| 2010 | A game theoretic model for digital identity and trust in online communities. Tansu Alpcan, Cengiz Örencik, Albert Levi, Erkay Savas |
| 2010 | A hotspot-based protocol for attack traceback in mobile ad hoc networks. Hung-Yuan Hsu, Sencun Zhu, Ali R. Hurson |
| 2010 | A lattice-based approach to mashup security. Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld |
| 2010 | A logic for authorization provenance. Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu |
| 2010 | A solution for the automated detection of clickjacking attacks. Marco Balduzzi, Manuel Egele, Engin Kirda, Davide Balzarotti, Christopher Kruegel |
| 2010 | An opportunistic authority evaluation scheme for data security in crisis management scenarios. Enrico Scalavino, Giovanni Russello, Rudi Ball, Vaibhav Gowadia, Emil C. Lupu |
| 2010 | Apex: extending Android permission model and enforcement with user-defined runtime constraints. Mohammad Nauman, Sohail Khan, Xinwen Zhang |
| 2010 | Attribute based data sharing with attribute revocation. Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou |
| 2010 | Attribute-based signature and its applications. Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui Ren |
| 2010 | Bureaucratic protocols for secure two-party sorting, selection, and permuting. Guan Wang, Tongbo Luo, Michael T. Goodrich, Wenliang Du, Zutao Zhu |
| 2010 | Cap unification: application to protocol security modulo homomorphic encryption. Siva Anantharaman, Hai Lin, Christopher Lynch, Paliath Narendran, Michaël Rusinowitch |
| 2010 | Computationally secure two-round authenticated message exchange. Klaas Ole Kürtz, Henning Schnoor, Thomas Wilke |
| 2010 | Controlling data disclosure in computational PIR protocols. Ning Shang, Gabriel Ghinita, Yongbin Zhou, Elisa Bertino |
| 2010 | Cryptographic role-based security mechanisms based on role-key hierarchy. Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang |
| 2010 | Data protection in outsourcing scenarios: issues and directions. Pierangela Samarati, Sabrina De Capitani di Vimercati |
| 2010 | Dynamic fully forward-secure group signatures. Benoît Libert, Moti Yung |
| 2010 | Effective trust management through a hybrid logical and relational approach. Adam J. Lee, Ting Yu, Yann Le Gall |
| 2010 | Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection. Si-Yu Huang, Ching-Hao Mao, Hahn-Ming Lee |
| 2010 | Identity-based encryption based on DHIES. Yu Chen, Manuel Charlemagne, Zhi Guan, Jian-bin Hu, Zhong Chen |
| 2010 | K-anonymous association rule hiding. Zutao Zhu, Wenliang Du |
| 2010 | Oblivious enforcement of hidden information release policies. Brian Wongchaowart, Adam J. Lee |
| 2010 | PAriCheck: an efficient pointer arithmetic checker for C programs. Yves Younan, Pieter Philippaerts, Lorenzo Cavallaro, R. Sekar, Frank Piessens, Wouter Joosen |
| 2010 | Practical ID-based encryption for wireless sensor network. Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng |
| 2010 | Preventing drive-by download via inter-module communication monitoring. Chengyu Song, Jianwei Zhuge, Xinhui Han, Zhiyuan Ye |
| 2010 | PriMa: an effective privacy protection mechanism for social networks. Anna Cinzia Squicciarini, Federica Paci, Smitha Sundareswaran |
| 2010 | Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010 Dengguo Feng, David A. Basin, Peng Liu |
| 2010 | Region-based BGP announcement filtering for improved BGP security. Fernando Sanchez, Zhenhai Duan |
| 2010 | Restoring compromised privacy in micro-data disclosure. Lei Zhang, Alexander Brodsky, Sushil Jajodia |
| 2010 | Risk-based access control systems built on fuzzy inferences. Qun Ni, Elisa Bertino, Jorge Lobo |
| 2010 | RunTest: assuring integrity of dataflow processing in cloud computing infrastructures. Juan Du, Wei Wei, Xiaohui Gu, Ting Yu |
| 2010 | SSLock: sustaining the trust on entities brought by SSL. Adonis P. H. Fung, K. W. Cheung |
| 2010 | Scene tagging: image-based CAPTCHA using image composition and object relationships. Peter Matthews, Cliff Changchun Zou |
| 2010 | Secure provenance: the essential of bread and butter of data forensics in cloud computing. Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen |
| 2010 | Securely outsourcing linear algebra computations. Mikhail J. Atallah, Keith B. Frikken |
| 2010 | Securing wireless sensor networks against large-scale node capture attacks. Tuan Manh Vu, Reihaneh Safavi-Naini, Carey Williamson |
| 2010 | Toward practical authorization-dependent user obligation systems. Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu, Keith Irwin |
| 2010 | Towards publishing recommendation data with predictive anonymization. Chih-Cheng Chang, Brian Thompson, Wendy Hui Wang, Danfeng Yao |
| 2010 | binOb+: a framework for potent and stealthy binary obfuscation. Byoungyoung Lee, Yuna Kim, Jong Kim |