TrustCom B

131 papers

YearTitle / Authors
201413th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014
2014A Clustering-Based Privacy-Preserving Method for Uncertain Trajectory Data.
Fucai Zhu, Xingyang He, Shuang Wang, Jian Xu, Mingwei Wang, Lina Wu
2014A Compact Hardware Implementation of SM3 Hash Function.
Tianyong Ao, Zhangqing He, Jinli Rao, Kui Dai, Xuecheng Zou
2014A Evaluation Method for Web Service with Large Numbers of Historical Records.
Lianyong Qi, Jiancheng Ni, Xiaona Xia, Chao Yan, Hua Wang, Wanli Huang
2014A High Speed Lossless Compression Algorithm Based on CPU and GPU Hybrid Platform.
Bin Zhou, Hai Jin, Ran Zheng
2014A High-Performance Distributed Certificate Revocation Scheme for Mobile Ad Hoc Networks.
Chongxian Guo, Huaqiang Xu, Lei Ju, Zhiping Jia, Jihai Xu
2014A Lightweight Anonymous Mobile Shopping Scheme Based on DAA for Trusted Mobile Platform.
Bo Yang, Dengguo Feng, Yu Qin
2014A Load Balancing Strategy of SDN Controller Based on Distributed Decision.
Yuanhao Zhou, Mingfa Zhu, Limin Xiao, Li Ruan, Wenbo Duan, Deguo Li, Rui Liu, Mingming Zhu
2014A Machine Learning Based Trust Evaluation Framework for Online Social Networks.
Kang Zhao, Li Pan
2014A Novel Feature Selection Approach for Intrusion Detection Data Classification.
Mohammed A. Ambusaidi, Xiangjian He, Zhiyuan Tan, Priyadarsi Nanda, Liang Fu Lu, Upasana T. Nagar
2014A Novel Public Key Encryption Scheme for Large Image.
Lingjiao Chen, Xinji Chen, Zhigang Peng
2014A Practically Optimized Implementation of Attribute Based Cryptosystems.
Chunqiang Hu, Fan Zhang, Tao Xiang, Hongjuan Li, Xiao Xiao, Guilin Huang
2014A Privacy-Enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures.
Sanami Nakagawa, Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, Yusuke Sakai
2014A Proposal for a Reference Architecture for Long-Term Archiving, Preservation, and Retrieval of Big Data.
Phillip Viana, Liria M. Sato
2014A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment.
Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, Zhiyuan Tan, Ren Ping Liu
2014A Secure Authentication Protocol for IP-Based Wireless Sensor Communications Using the Location/ID Split Protocol (LISP).
Ali Hussein Raheem, Aboubaker Lasebae, Jonathan Loo
2014A Semantic Knowledge Base Construction Method for Information Security.
Yuangang Yao, Xiaoyu Ma, Hui Liu, Jin Yi, Xianghui Zhao, Lin Liu
2014A Stateful Mechanism for the Tree-Rule Firewall.
Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan
2014A Study on Recursive Neural Network Based Sentiment Classification of Sina Weibo.
Chen Fu, Bai Xue, Zhan Shaobin
2014A Survey of Security Network Coding toward Various Attacks.
Shixiong Yao, Jing Chen, Ruiying Du, Lan Deng, Chiheng Wang
2014AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security.
Ahmed Taha, Rubén Trapero, Jesus Luna, Neeraj Suri
2014Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit.
Mu Yang, Yijun Yu, Arosha K. Bandara, Bashar Nuseibeh
2014Adding Privacy to Multicast DNS Service Discovery.
Daniel Kaiser, Marcel Waldvogel
2014Aeromancer: A Workflow Manager for Large-Scale MapReduce-Based Scientific Workflows.
Mohamed Nabeel, Nabanita Maji, Jing Zhang, Nataliya Timoshevskaya, Wu-chun Feng
2014An Effective Path Load Balancing Mechanism Based on SDN.
