 2013, Melbourne, Australia, 16-18 Jul 2013,
Chowdhury, S., Poet, R. and Mackenzie, L. (2013) Multicriteria optimization to select images as passwords in recognition based graphical authentication systems. In: HCI International 2013, Las Vegas, NV, USA, 21 - 26 Jul 2013, pp. 13-22. (doi: 10.1007/978-3-642-39345-7_2)
Ferdous, M.S. and Poet, R. (2013) Dynamic identity federation using security assertion markup language (SAML). In: IFIP IDMAN 2013: Policies and Research in Identity Management, London, UK, 8-9 Apr 2013,
Ferdous, M.S. and Poet, R. (2013) Portable personal identity provider in mobile phones. In: TrustCom 2013, Melbourne, Australia, 16-18 Jul 2013,
Ferdous, M. S. and Poet, R. (2013) Analysing attribute aggregation models in federated identity management. SIN '13 Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey, 26-28 Nov 2013. pp. 181-188. ISBN 9781450324984 (doi: 10.1145/2523514.2526998)
2012
Poet, R. and Ferdous, M.S. (2012) Analysing power consumption of different browsers and identity management systems in mobile phones. International Journal of Distributed and Parallel Systems, 3(2), pp. 21-41.
English, R. and Poet, R. (2012) The effectiveness of intersection attack countermeasures for graphical passwords. In: 11th IEEE Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), Liverpool, UK, 25-27 June 2012, (doi: 10.1109/TrustCom.2012.271)
Ferdous, M.S. and Poet, R. (2012) A comparative analysis of identity management systems. In: 7th International Workshop on Security and High Performance Computing Systems (SHPCS), Madrid, Spain, 2-6 July 2012, pp. 454-461. (doi: 10.1109/HPCSim.2012.6266958)
2011
Poet, R. and Chowdhury, S. (2011) Comparing the usability of different levels of user involvement in producing password images. In: International Conference on Information Theory and Information Security, Hangzhou, China, 4-6 Nov 2011,
English, R. and Poet, R. (2011) Measuring the revised guessability of graphical passwords. In: 5th International Conference on Network and System Security (NSS), Milan, Italy, 6-8 Sep 2011, pp. 364-368. (doi: 10.1109/ICNSS.2011.6060031)
Chowdhury, S. and Poet, R. (2011) Comparing the usability of doodle and Mikon images to be used as authenticators in graphical authentication systems. In: 2011 International Conference on User Science and Engineering (i-USEr), Kuala Lumpur, Malaysia, 29 Nov - 1 Dec 2011, pp. 54-58. (doi: 10.1109/iUSEr.2011.6150536)
English, R. and Poet, R. (2011) Towards a metric for recognition-based graphical password security. In: 5th International Conference on Network and System Security (NSS), Milan, Italy, 6-8 Sep 2011, pp. 239-243. (doi: 10.1109/ICNSS.2011.6060007)
Jebriel, S.M. and Poet, R. (2011) Preventing shoulder-surfing when selecting pass-images in challenge set. In: International Conference on Innovations and Information Technology (IIT), Abu Dhabi, 25-27 April 2011, pp. 437-442. (doi: 10.1109/INNOVATIONS.2011.5893865)
2009
Poet, R. and Renaud, K. (2009) An algorithm for automatically choosing distractors for recognition based authentication using minimal image types. Ergonomics Open Journal, 2, pp. 178-184.
Poet, R. and Renaud, K. (2009) A mechanism for filtering distractors for Doodle passwords. International Journal of Pattern Recognotion and Artificial Intelligence, 23(5), pp. 1005-1029. (doi: 10.1142/S0218001409007430)
2007
Poet, R. and Renaud, K. (2007) A mechanism for filtering distractors for graphical passwords. In: International Graphonomics Society (IGS2007), Melbourne, Australia, 11-14 Nov 2007,
Articles
Baalous, R. S. A. and Poet, R. (2021) Utilizing sentence embedding for dangerous permissions detection in android apps' privacy policies. International Journal of Information Security and Privacy, 15(1), pp. 173-189. (doi: 10.4018/IJISP.2021010109)
Poet, R. and Ferdous, M.S. (2012) Analysing power consumption of different browsers and identity management systems in mobile phones. International Journal of Distributed and Parallel Systems, 3(2), pp. 21-41.
