| 2007 | A Decomposition Strategy Based Trusted Computing Method for Cooperative Control Problem Faced with Communication Constraints. Shieh-Shing Lin |
| 2007 | A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid. Yunfa Li, Hai Jin, Deqing Zou, Jieyun Chen, Zongfen Han |
| 2007 | A Distributed Self-healing Data Store. Wolfgang Trumler, Jörg Ehrig, Andreas Pietzowski, Benjamin Satzger, Theo Ungerer |
| 2007 | A Fuzzy Logic Approach for Secure and Fault Tolerant Grid Job Scheduling. Congfeng Jiang, Cheng Wang, Xiaohu Liu, Yinghui Zhao |
| 2007 | A Generic and Modular System Architecture for Trustworthy, Autonomous Applications. George Brancovici, Christian Müller-Schloer |
| 2007 | A New One-Way Isolation File-Access Method at the Granularity of a Disk-Block. Wenyuan Kuang, Yaoxue Zhang, Li Wei, Nan Xia, Guangbin Xu, Yue-Zhi Zhou |
| 2007 | A Prediction-Based Fair Replication Algorithm in Structured P2P Systems. Xianshu Zhu, Dafang Zhang, Wenjia Li, Kun Huang |
| 2007 | A Property-Based Technique for Tolerating Faults in Bloom Filters for Deep Packet Inspection. Yoon-Hwa Choi, Myeong-Hyeon Lee |
| 2007 | A Secret-Key Exponential Key Agreement Protocol with Smart Cards. Eun-Jun Yoon, Kee-Young Yoo |
| 2007 | A Secure DRM Framework for User's Domain and Key Management. Jin-Heung Lee, Sanggon Lee, Sanguk Shin |
| 2007 | A Trust Evolution Model for P2P Networks. Yuan Wang, Ye Tao, Ping Yu, Feng Xu, Jian Lü |
| 2007 | A Wearable System for Outdoor Running Workout State Recognition and Course Provision. Katsuhiro Takata, Masataka Tanaka, Jianhua Ma, Runhe Huang, Bernady O. Apduhan, Norio Shiratori |
| 2007 | A Worm Containment Model Based on Neighbor-Alarm. Jianming Fu, Binglan Chen, Huanguo Zhang |
| 2007 | AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless Networks. Zhi (Judy) Fu, Minho Shin, John C. Strassner, Nitin Jain, Vishnu Ram, William A. Arbaugh |
| 2007 | An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System. Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai |
| 2007 | An Adaptive Trust Control Model for a Trustworthy Component Software Platform. Zheng Yan, Christian Prehofer |
| 2007 | An Approach to a Trustworthy System Architecture Using Virtualization. Frederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert |
| 2007 | An Architecture for Self-healing Autonomous Object Groups. Hein Meling |
| 2007 | An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack. DongHyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim, Dongho Won |
| 2007 | An Enhanced DGIDE Platform for Intrusion Detection. Fang-Yie Leu, Fuu-Cheng Jiang, Ming-Chang Li, Jia-Chun Lin |
| 2007 | An Intelligent Home System as a Development and Test Platform for Ubiquitous Computing. Keith C. C. Chan |
| 2007 | Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings Bin Xiao, Laurence Tianruo Yang, Jianhua Ma, Christian Müller-Schloer, Yu Hua |
| 2007 | Biology as Inspiration Towards a Novel Service Life-Cycle. David Linner, Heiko Pfeffer, Ilja Radusch, Stephan Steglich |
| 2007 | Building Autonomic and Secure Service Oriented Architectures with MAWeS. Valentina Casola, Emilio Pasquale Mancini, Nicola Mazzocca, Massimiliano Rak, Umberto Villano |
| 2007 | Calculating Trust Using Aggregation Rules in Social Networks. Sanguk Noh |
| 2007 | Cooperative Component Testing Architecture in Collaborating Network Environment. Gaeil An, Joon S. Park |
| 2007 | Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection. Qianhong Wu, Willy Susilo, Yi Mu, Bo Qin |
| 2007 | Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. Fanyu Kong, Jia Yu, Baodong Qin, Daxing Li |