Jun Li, Xiangqing Chang, Yongmao Ren, Zexin Zhang, Guodong Wang
2014An Improved Image File Storage Method Using Data Deduplication.
Zhou Lei, Zhaoxin Li, Yu Lei, Yanling Bi, Luokai Hu, Wenfeng Shen
2014An On-Line Anomaly Detection Method Based on a New Stationary Metric - Entropy-Ratio.
Ziyu Wang, Jiahai Yang, Fuliang Li
2014Analysis of the Count-Min Sketch Based Anomaly Detection Scheme in WSN.
Guorui Li, Ying Liu, Ying Wang
2014Anonymous Proxy Signature with Restricted Traceability.
Jiannan Wei, Guomin Yang, Yi Mu
2014AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps.
Julian Schütte, Dennis Titze, José María de Fuentes
2014Attack Tree Based Android Malware Detection with Hybrid Analysis.
Shuai Zhao, Xiaohong Li, Guangquan Xu, Lei Zhang, Zhiyong Feng
2014Attacks on Physically-Embedded Data Encryption for Embedded Devices.
Chaohui Du, Guoqiang Bai
2014Automated User Profiling in Location-Based Mobile Messaging Applications.
Yao Cheng, Chang Xu, Yi Yang, Lingyun Ying, Purui Su, Dengguo Feng
2014Automatically Exploiting Potential Component Leaks in Android Applications.
Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon
2014BIBRM: A Bayesian Inference Based Road Message Trust Model in Vehicular Ad Hoc Networks.
Guanghao Wang, Yue Wu
2014BIG DATA: Preconditions to Productivity.
Steve Hallman, Jasur Rakhimov, Michel Plaisent, Prosper Bernard
2014Bargaining-Based Dynamic Decision for Cooperative Authentication in MANETs.
Licai Liu, Lihua Yin, Yunchuan Guo, Bingxing Fang
2014Big Data Analyses for Collective Opinion Elicitation in Social Networks.
Yingxu Wang, Victor J. Wiebe
2014CAFS: A Framework for Context-Aware Federated Services.
Md Sadek Ferdous, Ron Poet
2014Challenge Set Designs and User Guidelines for Usable and Secured Recognition-Based Graphical Passwords.
Hani Moaiteq Aljahdali, Ron Poet
2014Cognitive Adaptive Access-Control System for a Secure Locator/Identifier Separation Context.
Yuanlong Cao, Jianfeng Guan, Changqiao Xu, Wei Quan, Hongke Zhang
2014Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager.
Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron
2014Computation Integrity Measurement Based on Branch Transfer.
Jianming Fu, Yan Lin, Xu Zhang, Pengwei Li
2014Continuous Certification of Non-repudiation in Cloud Storage Services.
Maria Krotsiani, George Spanoudakis
2014Convergence of True Cooperations in Bayesian Reputation Game.
Jooyoung Lee, Jae C. Oh
2014Crowd Sensing of Urban Emergency Events Based on Social Media Big Data.
Zheng Xu, Hui Zhang, Yunhuai Liu, Lin Mei
2014Data Interface All-iN-A-Place (DIANA) for Big Data.
Frank Zhigang Wang, Theo Dimitrakos, Na Helian, Sining Wu, Yuhui Deng, Ling Li, Rodric Yates
2014Data Mining Application of Decision Trees for Student Profiling at the Open University of China.
Wilton W. T. Fok, Haohua Chen, Jiaqu Yi, Sizhe Li, H. H. Au Yeung, Wang Ying, Liu Fang
2014Data-centric Rogue Node Detection in VANETs.
Kamran Zaidi, Milos Milojevic, Veselin Rakocevic, Muttukrishnan Rajarajan
2014Defensor: Lightweight and Efficient Security-Enhanced Framework for Android.
Xuerui Pan, Yibing Zhongyang, Zhi Xin, Bing Mao, Hao Huang
2014Design and Analysis of a New Feature-Distributed Malware.