Poet, R. and Renaud, K. (2009) An algorithm for automatically choosing distractors for recognition based authentication using minimal image types. Ergonomics Open Journal, 2, pp. 178-184.
Poet, R. and Renaud, K. (2009) A mechanism for filtering distractors for Doodle passwords. International Journal of Pattern Recognotion and Artificial Intelligence, 23(5), pp. 1005-1029. (doi: 10.1142/S0218001409007430)
Book Sections
Ferdous, M. S., Norman, G. , Jøsang, A. and Poet, R. (2015) Mathematical modelling of trust issues in federated identity management. In: Damsgaard Jensen, C., Marsh, S., Dimitrakos, T. and Murayama, Y. (eds.) Trust Management IX: 9th Ifip Wg 11.11 International Conference, Ifiptm 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. Series: IFIP Advances in Information and Communication Technology (454). Springer International Publishing, pp. 13-29. ISBN 9783319184906 (doi: 10.1007/978-3-319-18491-3_2)
Chowdhury, S., Poet, R. and Mackenzie, L. (2014) Do Graphical Authentication Systems Solve the Password Memorability Problem? In: Tryfonas, T. and Askoxylakis, I. (eds.) Human Aspects of Information Security, Privacy, and Trust: Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings. Series: Lecture notes in computer science (8533). Springer International Publishing: Cham, pp. 138-148. ISBN 9783319076195 (doi: 10.1007/978-3-319-07620-1_13)
Chowdhury, S., Poet, R. and Mackenzie, L. (2013) A comprehensive study of the usability of multiple graphical passwords. In: Kotzé, P., Marsden, G., Lindgaard, G., Wesson, J. and Winckler, M. (eds.) Human-Computer Interaction – INTERACT 2013: 14th IFIP TC 13 International Conference, Cape Town, South Africa, September 2-6, 2013, Proceedings, Part III. Series: Lecture Notes in Computer Science (8119). Springer, pp. 421-441. ISBN 9783642404764 (doi: 10.1007/978-3-642-40477-1_26)
Conference or Workshop Item
Labrosse, N. et al. (2017) Preparing for the Journey: Supporting Students to Make Successful Transitions Into and Out of Taught Postgraduate Study. 10th Annual University of Glasgow Learning and Teaching Conference, Glasgow, UK, 30 Mar 2017.
Hussain, S., Sinnott, R. O. and Poet, R. (2016) A Security-Oriented Workflow Framework for Collaborative Environments. Trustcom/BigDataSE/ISPA 2016, IEEE, 23-26 Aug 2016. pp. 707-714. ISBN 9781509032051 (doi: 10.1109/TrustCom.2016.0129)
Ferdous, M. S. and Poet, R. (2013) Analysing attribute aggregation models in federated identity management. SIN '13 Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey, 26-28 Nov 2013. pp. 181-188. ISBN 9781450324984 (doi: 10.1145/2523514.2526998)
Conference Proceedings
Baalous, R. and Poet, R. (2020) Factors Affecting Users' Disclosure Decisions in Android Runtime Permissions Model. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 29 Dec 2020 - 01 Jan 2021, pp. 1113-1118. ISBN 9780738143804 (doi: 10.1109/TrustCom50675.2020.00147)
Baalous, R., Poet, R. and Storer, T. (2018) Analyzing Privacy Policies of Zero Knowledge Cloud Storage Applications on Mobile Devices. In: 2018 IEEE International Conference on Cloud Engineering (IC2E), Orlando, Florida, USA, 17-20 April 2018, pp. 218-224. ISBN 9781538650097 (doi: 10.1109/IC2E.2018.00047)
Baalous, R. and Poet, R. (2018) How Dangerous Permissions are Described in Android Apps' Privacy Policies? In: 11th International Conference on Security of Information and Networks (SIN 18), Cardiff, Wales, 10-12 Sept 2018, ISBN 9781450366083 (doi: 10.1145/3264437.3264477)
Ferdous, M. S. and Poet, R. (2017) Formalising Identity Management Protocols. In: 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 12-14 Dec 2016, pp. 137-146. ISBN 9781509043798 (doi: 10.1109/PST.2016.7906948)
Ferdous, M. S. and Poet, R. (2014) CAFS: A Framework for Context-Aware Federated Services. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 Sep 2014, pp. 130-139. ISBN 9781479965137 (doi: 10.1109/TrustCom.2014.21)
