AsiaCCS A

38 papers

YearTitle / Authors
2010A game theoretic model for digital identity and trust in online communities.
Tansu Alpcan, Cengiz Örencik, Albert Levi, Erkay Savas
2010A hotspot-based protocol for attack traceback in mobile ad hoc networks.
Hung-Yuan Hsu, Sencun Zhu, Ali R. Hurson
2010A lattice-based approach to mashup security.
Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld
2010A logic for authorization provenance.
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
2010A solution for the automated detection of clickjacking attacks.
Marco Balduzzi, Manuel Egele, Engin Kirda, Davide Balzarotti, Christopher Kruegel
2010An opportunistic authority evaluation scheme for data security in crisis management scenarios.
Enrico Scalavino, Giovanni Russello, Rudi Ball, Vaibhav Gowadia, Emil C. Lupu
2010Apex: extending Android permission model and enforcement with user-defined runtime constraints.
Mohammad Nauman, Sohail Khan, Xinwen Zhang
2010Attribute based data sharing with attribute revocation.
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
2010Attribute-based signature and its applications.
Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui Ren
2010Bureaucratic protocols for secure two-party sorting, selection, and permuting.
Guan Wang, Tongbo Luo, Michael T. Goodrich, Wenliang Du, Zutao Zhu
2010Cap unification: application to protocol security modulo homomorphic encryption.
Siva Anantharaman, Hai Lin, Christopher Lynch, Paliath Narendran, Michaël Rusinowitch
2010Computationally secure two-round authenticated message exchange.
Klaas Ole Kürtz, Henning Schnoor, Thomas Wilke
2010Controlling data disclosure in computational PIR protocols.
Ning Shang, Gabriel Ghinita, Yongbin Zhou, Elisa Bertino
2010Cryptographic role-based security mechanisms based on role-key hierarchy.
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
2010Data protection in outsourcing scenarios: issues and directions.
Pierangela Samarati, Sabrina De Capitani di Vimercati
2010Dynamic fully forward-secure group signatures.
Benoît Libert, Moti Yung
2010Effective trust management through a hybrid logical and relational approach.
Adam J. Lee, Ting Yu, Yann Le Gall
2010Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection.
Si-Yu Huang, Ching-Hao Mao, Hahn-Ming Lee
2010Identity-based encryption based on DHIES.
Yu Chen, Manuel Charlemagne, Zhi Guan, Jian-bin Hu, Zhong Chen
2010K-anonymous association rule hiding.
Zutao Zhu, Wenliang Du
2010Oblivious enforcement of hidden information release policies.
Brian Wongchaowart, Adam J. Lee
2010PAriCheck: an efficient pointer arithmetic checker for C programs.
Yves Younan, Pieter Philippaerts, Lorenzo Cavallaro, R. Sekar, Frank Piessens, Wouter Joosen
2010Practical ID-based encryption for wireless sensor network.
Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng
2010Preventing drive-by download via inter-module communication monitoring.
Chengyu Song, Jianwei Zhuge, Xinhui Han, Zhiyuan Ye
2010PriMa: an effective privacy protection mechanism for social networks.
Anna Cinzia Squicciarini, Federica Paci, Smitha Sundareswaran
2010Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010
Dengguo Feng, David A. Basin, Peng Liu
2010Region-based BGP announcement filtering for improved BGP security.
Fernando Sanchez, Zhenhai Duan
2010Restoring compromised privacy in micro-data disclosure.
Lei Zhang, Alexander Brodsky, Sushil Jajodia
2010Risk-based access control systems built on fuzzy inferences.
Qun Ni, Elisa Bertino, Jorge Lobo
2010RunTest: assuring integrity of dataflow processing in cloud computing infrastructures.
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
2010SSLock: sustaining the trust on entities brought by SSL.
Adonis P. H. Fung, K. W. Cheung
2010Scene tagging: image-based CAPTCHA using image composition and object relationships.
Peter Matthews, Cliff Changchun Zou
2010Secure provenance: the essential of bread and butter of data forensics in cloud computing.
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
2010Securely outsourcing linear algebra computations.
Mikhail J. Atallah, Keith B. Frikken
2010Securing wireless sensor networks against large-scale node capture attacks.
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey Williamson
2010Toward practical authorization-dependent user obligation systems.
Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu, Keith Irwin
2010Towards publishing recommendation data with predictive anonymization.
Chih-Cheng Chang, Brian Thompson, Wendy Hui Wang, Danfeng Yao
2010binOb+: a framework for potent and stealthy binary obfuscation.
Byoungyoung Lee, Yuna Kim, Jong Kim