


default search action
2nd AsiaCCS 2007: Singapore
- Feng Bao, Steven Miller:

Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007. ACM 2007, ISBN 1-59593-574-6
Keynote speeches
- Mark Bregman:

Keynote speech. 1 - Sushil Jajodia:

Topological analysis of network attack vulnerability. 2 - Virgil D. Gligor:

On the evolution of adversary models in security protocols: from the beginning to sensor networks. 3
Network security
- Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer:

Analyzing network traffic to detect self-decrypting exploit code. 4-12 - Yang Li, Binxing Fang, Li Guo, You Chen:

Network anomaly detection based on TCM-KNN algorithm. 13-19 - Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig:

BASE: an incrementally deployable mechanism for viable IP spoofing prevention. 20-31 - Guanhua Yan, Hector D. Flores, Leticia Cuellar, Nicolas W. Hengartner

, Stephan J. Eidenbenz
, Vincent Q. Vu
:
Bluetooth worm propagation: mobility pattern matters! 32-44
Anonymity systems & formal method
- Pan Wang, Peng Ning, Douglas S. Reeves:

A k-anonymous communication protocol for overlay networks. 45-56 - Przemyslaw Kubiak

, Miroslaw Kutylowski, Filip Zagórski:
Kleptographic attacks on a cascade of mix servers. 57-62 - Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar:

Private stateful circuits secure against probing attacks. 63-69 - David A. Basin, Ernst-Rüdiger Olderog, Paul E. Sevinç:

Specifying and analyzing security automata using CSP-OZ. 70-81
Access control
- Mikhail J. Atallah, Marina Blanton

, Keith B. Frikken:
Efficient techniques for realizing geo-spatial access control. 82-92 - Meenakshi Balasubramanian, Abhishek Bhatnagar, Namit Chaturvedi, Atish Datta Chowdhury, Arul Ganesh:

A framework for decentralized access control. 93-104 - Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee

, Peng Liu, Wang-Chien Lee:
Incremental adaptation of XPath access control views. 105-116 - Xinwen Zhang, Michael J. Covington, Songqing Chen, Ravi S. Sandhu:

SecureBus: towards application-transparent trusted computing with mandatory access control. 117-126 - Ninghui Li, Ziqing Mao:

Administration in role-based access control. 127-138 - Chaoyi Pang, David P. Hansen, Anthony J. Maeder

:
Managing RBAC states with transitive relations. 139-148
Authentication & trust management
- Sabrina De Capitani di Vimercati

, Sushil Jajodia, Stefano Paraboschi
, Pierangela Samarati
:
Trust management services in relational databases. 149-160 - Siamak Fayyaz Shahandashti

, Reihaneh Safavi-Naini, Joonsang Baek
:
Concurrently-secure credential ownership proofs. 161-172 - Reihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt:

Unconditionally secure ring authentication. 173-181 - Dongvu Tonien

, Reihaneh Safavi-Naini, Peter R. Wild:
Combinatorial characterizations of authentication codes in verification oracle model. 183-193
Applications & security policy
- Anh-Quynh Nguyen, Yoshiyasu Takefuji

:
A novel approach for a file-system integrity monitor tool of Xen virtual machine. 194-202 - Jason Reid, Juan Manuel González Nieto, Tee Tang, Bouchra Senadji

:
Detecting relay attacks with timing-based protocols. 204-213 - Qihua Wang, Ninghui Li:

Direct static enforcement of high-level security policies. 214-225 - Matthias Schwan:

An extended model of security policy for multi-applicative smart cards. 226-233
RFID & watermarking
- Yingjiu Li, Xuhua Ding

:
Protecting RFID communications in supply chains. 234-241 - Tri Van Le, Mike Burmester, Breno de Medeiros:

Universally composable and forward-secure RFID authentication and authenticated key exchange. 242-252
Short papers
- Jianjun Shen, Sihan Qing:

A dynamic information flow model of secure systems. 341-343 - Hioki Hirohisa:

Crocus: a steganographic filesystem manager. 344-346 - David Arditti, Côme Berbain, Olivier Billet

, Henri Gilbert:
Compact FPGA implementations of QUAD. 347-349 - Debra L. Cook, Angelos D. Keromytis, Moti Yung:

Elastic block ciphers: the basic design. 350-352 - Ileana Buhan, Jeroen Doumen, Pieter H. Hartel

, Raymond N. J. Veldhuis:
Fuzzy extractors for continuous distributions. 353-355 - Victor K. Wei:

Invisible designated confirmer signatures without random oracles. 356-358 - Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu:

Keystroke statistical learning model for web authentication. 359-361 - Lawrence Teo, Gail-Joon Ahn

:
Managing heterogeneous network environments using an extensible policy framework. 362-364 - Xiaoxin Wu, David K. Y. Yau:

Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach. 365-367 - Joonsang Baek

, Willy Susilo
, Jianying Zhou
:
New constructions of fuzzy identity-based encryption. 368-370 - Vrizlynn L. L. Thing, Morris Sloman

, Naranker Dulay:
Non-intrusive IP traceback for DDoS attacks. 371-373 - Kazuki Yoneyama, Kazuo Ohta:

Ring signatures: universally composable definitions and constructions. 374-376 - Tae-Kyou Park, Ilkyeun Ra:

SPECS: smart partial enciphering service for accessing encrypted files with efficient and transparent. 377-379 - Johann Großschädl, Alexander Szekely, Stefan Tillich:

The energy cost of cryptographic key establishment in wireless sensor networks. 380-382 - M. A. C. Dekker, J. G. Cederquist

, Jason Crampton, Sandro Etalle:
Extended privilege inheritance in RBAC. 383-385 - Patrick Röder, Omid Tafreschi, Claudia Eckert:

History-based access control for XML documents. 386-388 - Vishwas Patil, Alessandro Mei

, Luigi V. Mancini
:
Addressing interoperability issues in access control models. 389-391 - Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis Hsu, Karl N. Levitt:

A framework for diversifying windows native APIs to tolerate code injection attacks. 392-394 - Chinyang Henry Tseng, Shiau-Huey Wang, Karl N. Levitt:

DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET. 395-397 - Jeongseok Seo, Sung Deok Cha:

Masquerade detection based on SVM and sequence-based user commands profile. 398-400

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