Chowdhury, S., Poet, R. and Mackenzie, L. (2014) Exploring the Guessability of Image Passwords. In: SIN 2014: 7th International Conference on Security of Information and Networks, Glasgow, UK, 09-11 Sep 2014, pp. 264-271. (doi: 10.1145/2659651.2659699)
Chowdhury, S., Poet, R. and Mackenzie, L. (2014) A Study of Mnemonic Image Passwords. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, 23-24 Jul 2014, pp. 207-214. ISBN 9781479935031 (doi: 10.1109/PST.2014.6890941)
Chowdhury, S., Poet, R. and Mackenzie, L. (2014) Passhint: Memorable and Secure Authentication. In: CHI 2014: ACM CHI Conference on Human Factors in Computing Systems, Toronto, Canada, 26 April - 1 May 2014, pp. 2917-2926. ISBN 9781450324731 (doi: 10.1145/2556288.2557153)
Aljahdali, H. and Poet, R. (2013) The affect of familiarity on the usability of recognition-based graphical password. In: TrustCom 2013, Melbourne, Australia, 16-18 Jul 2013,
Chowdhury, S., Poet, R. and Mackenzie, L. (2013) Exploring the guessability of image passwords using verbal descriptions. In: TrustCom 2013, Melbourne, Australia, 16-18 Jul 2013,
Chowdhury, S., Poet, R. and Mackenzie, L. (2013) Multicriteria optimization to select images as passwords in recognition based graphical authentication systems. In: HCI International 2013, Las Vegas, NV, USA, 21 - 26 Jul 2013, pp. 13-22. (doi: 10.1007/978-3-642-39345-7_2)
Ferdous, M.S. and Poet, R. (2013) Dynamic identity federation using security assertion markup language (SAML). In: IFIP IDMAN 2013: Policies and Research in Identity Management, London, UK, 8-9 Apr 2013,
Ferdous, M.S. and Poet, R. (2013) Portable personal identity provider in mobile phones. In: TrustCom 2013, Melbourne, Australia, 16-18 Jul 2013,
English, R. and Poet, R. (2012) The effectiveness of intersection attack countermeasures for graphical passwords. In: 11th IEEE Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), Liverpool, UK, 25-27 June 2012, (doi: 10.1109/TrustCom.2012.271)
Ferdous, M.S. and Poet, R. (2012) A comparative analysis of identity management systems. In: 7th International Workshop on Security and High Performance Computing Systems (SHPCS), Madrid, Spain, 2-6 July 2012, pp. 454-461. (doi: 10.1109/HPCSim.2012.6266958)
Poet, R. and Chowdhury, S. (2011) Comparing the usability of different levels of user involvement in producing password images. In: International Conference on Information Theory and Information Security, Hangzhou, China, 4-6 Nov 2011,
English, R. and Poet, R. (2011) Measuring the revised guessability of graphical passwords. In: 5th International Conference on Network and System Security (NSS), Milan, Italy, 6-8 Sep 2011, pp. 364-368. (doi: 10.1109/ICNSS.2011.6060031)
Chowdhury, S. and Poet, R. (2011) Comparing the usability of doodle and Mikon images to be used as authenticators in graphical authentication systems. In: 2011 International Conference on User Science and Engineering (i-USEr), Kuala Lumpur, Malaysia, 29 Nov - 1 Dec 2011, pp. 54-58. (doi: 10.1109/iUSEr.2011.6150536)
English, R. and Poet, R. (2011) Towards a metric for recognition-based graphical password security. In: 5th International Conference on Network and System Security (NSS), Milan, Italy, 6-8 Sep 2011, pp. 239-243. (doi: 10.1109/ICNSS.2011.6060007)
Jebriel, S.M. and Poet, R. (2011) Preventing shoulder-surfing when selecting pass-images in challenge set. In: International Conference on Innovations and Information Technology (IIT), Abu Dhabi, 25-27 April 2011, pp. 437-442. (doi: 10.1109/INNOVATIONS.2011.5893865)
Poet, R. and Renaud, K. (2007) A mechanism for filtering distractors for graphical passwords. In: International Graphonomics Society (IGS2007), Melbourne, Australia, 11-14 Nov 2007,