


default search action
12. ASIAN 2007: Doha, Qatar
- Iliano Cervesato:

Advances in Computer Science - ASIAN 2007. Computer and Network Security, 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings. Lecture Notes in Computer Science 4846, Springer 2007, ISBN 978-3-540-76927-9
Invited Speaker
- Andrei Sabelfeld:

Dimensions of Declassification in Theory and Practice. 1
Program Security
- Seokwoo Choi, Heewan Park, Hyun-il Lim, Taisook Han:

A Static Birthmark of Binary Executables Based on API Call Structure. 2-16 - Takahiro Kosakai, Toshiyuki Maeda, Akinori Yonezawa:

Compiling C Programs into a Strongly Typed Assembly Language. 17-32 - Gurvan Le Guernic

:
Information Flow Testing. 33-47
Short Papers on Computer Security
- Gavin O'Gorman, Stephen Blott:

Large Scale Simulation of Tor: . 48-54 - Junji Nakazato, Lihua Wang

, Akihiro Yamamura
:
Privacy Enhancing Credentials. 55-61 - Sriperumbuduru Kandala Simhalu, Keiji Takeda:

Browser Based Agile E-Voting System. 62-69 - Muhammad Torabi Dashti, Yanjing Wang:

Risk Balance in Exchange Protocols. 70-77 - Hyoungshick Kim:

Scalable DRM System for Media Portability. 78-85 - Gergei Bana, Koji Hasebe, Mitsuhiro Okada:

Computational Semantics for Basic Protocol Logic - A Stochastic Approach. 86-94
Access Control
- Mohammad Jafari, Mohammad Fathian:

Management Advantages of Object Classification in Role-Based Access Control (RBAC). 95-110 - Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:

An Integrated Model for Access Control and Information Flow Requirements. 111-125 - Imad M. Abbadi:

Digital Rights Management Using a Master Control Device. 126-141
Invited Speaker
- Joshua D. Guttman

:
How to do Things with Cryptographic Protocols. 142-149
Protocols
- Han Gao, Chiara Bodei, Pierpaolo Degano, Hanne Riis Nielson:

A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols. 150-165 - Mengjun Li, Ti Zhou, Zhoujun Li, Huowang Chen:

An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming. 166-180 - Vitaly Shmatikov, Ming-Hsiu Wang:

Secure Verification of Location Claims with Simultaneous Distance Modification. 181-195
Invited Speaker
- Kazuhiko Kato:

Modeling and Virtualization for Secure Computing Environments. 196-197
Intrusion Detection
- E. Ramirez-Silva, Marc Dacier:

Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces. 198-211 - Elie Bursztein, Jean Goubault-Larrecq:

A Logical Framework for Evaluating Network Resilience Against Faults and Attacks. 212-227 - Wilson Naik Bhukya, Suneel Kumar Kommuru, Atul Negi:

Masquerade Detection Based Upon GUI User Profiling in Linux Systems. 228-239
Short Papers on Network Security
- Atsushi Sakurai, Takashi Minohara, Ryota Sato, Keisuke Mizutani:

One-Time Receiver Address in IPv6 for Protecting Unlinkability. 240-246 - Jungsuk Song, Hayato Ohba, Hiroki Takakura, Yasuo Okabe, Kenji Ohira

, Yongjin Kwon:
A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts. 247-253 - Ali Borji:

Combining Heterogeneous Classifiers for Network Intrusion Detection. 254-260 - Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas:

Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments. 261-267
Safe Execution
- Harshit J. Shah, R. K. Shyamasundar:

On Run-Time Enforcement of Policies. 268-281 - Michele Bugliesi

, Damiano Macedonio, Sabina Rossi:
Static vs Dynamic Typing for Access Control in Pi-Calculus. 282-296 - Tomohiro Shioya, Yoshihiro Oyama, Hideya Iwasaki

:
A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications. 297-311

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














