


default search action
5th AsiaCCS 2010: Beijing, China
- Dengguo Feng, David A. Basin, Peng Liu:

Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010. ACM 2010, ISBN 978-1-60558-936-7
Keynote addresses
- Pierangela Samarati

, Sabrina De Capitani di Vimercati
:
Data protection in outsourcing scenarios: issues and directions. 1-14 - Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld:

A lattice-based approach to mashup security. 15-23
Privacy
- Chih-Cheng Chang, Brian Thompson, Wendy Hui Wang, Danfeng Yao

:
Towards publishing recommendation data with predictive anonymization. 24-35 - Lei Zhang, Alexander Brodsky, Sushil Jajodia

:
Restoring compromised privacy in micro-data disclosure. 36-47 - Mikhail J. Atallah, Keith B. Frikken:

Securely outsourcing linear algebra computations. 48-59
Applied cryptography
- Jin Li, Man Ho Au

, Willy Susilo
, Dongqing Xie, Kui Ren
:
Attribute-based signature and its applications. 60-69 - Benoît Libert, Moti Yung:

Dynamic fully forward-secure group signatures. 70-81 - Yu Chen, Manuel Charlemagne, Zhi Guan, Jian-bin Hu, Zhong Chen:

Identity-based encryption based on DHIES. 82-88
Network security
- Fernando Sanchez, Zhenhai Duan:

Region-based BGP announcement filtering for improved BGP security. 89-100 - Si-Yu Huang, Ching-Hao Mao, Hahn-Ming Lee:

Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection. 101-111 - Tuan Manh Vu, Reihaneh Safavi-Naini, Carey Williamson:

Securing wireless sensor networks against large-scale node capture attacks. 112-123
Systems security -- I
- Chengyu Song

, Jianwei Zhuge, Xinhui Han, Zhiyuan Ye:
Preventing drive-by download via inter-module communication monitoring. 124-134 - Marco Balduzzi, Manuel Egele, Engin Kirda, Davide Balzarotti, Christopher Kruegel:

A solution for the automated detection of clickjacking attacks. 135-144 - Yves Younan, Pieter Philippaerts

, Lorenzo Cavallaro
, R. Sekar, Frank Piessens, Wouter Joosen:
PAriCheck: an efficient pointer arithmetic checker for C programs. 145-156
Access control -- I
- Enrico Scalavino, Giovanni Russello, Rudi Ball, Vaibhav Gowadia, Emil C. Lupu

:
An opportunistic authority evaluation scheme for data security in crisis management scenarios. 157-168 - Adam J. Lee

, Ting Yu, Yann Le Gall:
Effective trust management through a hybrid logical and relational approach. 169-179 - Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu, Keith Irwin:

Toward practical authorization-dependent user obligation systems. 180-191
Security protocols
- Siva Anantharaman, Hai Lin, Christopher Lynch

, Paliath Narendran, Michaël Rusinowitch:
Cap unification: application to protocol security modulo homomorphic encryption. 192-203 - Adonis P. H. Fung, K. W. Cheung:

SSLock: sustaining the trust on entities brought by SSL. 204-213 - Klaas Ole Kürtz, Henning Schnoor, Thomas Wilke:

Computationally secure two-round authenticated message exchange. 214-225 - Guan Wang, Tongbo Luo, Michael T. Goodrich

, Wenliang Du, Zutao Zhu:
Bureaucratic protocols for secure two-party sorting, selection, and permuting. 226-237
Access control -- II
- Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu:

A logic for authorization provenance. 238-249 - Qun Ni, Elisa Bertino, Jorge Lobo

:
Risk-based access control systems built on fuzzy inferences. 250-260 - Shucheng Yu

, Cong Wang
, Kui Ren
, Wenjing Lou:
Attribute based data sharing with attribute revocation. 261-270
Systems security -- II
- Byoungyoung Lee

, Yuna Kim, Jong Kim:
binOb+: a framework for potent and stealthy binary obfuscation. 271-281 - Rongxing Lu, Xiaodong Lin, Xiaohui Liang

, Xuemin (Sherman) Shen
:
Secure provenance: the essential of bread and butter of data forensics in cloud computing. 282-292 - Juan Du, Wei Wei, Xiaohui Gu, Ting Yu:

RunTest: assuring integrity of dataflow processing in cloud computing infrastructures. 293-304
Short papers -- I
- Zutao Zhu, Wenliang Du:

K-anonymous association rule hiding. 305-309 - Ning Shang, Gabriel Ghinita, Yongbin Zhou, Elisa Bertino:

Controlling data disclosure in computational PIR protocols. 310-313 - Yan Zhu

, Gail-Joon Ahn
, Hongxin Hu, Huaixi Wang:
Cryptographic role-based security mechanisms based on role-key hierarchy. 314-319 - Anna Cinzia Squicciarini

, Federica Paci
, Smitha Sundareswaran:
PriMa: an effective privacy protection mechanism for social networks. 320-323 - Brian Wongchaowart, Adam J. Lee

:
Oblivious enforcement of hidden information release policies. 324-327
Short papers -- II
- Mohammad Nauman

, Sohail Khan
, Xinwen Zhang:
Apex: extending Android permission model and enforcement with user-defined runtime constraints. 328-332 - Hung-Yuan Hsu, Sencun Zhu, Ali R. Hurson

:
A hotspot-based protocol for attack traceback in mobile ad hoc networks. 333-336 - Cheng-Kang Chu, Joseph K. Liu

, Jianying Zhou
, Feng Bao, Robert H. Deng
:
Practical ID-based encryption for wireless sensor network. 337-340 - Tansu Alpcan

, Cengiz Örencik, Albert Levi
, Erkay Savas:
A game theoretic model for digital identity and trust in online communities. 341-344 - Peter Matthews, Cliff Changchun Zou:

Scene tagging: image-based CAPTCHA using image composition and object relationships. 345-350

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














