AsiaCCS A

48 papers

YearTitle / Authors
2007A
Pan Wang, Peng Ning, Douglas S. Reeves
2007A dynamic information flow model of secure systems.
Jianjun Shen, Sihan Qing
2007A framework for decentralized access control.
Meenakshi Balasubramanian, Abhishek Bhatnagar, Namit Chaturvedi, Atish Datta Chowdhury, Arul Ganesh
2007A framework for diversifying windows native APIs to tolerate code injection attacks.
Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis Hsu, Karl N. Levitt
2007A novel approach for a file-system integrity monitor tool of Xen virtual machine.
Anh-Quynh Nguyen, Yoshiyasu Takefuji
2007Addressing interoperability issues in access control models.
Vishwas Patil, Alessandro Mei, Luigi V. Mancini
2007Administration in role-based access control.
Ninghui Li, Ziqing Mao
2007An extended model of security policy for multi-applicative smart cards.
Matthias Schwan
2007Analyzing network traffic to detect self-decrypting exploit code.
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer
2007BASE: an incrementally deployable mechanism for viable IP spoofing prevention.
Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig
2007Bluetooth worm propagation: mobility pattern matters!
Guanhua Yan, Hector D. Flores, Leticia Cuellar, Nicolas W. Hengartner, Stephan J. Eidenbenz, Vincent Q. Vu
2007Combinatorial characterizations of authentication codes in verification oracle model.
Dongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild
2007Compact FPGA implementations of QUAD.
David Arditti, Côme Berbain, Olivier Billet, Henri Gilbert
2007Concurrently-secure credential ownership proofs.
Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek
2007Crocus: a steganographic filesystem manager.
Hioki Hirohisa
2007DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET.
Chinyang Henry Tseng, Shiau-Huey Wang, Karl N. Levitt
2007Detecting relay attacks with timing-based protocols.
Jason Reid, Juan Manuel González Nieto, Tee Tang, Bouchra Senadji
2007Direct static enforcement of high-level security policies.
Qihua Wang, Ninghui Li
2007Efficient techniques for realizing geo-spatial access control.
Mikhail J. Atallah, Marina Blanton, Keith B. Frikken
2007Elastic block ciphers: the basic design.
Debra L. Cook, Angelos D. Keromytis, Moti Yung
2007Extended privilege inheritance in RBAC.
M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle
2007Fuzzy extractors for continuous distributions.
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Raymond N. J. Veldhuis
2007History-based access control for XML documents.
Patrick Röder, Omid Tafreschi, Claudia Eckert
2007Incremental adaptation of XPath access control views.
Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee, Peng Liu, Wang-Chien Lee
2007Invisible designated confirmer signatures without random oracles.
Victor K. Wei
2007Keynote speech.
Mark Bregman
2007Keystroke statistical learning model for web authentication.
Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu
2007Kleptographic attacks on a cascade of mix servers.
Przemyslaw Kubiak, Miroslaw Kutylowski, Filip Zagórski
2007Managing RBAC states with transitive relations.
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
2007Managing heterogeneous network environments using an extensible policy framework.
Lawrence Teo, Gail-Joon Ahn
2007Masquerade detection based on SVM and sequence-based user commands profile.
Jeongseok Seo, Sung Deok Cha
2007Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach.
Xiaoxin Wu, David K. Y. Yau
2007Network anomaly detection based on TCM-KNN algorithm.
Yang Li, Binxing Fang, Li Guo, You Chen
2007New constructions of fuzzy identity-based encryption.
Joonsang Baek, Willy Susilo, Jianying Zhou
2007Non-intrusive IP traceback for DDoS attacks.
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay
2007On the evolution of adversary models in security protocols: from the beginning to sensor networks.
Virgil D. Gligor
2007Private stateful circuits secure against probing attacks.
Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar
2007Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007
Feng Bao, Steven Miller
2007Protecting RFID communications in supply chains.
Yingjiu Li, Xuhua Ding
2007Ring signatures: universally composable definitions and constructions.
Kazuki Yoneyama, Kazuo Ohta
2007SPECS: smart partial enciphering service for accessing encrypted files with efficient and transparent.
Tae-Kyou Park, Ilkyeun Ra
2007SecureBus: towards application-transparent trusted computing with mandatory access control.
Xinwen Zhang, Michael J. Covington, Songqing Chen, Ravi S. Sandhu
2007Specifying and analyzing security automata using CSP-OZ.
David A. Basin, Ernst-Rüdiger Olderog, Paul E. Sevinç
2007The energy cost of cryptographic key establishment in wireless sensor networks.
Johann Großschädl, Alexander Szekely, Stefan Tillich
2007Topological analysis of network attack vulnerability.
Sushil Jajodia
2007Trust management services in relational databases.
Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
2007Unconditionally secure ring authentication.
Reihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt
2007Universally composable and forward-secure RFID authentication and authenticated key exchange.
Tri Van Le, Mike Burmester, Breno de Medeiros