2. ASIACCS 2007:
Singapore
Feng Bao, Steven Miller (Eds.):
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007.
ACM 2007, ISBN 1-59593-574-6 BibTeX
Keynote speeches
Network security
- Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer:
Analyzing network traffic to detect self-decrypting exploit code.
4-12
Electronic Edition (ACM DL) BibTeX
- Yang Li, Binxing Fang, Li Guo, You Chen:
Network anomaly detection based on TCM-KNN algorithm.
13-19
Electronic Edition (ACM DL) BibTeX
- Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig:
BASE: an incrementally deployable mechanism for viable IP spoofing prevention.
20-31
Electronic Edition (ACM DL) BibTeX
- Guanhua Yan, Hector D. Flores, Leticia Cuellar, Nicolas W. Hengartner, Stephan Eidenbenz, Vincent Vu:
Bluetooth worm propagation: mobility pattern matters!
32-44
Electronic Edition (ACM DL) BibTeX
Anonymity systems & formal method
Access control
- Mikhail J. Atallah, Marina Blanton, Keith B. Frikken:
Efficient techniques for realizing geo-spatial access control.
82-92
Electronic Edition (ACM DL) BibTeX
- Meenakshi Balasubramanian, Abhishek Bhatnagar, Namit Chaturvedi, Atish Datta Chowdhury, Arul Ganesh:
A framework for decentralized access control.
93-104
Electronic Edition (ACM DL) BibTeX
- Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee, Peng Liu, Wang-Chien Lee:
Incremental adaptation of XPath access control views.
105-116
Electronic Edition (ACM DL) BibTeX
- Xinwen Zhang, Michael J. Covington, Songqing Chen, Ravi S. Sandhu:
SecureBus: towards application-transparent trusted computing with mandatory access control.
117-126
Electronic Edition (ACM DL) BibTeX
- Ninghui Li, Ziqing Mao:
Administration in role-based access control.
127-138
Electronic Edition (ACM DL) BibTeX
- Chaoyi Pang, David P. Hansen, Anthony J. Maeder:
Managing RBAC states with transitive relations.
139-148
Electronic Edition (ACM DL) BibTeX
Authentication & trust management
Applications & security policy
RFID & watermarking
Short papers
- Jianjun Shen, Sihan Qing:
A dynamic information flow model of secure systems.
341-343
Electronic Edition (ACM DL) BibTeX
- Hioki Hirohisa:
Crocus: a steganographic filesystem manager.
344-346
Electronic Edition (ACM DL) BibTeX
- David Arditti, Côme Berbain, Olivier Billet, Henri Gilbert:
Compact FPGA implementations of QUAD.
347-349
Electronic Edition (ACM DL) BibTeX
- Debra L. Cook, Angelos D. Keromytis, Moti Yung:
Elastic block ciphers: the basic design.
350-352
Electronic Edition (ACM DL) BibTeX
- Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Raymond N. J. Veldhuis:
Fuzzy extractors for continuous distributions.
353-355
Electronic Edition (ACM DL) BibTeX
- Victor K. Wei:
Invisible designated confirmer signatures without random oracles.
356-358
Electronic Edition (ACM DL) BibTeX
- Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu:
Keystroke statistical learning model for web authentication.
359-361
Electronic Edition (ACM DL) BibTeX
- Lawrence Teo, Gail-Joon Ahn:
Managing heterogeneous network environments using an extensible policy framework.
362-364
Electronic Edition (ACM DL) BibTeX
- Xiaoxin Wu, David K. Y. Yau:
Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach.
365-367
Electronic Edition (ACM DL) BibTeX
- Joonsang Baek, Willy Susilo, Jianying Zhou:
New constructions of fuzzy identity-based encryption.
368-370
Electronic Edition (ACM DL) BibTeX
- Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay:
Non-intrusive IP traceback for DDoS attacks.
371-373
Electronic Edition (ACM DL) BibTeX
- Kazuki Yoneyama, Kazuo Ohta:
Ring signatures: universally composable definitions and constructions.
374-376
Electronic Edition (ACM DL) BibTeX
- Tae-Kyou Park, Ilkyeun Ra:
SPECS: smart partial enciphering service for accessing encrypted files with efficient and transparent.
377-379
Electronic Edition (ACM DL) BibTeX
- Johann Großschädl, Alexander Szekely, Stefan Tillich:
The energy cost of cryptographic key establishment in wireless sensor networks.
380-382
Electronic Edition (ACM DL) BibTeX
- M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle:
Extended privilege inheritance in RBAC.
383-385
Electronic Edition (ACM DL) BibTeX
- Patrick Röder, Omid Tafreschi, Claudia Eckert:
History-based access control for XML documents.
386-388
Electronic Edition (ACM DL) BibTeX
- Vishwas Patil, Alessandro Mei, Luigi V. Mancini:
Addressing interoperability issues in access control models.
389-391
Electronic Edition (ACM DL) BibTeX
- Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis Hsu, Karl N. Levitt:
A framework for diversifying windows native APIs to tolerate code injection attacks.
392-394
Electronic Edition (ACM DL) BibTeX
- Chinyang Henry Tseng, Shiau-Huey Wang, Karl N. Levitt:
DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET.
395-397
Electronic Edition (ACM DL) BibTeX
- Jeongseok Seo, Sung Deok Cha:
Masquerade detection based on SVM and sequence-based user commands profile.
398-400
Electronic Edition (ACM DL) BibTeX
Copyright © Sat May 16 23:00:56 2009
by Michael Ley (ley@uni-trier.de)