:facetid:toc:\"db/conf/ccs/asiaccs2010.bht\"OK:facetid:toc:db/conf/ccs/asiaccs2010.bhtTansu AlpcanCengiz ÖrencikAlbert LeviErkay SavasA game theoretic model for digital identity and trust in online communities.AsiaCCS341-3442010Conference and Workshop Papersclosedconf/ccs/AlpcanOLS1010.1145/1755688.1755735https://doi.org/10.1145/1755688.1755735https://dblp.org/rec/conf/ccs/AlpcanOLS10URL#4886612Siva AnantharamanHai Lin 0005Christopher LynchPaliath NarendranMichaël RusinowitchCap unification: application to protocol security modulo homomorphic encryption.AsiaCCS192-2032010Conference and Workshop Papersclosedconf/ccs/AnantharamanLLNR1010.1145/1755688.1755713https://doi.org/10.1145/1755688.1755713https://dblp.org/rec/conf/ccs/AnantharamanLLNR10URL#4886613Mikhail J. AtallahKeith B. FrikkenSecurely outsourcing linear algebra computations.AsiaCCS48-592010Conference and Workshop Papersclosedconf/ccs/AtallahF1010.1145/1755688.1755695https://doi.org/10.1145/1755688.1755695https://dblp.org/rec/conf/ccs/AtallahF10URL#4886615Marco BalduzziManuel EgeleEngin KirdaDavide BalzarottiChristopher KruegelA solution for the automated detection of clickjacking attacks.AsiaCCS135-1442010Conference and Workshop Papersclosedconf/ccs/BalduzziEKBK1010.1145/1755688.1755706https://doi.org/10.1145/1755688.1755706https://dblp.org/rec/conf/ccs/BalduzziEKBK10URL#4886621Chih-Cheng ChangBrian ThompsonWendy Hui WangDanfeng YaoTowards publishing recommendation data with predictive anonymization.AsiaCCS24-352010Conference and Workshop Papersclosedconf/ccs/ChangTWY1010.1145/1755688.1755693https://doi.org/10.1145/1755688.1755693https://dblp.org/rec/conf/ccs/ChangTWY10URL#4886643Yu Chen 0003Manuel CharlemagneZhi GuanJian-bin HuZhong Chen 0001Identity-based encryption based on DHIES.AsiaCCS82-882010Conference and Workshop Papersclosedconf/ccs/ChenCGHC1010.1145/1755688.1755699https://doi.org/10.1145/1755688.1755699https://dblp.org/rec/conf/ccs/ChenCGHC10URL#4886647Cheng-Kang ChuJoseph K. LiuJianying Zhou 0001Feng Bao 0001Robert H. DengPractical ID-based encryption for wireless sensor network.AsiaCCS337-3402010Conference and Workshop Papersclosedconf/ccs/ChuLZBD1010.1145/1755688.1755734https://doi.org/10.1145/1755688.1755734https://dblp.org/rec/conf/ccs/ChuLZBD10URL#4886652Juan Du 0006Wei WeiXiaohui GuTing Yu 0001RunTest: assuring integrity of dataflow processing in cloud computing infrastructures.AsiaCCS293-3042010Conference and Workshop Papersclosedconf/ccs/DuWGY1010.1145/1755688.1755724https://doi.org/10.1145/1755688.1755724https://dblp.org/rec/conf/ccs/DuWGY10URL#4886661Adonis P. H. FungK. W. Cheung 0003SSLock: sustaining the trust on entities brought by SSL.AsiaCCS204-2132010Conference and Workshop Papersclosedconf/ccs/FungC1010.1145/1755688.1755714https://doi.org/10.1145/1755688.1755714https://dblp.org/rec/conf/ccs/FungC10URL#4886664Hung-Yuan HsuSencun ZhuAli R. HursonA hotspot-based protocol for attack traceback in mobile ad hoc networks.AsiaCCS333-3362010Conference and Workshop Papersclosedconf/ccs/HsuZH1010.1145/1755688.1755733https://doi.org/10.1145/1755688.1755733https://dblp.org/rec/conf/ccs/HsuZH10URL#4886682Jinwei HuYan Zhang 0003Ruixuan Li 0001Zhengding LuA logic for authorization provenance.AsiaCCS238-2492010Conference and Workshop Papersclosedconf/ccs/HuZLL1010.1145/1755688.1755718https://doi.org/10.1145/1755688.1755718https://dblp.org/rec/conf/ccs/HuZLL10URL#4886683Si-Yu HuangChing-Hao MaoHahn-Ming LeeFast-flux service network detection based on spatial snapshot mechanism for delay-free detection.AsiaCCS101-1112010Conference and Workshop Papersclosedconf/ccs/HuangML1010.1145/1755688.1755702https://doi.org/10.1145/1755688.1755702https://dblp.org/rec/conf/ccs/HuangML10URL#4886684Klaas Ole KürtzHenning SchnoorThomas WilkeComputationally secure