Byungho Min, Vijay Varadharajan
2014Detect Android Malware Variants Using Component Based Topology Graph.
Tong Shen, Yibing Zhongyang, Zhi Xin, Bing Mao, Hao Huang
2014Detection of Android Malicious Apps Based on the Sensitive Behaviors.
Daiyong Quan, Lidong Zhai, Fan Yang, Peng Wang
2014Digital Trust - Trusted Computing and Beyond: A Position Paper.
Raja Naeem Akram, Ryan K. L. Ko
2014Efficient Traceable Attribute-Based Signature.
Shenglong Ding, Yiming Zhao, Yuyang Liu
2014Efficiently Attribute-Based Access Control for Mobile Cloud Storage System.
Zhiquan Lv, Jialin Chi, Min Zhang, Dengguo Feng
2014Emergency Key Rollover in DNSSEC.
Zheng Wang, Liyuan Xiao
2014Encrypted Keyword Search Mechanism Based on Bitmap Index for Personal Storage Services.
Yong Ho Hwang, Jae Woo Seo, Il Joo Kim
2014Encrypted Program Execution.
Dmytro Zhuravlev, Ihor Samoilovych, Roman Orlovskyi, Ievgen V. Bondarenko, Yaroslav Lavrenyuk
2014Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud.
Quang Do, Ben Martini, Kim-Kwang Raymond Choo
2014EqualVisor: Providing Memory Protection in an Untrusted Commodity Hypervisor.
Liang Deng, Qingkai Zeng, Weiguang Wang, Yao Liu
2014Escrow: A Large-Scale Web Vulnerability Assessment Tool.
Baden Delamore, Ryan K. L. Ko
2014Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation.
Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan
2014FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing.
Yu Zhang, Jing Chen, Ruiying Du, Lan Deng, Yang Xiang, Qing Zhou
2014FedLoop: Looping on Federated MapReduce.
Chunyu Wang, Tzu-Li Tai, Kuan-Chieh Huang, Tse-En Liu, Jyh-Biau Chang, Ce-Kuen Shieh
2014Garbling in Reverse Order.
Tommi Meskanen, Valtteri Niemi, Noora Nieminen
2014HBaseSpatial: A Scalable Spatial Data Storage Based on HBase.
Ningyu Zhang, Guozhou Zheng, Huajun Chen, Jiaoyan Chen, Xi Chen
2014High Performance FPGA Implementation of Elliptic Curve Cryptography over Binary Fields.
Shuai Liu, Lei Ju, Xiaojun Cai, Zhiping Jia, Zhiyong Zhang
2014Identifying P2P Network Activities on Encrypted Traffic.
Xiaolei Wang, Jie He, Yuexiang Yang
2014Improved 2DLDA Algorithm and Its Application in Face Recognition.
Dong Wang, Shunfang Wang
2014In-Map/In-Reduce: Concurrent Job Execution in MapReduce.
Muhammad Idris, Shujaat Hussain, Sungyoung Lee
2014Integrity Levels: A New Paradigm for Protecting Computing Systems.
Christipher Jenkins, Lyndon Pierson
2014Integrity Verification and Secure Loading of Remote Binaries for Microkernel-Based Runtime Environments.
Michael Weiß, Steffen Wagner, Roland Hellman, Sascha Wessel
2014JVM-Based Dynamic Attestation in Cloud Computing.
Haihe Ba, Zhiying Wang, Jiangchun Ren, Huaizhe Zhou
2014Lightweight Security Middleware to Detect Malicious Content in NFC Tags or Smart Posters.
Sufian Hameed, Bilal Hameed, Syed Atyab Hussain, Waqas Khalid
2014Long Term Tracking and Characterization of P2P Botnet.
Jia Yan, Lingyun Ying, Yi Yang, Purui Su, Dengguo Feng
2014MapReduce for Large-Scale Monitor Data Analyses.
Jianwei Ding, Yingbo Liu, Li Zhang, Jianmin Wang
2014Mining Specification of Insecure Browser Extension Behavior.