| 2007 | CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks. Ruichuan Chen, Xuan Zhao, Liyong Tang, Jian-bin Hu, Zhong Chen |
| 2007 | Defending Against Jamming Attacks in Wireless Local Area Networks. Wei Chen, Danwei Chen, Guozi Sun, Yingzhou Zhang |
| 2007 | Design of Service-Based Systems with Adaptive Tradeoff Between Security and Service Delay. Stephen S. Yau, Min Yan, Dazhi Huang |
| 2007 | Efficient Identity-Based Signcryption Scheme for Multiple Receivers. Yong Yu, Bo Yang, Xinyi Huang, Mingwu Zhang |
| 2007 | Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing. Mooseop Kim, Youngse Kim, JaeCheol Ryou, Sungik Jun |
| 2007 | Enhancing Grid Security Using Trusted Virtualization. Hans Löhr, Harigovind V. Ramasamy, Ahmad-Reza Sadeghi, Stefan Schulz, Matthias Schunter, Christian Stüble |
| 2007 | Establishing Trust Between Mail Servers to Improve Spam Filtering. Jimmy McGibney, Dmitri Botvich |
| 2007 | Final Fantasy - Securing On-Line Gaming with Trusted Computing. Shane Balfe, Anish Mohammed |
| 2007 | Formal Analysis of Secure Bootstrap in Trusted Computing. Shuyi Chen, Yingyou Wen, Hong Zhao |
| 2007 | Generating Simplified Regular Expression Signatures for Polymorphic Worms. Yong Tang, Xicheng Lu, Bin Xiao |
| 2007 | Identity-Based Proxy Signature from Pairings. Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang |
| 2007 | Improved and Trustworthy Detection Scheme with Low Complexity in VBLAST System. So-Young Yeo, Myung-Sun Baek, Hyoung-Kyu Song |
| 2007 | Key Establishment Scheme for Sensor Networks with Low Communication Cost. Yong Ho Kim, Hwaseong Lee, Jong Hyuk Park, Laurence Tianruo Yang, Dong Hoon Lee |
| 2007 | Malicious Codes Detection Based on Ensemble Learning. Boyun Zhang, Jianping Yin, Jingbo Hao, Dingxing Zhang, Shulin Wang |
| 2007 | Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust. Emmanuel Bresson, Mark Manulis |
| 2007 | Middleware Based Context Management for the Component-Based Pervasive Computing. Di Zheng, Jun Wang, Yan Jia, Weihong Han, Peng Zou |
| 2007 | Novel Remote User Authentication Scheme Using Bilinear Pairings. Chen Yang, Wenping Ma, Xinmei Wang |
| 2007 | On the Homonymous Role in Role-Based Discretionary Access Control. Kai Ouyang, Xiaowen Chu, Yixin Jiang, Hsiao-Hwa Chen, Jiangchuan Liu |
| 2007 | Ontology Based Hybrid Access Control for Automatic Interoperation. Yuqing Sun, Peng Pan, Ho-fung Leung, Bin Shi |
| 2007 | Provably Secure Identity-Based Threshold Unsigncryption Scheme. Bo Yang, Yong Yu, Fagen Li, Ying Sun |
| 2007 | Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding. Kuo-Lung Hung, Chin-Chen Chang |
| 2007 | Remarks on Self-organization and Trust in Organic Computing Systems. Hartmut Schmeck |
| 2007 | Research on Cost-Sensitive Learning in One-Class Anomaly Detection Algorithms. Jun Luo, Li Ding, Zhisong Pan, Guiqiang Ni, Guyu Hu |
| 2007 | SPA Countermeasure Based on Unsigned Left-to-Right Recodings. Sung-Kyoung Kim, Dong-Guk Han, Howon Kim, Kyoil Chung, Jongin Lim |
| 2007 | Schedulability Analysis of the Fault-Tolerant Hard Real-Time Tasks with Limited Priority Levels. Jun Li, Fumin Yang, Gang Tu, Wan-hua Cao, Yansheng Lu |
| 2007 | Service-Context Knowledge-Based Solution for Autonomic Adaptation. Marcel Cremene, Michel Riveill |
| 2007 | Stepping-Stone Detection Via Request-Response Traffic Analysis. Shou-Hsuan Stephen Huang, Robert Lychev, Jianhua Yang |
| 2007 | Towards Trustworthy Resource Selection: A Fuzzy Reputation Aggregation Approach. Chunmei Gui, Quanyuan Wu, Huaimin Wang |
| 2007 | TransCom: A Virtual Disk Based Self-management System. Li Wei, Yaoxue Zhang, Yue-Zhi Zhou |
| 2007 | ZigBee Security Using Identity-Based Cryptography. Son Thanh Nguyen, Chunming Rong |