two-round authenticated message exchange.AsiaCCS214-2252010Conference and Workshop Papersclosedconf/ccs/KurtzSW1010.1145/1755688.1755715https://doi.org/10.1145/1755688.1755715https://dblp.org/rec/conf/ccs/KurtzSW10URL#4886702Byoungyoung LeeYuna KimJong Kim 0001binOb+: a framework for potent and stealthy binary obfuscation.AsiaCCS271-2812010Conference and Workshop Papersclosedconf/ccs/LeeKK1010.1145/1755688.1755722https://doi.org/10.1145/1755688.1755722https://dblp.org/rec/conf/ccs/LeeKK10URL#4886705Adam J. LeeTing Yu 0001Yann Le GallEffective trust management through a hybrid logical and relational approach.AsiaCCS169-1792010Conference and Workshop Papersclosedconf/ccs/LeeYG1010.1145/1755688.1755710https://doi.org/10.1145/1755688.1755710https://dblp.org/rec/conf/ccs/LeeYG10URL#4886706Jin Li 0002Man Ho AuWilly SusiloDongqing XieKui Ren 0001Attribute-based signature and its applications.AsiaCCS60-692010Conference and Workshop Papersclosedconf/ccs/LiASXR1010.1145/1755688.1755697https://doi.org/10.1145/1755688.1755697https://dblp.org/rec/conf/ccs/LiASXR10URL#4886708Benoît LibertMoti YungDynamic fully forward-secure group signatures.AsiaCCS70-812010Conference and Workshop Papersclosedconf/ccs/LibertY1010.1145/1755688.1755698https://doi.org/10.1145/1755688.1755698https://dblp.org/rec/conf/ccs/LibertY10URL#4886710Rongxing LuXiaodong Lin 0001Xiaohui LiangXuemin (Sherman) ShenSecure provenance: the essential of bread and butter of data forensics in cloud computing.AsiaCCS282-2922010Conference and Workshop Papersclosedconf/ccs/LuLLS1010.1145/1755688.1755723https://doi.org/10.1145/1755688.1755723https://dblp.org/rec/conf/ccs/LuLLS10URL#4886715Jonas MagaziniusAslan AskarovAndrei SabelfeldA lattice-based approach to mashup security.AsiaCCS15-232010Conference and Workshop Papersclosedconf/ccs/MagaziniusAS1010.1145/1755688.1755691https://doi.org/10.1145/1755688.1755691https://dblp.org/rec/conf/ccs/MagaziniusAS10URL#4886717Peter MatthewsCliff Changchun ZouScene tagging: image-based CAPTCHA using image composition and object relationships.AsiaCCS345-3502010Conference and Workshop Papersclosedconf/ccs/MatthewsZ1010.1145/1755688.1755736https://doi.org/10.1145/1755688.1755736https://dblp.org/rec/conf/ccs/MatthewsZ10URL#4886718Mohammad NaumanSohail KhanXinwen ZhangApex: extending Android permission model and enforcement with user-defined runtime constraints.AsiaCCS328-3322010Conference and Workshop Papersclosedconf/ccs/NaumanKZ1010.1145/1755688.1755732https://doi.org/10.1145/1755688.1755732https://dblp.org/rec/conf/ccs/NaumanKZ10URL#4886726Qun NiElisa BertinoJorge Lobo 0001Risk-based access control systems built on fuzzy inferences.AsiaCCS250-2602010Conference and Workshop Papersclosedconf/ccs/NiBL1010.1145/1755688.1755719https://doi.org/10.1145/1755688.1755719https://dblp.org/rec/conf/ccs/NiBL10URL#4886728Murillo PontualOmar ChowdhuryWilliam H. WinsboroughTing Yu 0001Keith IrwinToward practical authorization-dependent user obligation systems.AsiaCCS180-1912010Conference and Workshop Papersclosedconf/ccs/PontualCWYI1010.1145/1755688.1755711https://doi.org/10.1145/1755688.1755711https://dblp.org/rec/conf/ccs/PontualCWYI10URL#4886732Pierangela SamaratiSabrina De Capitani di VimercatiData protection in outsourcing scenarios: issues and directions.AsiaCCS1-142010Conference and Workshop Papersclosedconf/ccs/SamaratiV1010.1145/1755688.1755690https://doi.org/10.1145/1755688.1755690https://dblp.org/rec/conf/ccs/SamaratiV10URL#4886740Fernando SanchezZhenhai DuanRegion-based BGP announcement filtering for improved BGP security.AsiaCCS89-1002010Conference and Workshop Papersclosedconf/ccs/SanchezD1010.1145/1755688.1755701https://doi.org/10.1145/1755688.1755701https://dblp.org/rec/conf/ccs/SanchezD10URL#4886742Enrico ScalavinoGiovanni RusselloRudi BallVaibhav