Hongbin Pei, Xiaohong Li, Guangquan Xu, Zhiyong Feng
2014Modeling Degrees of Fairness for Collaborations.
Florian Volk, Maria Pelevina, Sheikh Mahbub Habib, Sascha Hauke, Max Mühlhäuser
2014Modeling of Data Provenance on Space and Time Based on OPM.
Jiehua Kang, Guoyan Xu
2014Multi-dimensions of Developer Trustworthiness Assessment in OSS Community.
Yu Bai, Gang Yin, Huaimin Wang
2014Multiplicative Attributes Graph Approach for Persistent Authentication in Single-Sign-On Mobile Systems.
Uthpala Subodhani Premarathne, Ibrahim Khalil
2014Network Traffic Anomaly Detection Using Adaptive Density-Based Fuzzy Clustering.
Duo Liu, Chung-Horng Lung, Nabil Seddigh, Biswajit Nandy
2014ONHelp: Components in Building Secure Cloud Based on OpenNebula.
Kao Zhao, Hai Jin, Deqing Zou, Weiqi Dai
2014On Energy Efficient Scheduling and Load Distribution Based on Renewable Energy for Wireless Mesh Network in Disaster Area.
Meng Li, Hiroki Nishiyama, Yasunori Owada, Kiyoshi Hamaguchi
2014On the Application and Performance of MongoDB for Climate Satellite Data.
Parinaz Ameri, Udo Grabowski, Jörg Meyer, Achim Streit
2014One Kind of Cross-Domain DAA Scheme from Bilinear Mapping.
Xiaoming Wang, Heyou Cheng, Ruihua Zhang
2014Overhead-Free In-Place Recovery Scheme for XOR-Based Storage Codes.
Ximing Fu, Zhiqing Xiao, Shenghao Yang
2014Performance Analysis on M2M Communication Network Based on Stochastic Network Calculus.
Tao Zhou, Quan Wang, Gao-Cai Wang
2014Performance Evaluation of the SSD-Based Swap System for Big Data Processing.
Jaehun Lee, Sungmin Park, Minsoo Ryu, Sooyong Kang
2014Personal Data Access Based on Trust Assessment in Mobile Social Networking.
Zheng Yan, Xueyun Li, Raimo Kantola
2014Practical Assessment of Biba Integrity for TCG-Enabled Platforms.
Roberto Sassu, Gianluca Ramunno, Antonio Lioy
2014Privacy Aware Non-linear Support Vector Machine for Multi-source Big Data.
Yunmei Lu, Piyaphol Phoungphol, Yanqing Zhang
2014Private Outsourcing of Polynomial Functions.
Peili Li, Haixia Xu, Jiaqi Hong
2014PrivateDroid: Private Browsing Mode for Android.
Su Mon Kywe, Christopher B. Landis, Yutong Pei, Justin Satterfield, Yuan Tian, Patrick Tague
2014Proofs of Ownership and Retrievability in Cloud Storage.
Ruiying Du, Lan Deng, Jing Chen, Kun He, Minghui Zheng
2014Public-Key Encryption Resilient against Linear Related-Key Attacks Revisited.
Hui Cui, Yi Mu, Man Ho Au
2014Reaching Agreement in Security Policy Negotiation.
Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey
2014Remembrance of Local Information Status for Enforcing Robustness of Policy-Exchanged Strategies for Trust Negotiation.
Yunxi Zhang, Darren Mundy
2014Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept.
Ben Martini, Kim-Kwang Raymond Choo
2014Research of Provenance Storage in Cloud Computing Environment.
Zhangxuan Luo, Guoyan Xu
2014SARAH - Statistical Analysis for Resource Allocation in Hadoop.
Bruce Martin
2014SIMS: A Comprehensive Approach for a Secure Instant Messaging Sifter.
Günter Fahrnberger
2014Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR.
Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes
2014Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed Domain.
