default search action
2nd AsiaCCS 2007: Singapore
- Feng Bao, Steven Miller:
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007. ACM 2007, ISBN 1-59593-574-6
Keynote speeches
- Mark Bregman:
Keynote speech. 1 - Sushil Jajodia:
Topological analysis of network attack vulnerability. 2 - Virgil D. Gligor:
On the evolution of adversary models in security protocols: from the beginning to sensor networks. 3
Network security
- Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer:
Analyzing network traffic to detect self-decrypting exploit code. 4-12 - Yang Li, Binxing Fang, Li Guo, You Chen:
Network anomaly detection based on TCM-KNN algorithm. 13-19 - Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig:
BASE: an incrementally deployable mechanism for viable IP spoofing prevention. 20-31 - Guanhua Yan, Hector D. Flores, Leticia Cuellar, Nicolas W. Hengartner, Stephan J. Eidenbenz, Vincent Q. Vu:
Bluetooth worm propagation: mobility pattern matters! 32-44
Anonymity systems & formal method
- Pan Wang, Peng Ning, Douglas S. Reeves:
A k-anonymous communication protocol for overlay networks. 45-56 - Przemyslaw Kubiak, Miroslaw Kutylowski, Filip Zagórski:
Kleptographic attacks on a cascade of mix servers. 57-62 - Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar:
Private stateful circuits secure against probing attacks. 63-69 - David A. Basin, Ernst-Rüdiger Olderog, Paul E. Sevinç:
Specifying and analyzing security automata using CSP-OZ. 70-81
Access control
- Mikhail J. Atallah, Marina Blanton, Keith B. Frikken:
Efficient techniques for realizing geo-spatial access control. 82-92 - Meenakshi Balasubramanian, Abhishek Bhatnagar, Namit Chaturvedi, Atish Datta Chowdhury, Arul Ganesh:
A framework for decentralized access control. 93-104 - Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee, Peng Liu, Wang-Chien Lee:
Incremental adaptation of XPath access control views. 105-116 - Xinwen Zhang, Michael J. Covington, Songqing Chen, Ravi S. Sandhu:
SecureBus: towards application-transparent trusted computing with mandatory access control. 117-126 - Ninghui Li, Ziqing Mao:
Administration in role-based access control. 127-138 - Chaoyi Pang, David P. Hansen, Anthony J. Maeder:
Managing RBAC states with transitive relations. 139-148
Authentication & trust management
- Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Trust management services in relational databases. 149-160 - Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek:
Concurrently-secure credential ownership proofs. 161-172 - Reihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt:
Unconditionally secure ring authentication. 173-181 - Dongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild:
Combinatorial characterizations of authentication codes in verification oracle model. 183-193
Applications & security policy
- Anh-Quynh Nguyen, Yoshiyasu Takefuji:
A novel approach for a file-system integrity monitor tool of Xen virtual machine. 194-202 - Jason Reid, Juan Manuel González Nieto, Tee Tang, Bouchra Senadji:
Detecting relay attacks with timing-based protocols. 204-213 - Qihua Wang, Ninghui Li:
Direct static enforcement of high-level security policies. 214-225 - Matthias Schwan:
An extended model of security policy for multi-applicative smart cards. 226-233
RFID & watermarking
- Yingjiu Li, Xuhua Ding:
Protecting RFID communications in supply chains. 234-241 - Tri Van Le, Mike Burmester, Breno de Medeiros:
Universally composable and forward-secure RFID authentication and authenticated key exchange. 242-252
Short papers
- Jianjun Shen, Sihan Qing:
A dynamic information flow model of secure systems. 341-343 - Hioki Hirohisa:
Crocus: a steganographic filesystem manager. 344-346 - David Arditti, Côme Berbain, Olivier Billet, Henri Gilbert:
Compact FPGA implementations of QUAD. 347-349 - Debra L. Cook, Angelos D. Keromytis, Moti Yung:
Elastic block ciphers: the basic design. 350-352 - Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Raymond N. J. Veldhuis:
Fuzzy extractors for continuous distributions. 353-355 - Victor K. Wei:
Invisible designated confirmer signatures without random oracles. 356-358 - Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu:
Keystroke statistical learning model for web authentication. 359-361 - Lawrence Teo, Gail-Joon Ahn:
Managing heterogeneous network environments using an extensible policy framework. 362-364 - Xiaoxin Wu, David K. Y. Yau:
Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach. 365-367 - Joonsang Baek, Willy Susilo, Jianying Zhou:
New constructions of fuzzy identity-based encryption. 368-370 - Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay:
Non-intrusive IP traceback for DDoS attacks. 371-373 - Kazuki Yoneyama, Kazuo Ohta:
Ring signatures: universally composable definitions and constructions. 374-376 - Tae-Kyou Park, Ilkyeun Ra:
SPECS: smart partial enciphering service for accessing encrypted files with efficient and transparent. 377-379 - Johann Großschädl, Alexander Szekely, Stefan Tillich:
The energy cost of cryptographic key establishment in wireless sensor networks. 380-382 - M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle:
Extended privilege inheritance in RBAC. 383-385 - Patrick Röder, Omid Tafreschi, Claudia Eckert:
History-based access control for XML documents. 386-388 - Vishwas Patil, Alessandro Mei, Luigi V. Mancini:
Addressing interoperability issues in access control models. 389-391 - Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis Hsu, Karl N. Levitt:
A framework for diversifying windows native APIs to tolerate code injection attacks. 392-394 - Chinyang Henry Tseng, Shiau-Huey Wang, Karl N. Levitt:
DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET. 395-397 - Jeongseok Seo, Sung Deok Cha:
Masquerade detection based on SVM and sequence-based user commands profile. 398-400
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.