GowadiaEmil C. LupuAn opportunistic authority evaluation scheme for data security in crisis management scenarios.AsiaCCS157-1682010Conference and Workshop Papersclosedconf/ccs/ScalavinoRBGL1010.1145/1755688.1755709https://doi.org/10.1145/1755688.1755709https://dblp.org/rec/conf/ccs/ScalavinoRBGL10URL#4886745Ning ShangGabriel GhinitaYongbin ZhouElisa BertinoControlling data disclosure in computational PIR protocols.AsiaCCS310-3132010Conference and Workshop Papersclosedconf/ccs/ShangGZB1010.1145/1755688.1755727https://doi.org/10.1145/1755688.1755727https://dblp.org/rec/conf/ccs/ShangGZB10URL#4886749Chengyu SongJianwei ZhugeXinhui HanZhiyuan YePreventing drive-by download via inter-module communication monitoring.AsiaCCS124-1342010Conference and Workshop Papersclosedconf/ccs/SongZHY1010.1145/1755688.1755705https://doi.org/10.1145/1755688.1755705https://dblp.org/rec/conf/ccs/SongZHY10URL#4886753Anna Cinzia SquicciariniFederica PaciSmitha SundareswaranPriMa: an effective privacy protection mechanism for social networks.AsiaCCS320-3232010Conference and Workshop Papersclosedconf/ccs/SquicciariniPS1010.1145/1755688.1755729https://doi.org/10.1145/1755688.1755729https://dblp.org/rec/conf/ccs/SquicciariniPS10URL#4886755Tuan Manh VuReihaneh Safavi-NainiCarey WilliamsonSecuring wireless sensor networks against large-scale node capture attacks.AsiaCCS112-1232010Conference and Workshop Papersclosedconf/ccs/VuSW1010.1145/1755688.1755703https://doi.org/10.1145/1755688.1755703https://dblp.org/rec/conf/ccs/VuSW10URL#4886762Guan WangTongbo LuoMichael T. GoodrichWenliang DuZutao ZhuBureaucratic protocols for secure two-party sorting, selection, and permuting.AsiaCCS226-2372010Conference and Workshop Papersclosedconf/ccs/WangLGDZ1010.1145/1755688.1755716https://doi.org/10.1145/1755688.1755716https://dblp.org/rec/conf/ccs/WangLGDZ10URL#4886764Brian WongchaowartAdam J. LeeOblivious enforcement of hidden information release policies.AsiaCCS324-3272010Conference and Workshop Papersclosedconf/ccs/WongchaowartL1010.1145/1755688.1755730https://doi.org/10.1145/1755688.1755730https://dblp.org/rec/conf/ccs/WongchaowartL10URL#4886770Yves YounanPieter PhilippaertsLorenzo CavallaroR. Sekar 0001Frank PiessensWouter JoosenPAriCheck: an efficient pointer arithmetic checker for C programs.AsiaCCS145-1562010Conference and Workshop Papersclosedconf/ccs/YounanPCSPJ1010.1145/1755688.1755707https://doi.org/10.1145/1755688.1755707https://dblp.org/rec/conf/ccs/YounanPCSPJ10URL#4886776Shucheng YuCong Wang 0001Kui Ren 0001Wenjing LouAttribute based data sharing with attribute revocation.AsiaCCS261-2702010Conference and Workshop Papersclosedconf/ccs/YuWRL1010.1145/1755688.1755720https://doi.org/10.1145/1755688.1755720https://dblp.org/rec/conf/ccs/YuWRL10URL#4886778Lei Zhang 0004Alexander Brodsky 0001Sushil JajodiaRestoring compromised privacy in micro-data disclosure.AsiaCCS36-472010Conference and Workshop Papersclosedconf/ccs/ZhangBJ1010.1145/1755688.1755694https://doi.org/10.1145/1755688.1755694https://dblp.org/rec/conf/ccs/ZhangBJ10URL#4886779Yan Zhu 0010Gail-Joon AhnHongxin HuHuaixi WangCryptographic role-based security mechanisms based on role-key hierarchy.AsiaCCS314-3192010Conference and Workshop Papersclosedconf/ccs/ZhuAHW1010.1145/1755688.1755728https://doi.org/10.1145/1755688.1755728https://dblp.org/rec/conf/ccs/ZhuAHW10URL#4886784Zutao ZhuWenliang DuK-anonymous association rule hiding.AsiaCCS305-3092010Conference and Workshop Papersclosedconf/ccs/ZhuD1010.1145/1755688.1755726https://doi.org/10.1145/1755688.1755726https://dblp.org/rec/conf/ccs/ZhuD10URL#4886785Dengguo FengDavid A. BasinPeng Liu 0005Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010AsiaCCSACM2010Editorshipunavailableconf/ccs/2010asiahttps://dblp.org/rec/conf/ccs/2010asiaURL#4999657