Conghuan Ye, Zenggang Xiong, Yaoming Ding, Jiping Li, Guangwei Wang, Xuemin Zhang, Kaibing Zhang
2014Secure and Privacy-Friendly Public Key Generation and Certification.
Fábio Borges, Leonardo A. Martucci, Filipe Beato, Max Mühlhäuser
2014SigmoRep: A Robust Reputation Model for Open Collaborative Environments.
Ahmad A. Kardan, Reza Salarmehr, Azade Farshad
2014SocAware: A Middleware for Social Applications in Online Social Networks.
Liang Chen, Kan Chen, Chengcheng Shao, Peidong Zhu
2014Survey of Integrity Detection Methods in Internet of Things.
Chaoliang Li, Qin Li, Guojun Wang
2014Synthesising End-to-End Security Protocols.
Charles Thevathayan, Peter Bertók, George Fernandez
2014Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones.
Zhihui Han, Liang Cheng, Yang Zhang, Shuke Zeng, Yi Deng, Xiaoshan Sun
2014TEEI - A Mobile Security Infrastructure for TEE Integration.
Hongfeng Chai, Zhijun Lu, Qingyang Meng, Jun Wang, Xiubang Zhang, Zhijian Zhang
2014TTPCookie: Flexible Third-Party Cookie Management for Increasing Online Privacy.
Ashar Javed, Christian Merz, Jörg Schwenk
2014Temporal Access Control with User Revocation for Cloud Data.
Nihal Balani, Sushmita Ruj
2014The Evaluation of Emulab as an Environment for Bio-Informatics Research.
Kyungwoo Kang, Yunhee Kang, Sungjin Sul
2014The Micro-architectural Support Countermeasures against the Branch Prediction Analysis Attack.
Ya Tan, Jizeng Wei, Wei Guo
2014Threshold-Based Secure and Privacy-Preserving Message Verification in VANETs.
Wei Gao, Mingzhong Wang, Liehuang Zhu, Xiaoping Zhang
2014ToAuth: Towards Automatic Near Field Authentication for Smartphones.
Weixi Gu, Zheng Yang, Longfei Shangguan, Xiaoyu Ji, Yiyang Zhao
2014Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning.
Wenjuan Li, Weizhi Meng, Zhiyuan Tan, Yang Xiang
2014Towards Policy Retrieval for Provenance Based Access Control Model.
Jisheng Pei, Xiaojun Ye
2014Towards Robust and Effective Trust Management for Security: A Survey.
Dongxia Wang, Tim Muller, Yang Liu, Jie Zhang
2014Trust Enhanced Cloud Security for Healthcare Services.
Udaya Kiran Tupakula, Vijay Varadharajan
2014Trust Mechanism for Enforcing Compliance to Secondary Data Use Contracts.
Zeinab Noorian, Johnson Iyilade, Mohsen Mohkami, Julita Vassileva
2014Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs.
Hui Xia, Jia Yu, Zhiyong Zhang, Xiangguo Cheng, Zhenkuan Pan
2014Trusted Geolocation-Aware Data Placement in Infrastructure Clouds.
Nicolae Paladi, Mudassar Aslam, Christian Gehrmann
2014Ultra High-Speed SM2 ASIC Implementation.
Zhenwei Zhao, Guoqiang Bai
2014Unified Model for Data Security - A Position Paper.
Raja Naeem Akram, Ryan K. L. Ko
2014Untrusted User Detection in Microblogs.
Zidan Yu, Huiqun Yu
2014VALID: A Web Framework for Visual Analytics of Large Streaming Data.
Chenhui Li, George Baciu
2014Visual Similarity Based Anti-phishing with the Combination of Local and Global Features.
Yu Zhou, Yongzheng Zhang, Jun Xiao, Yipeng Wang, Weiyao Lin
2014vPatcher: VMI-Based Transparent Data Patching to Secure Software in the Cloud.
Hao Zhang, Lei Zhao, Lai Xu, Lina Wang, Deming Wu