default search action
5th AsiaCCS 2010: Beijing, China
- Dengguo Feng, David A. Basin, Peng Liu:
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010. ACM 2010, ISBN 978-1-60558-936-7
Keynote addresses
- Pierangela Samarati, Sabrina De Capitani di Vimercati:
Data protection in outsourcing scenarios: issues and directions. 1-14 - Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld:
A lattice-based approach to mashup security. 15-23
Privacy
- Chih-Cheng Chang, Brian Thompson, Wendy Hui Wang, Danfeng Yao:
Towards publishing recommendation data with predictive anonymization. 24-35 - Lei Zhang, Alexander Brodsky, Sushil Jajodia:
Restoring compromised privacy in micro-data disclosure. 36-47 - Mikhail J. Atallah, Keith B. Frikken:
Securely outsourcing linear algebra computations. 48-59
Applied cryptography
- Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui Ren:
Attribute-based signature and its applications. 60-69 - Benoît Libert, Moti Yung:
Dynamic fully forward-secure group signatures. 70-81 - Yu Chen, Manuel Charlemagne, Zhi Guan, Jian-bin Hu, Zhong Chen:
Identity-based encryption based on DHIES. 82-88
Network security
- Fernando Sanchez, Zhenhai Duan:
Region-based BGP announcement filtering for improved BGP security. 89-100 - Si-Yu Huang, Ching-Hao Mao, Hahn-Ming Lee:
Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection. 101-111 - Tuan Manh Vu, Reihaneh Safavi-Naini, Carey Williamson:
Securing wireless sensor networks against large-scale node capture attacks. 112-123
Systems security -- I
- Chengyu Song, Jianwei Zhuge, Xinhui Han, Zhiyuan Ye:
Preventing drive-by download via inter-module communication monitoring. 124-134 - Marco Balduzzi, Manuel Egele, Engin Kirda, Davide Balzarotti, Christopher Kruegel:
A solution for the automated detection of clickjacking attacks. 135-144 - Yves Younan, Pieter Philippaerts, Lorenzo Cavallaro, R. Sekar, Frank Piessens, Wouter Joosen:
PAriCheck: an efficient pointer arithmetic checker for C programs. 145-156
Access control -- I
- Enrico Scalavino, Giovanni Russello, Rudi Ball, Vaibhav Gowadia, Emil C. Lupu:
An opportunistic authority evaluation scheme for data security in crisis management scenarios. 157-168 - Adam J. Lee, Ting Yu, Yann Le Gall:
Effective trust management through a hybrid logical and relational approach. 169-179 - Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu, Keith Irwin:
Toward practical authorization-dependent user obligation systems. 180-191
Security protocols
- Siva Anantharaman, Hai Lin, Christopher Lynch, Paliath Narendran, Michaël Rusinowitch:
Cap unification: application to protocol security modulo homomorphic encryption. 192-203 - Adonis P. H. Fung, K. W. Cheung:
SSLock: sustaining the trust on entities brought by SSL. 204-213 - Klaas Ole Kürtz, Henning Schnoor, Thomas Wilke:
Computationally secure two-round authenticated message exchange. 214-225 - Guan Wang, Tongbo Luo, Michael T. Goodrich, Wenliang Du, Zutao Zhu:
Bureaucratic protocols for secure two-party sorting, selection, and permuting. 226-237
Access control -- II
- Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu:
A logic for authorization provenance. 238-249 - Qun Ni, Elisa Bertino, Jorge Lobo:
Risk-based access control systems built on fuzzy inferences. 250-260 - Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou:
Attribute based data sharing with attribute revocation. 261-270
Systems security -- II
- Byoungyoung Lee, Yuna Kim, Jong Kim:
binOb+: a framework for potent and stealthy binary obfuscation. 271-281 - Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen:
Secure provenance: the essential of bread and butter of data forensics in cloud computing. 282-292 - Juan Du, Wei Wei, Xiaohui Gu, Ting Yu:
RunTest: assuring integrity of dataflow processing in cloud computing infrastructures. 293-304
Short papers -- I
- Zutao Zhu, Wenliang Du:
K-anonymous association rule hiding. 305-309 - Ning Shang, Gabriel Ghinita, Yongbin Zhou, Elisa Bertino:
Controlling data disclosure in computational PIR protocols. 310-313 - Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang:
Cryptographic role-based security mechanisms based on role-key hierarchy. 314-319 - Anna Cinzia Squicciarini, Federica Paci, Smitha Sundareswaran:
PriMa: an effective privacy protection mechanism for social networks. 320-323 - Brian Wongchaowart, Adam J. Lee:
Oblivious enforcement of hidden information release policies. 324-327
Short papers -- II
- Mohammad Nauman, Sohail Khan, Xinwen Zhang:
Apex: extending Android permission model and enforcement with user-defined runtime constraints. 328-332 - Hung-Yuan Hsu, Sencun Zhu, Ali R. Hurson:
A hotspot-based protocol for attack traceback in mobile ad hoc networks. 333-336 - Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng:
Practical ID-based encryption for wireless sensor network. 337-340 - Tansu Alpcan, Cengiz Örencik, Albert Levi, Erkay Savas:
A game theoretic model for digital identity and trust in online communities. 341-344 - Peter Matthews, Cliff Changchun Zou:
Scene tagging: image-based CAPTCHA using image composition and object relationships. 345-350
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.