14. CCS 2007:
Alexandria,
VA,
USA
Peng Ning, Sabrina De Capitani di Vimercati, Paul F. Syverson (Eds.):
Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007.
ACM 2007, ISBN 978-1-59593-703-2 BibTeX
Web applications security
Authentication and passwords
Anonymity
Operating systems and malware
Traffic analysis and location privacy
Cryptography
Network security
- Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, Darrell Whitley:
Optimal security hardening using multi-objective optimization on attack tree models of networks.
204-213
Electronic Edition (ACM DL) BibTeX
- David John Zage, Cristina Nita-Rotaru:
On the accuracy of decentralized virtual coordinate systems in adversarial networks.
214-224
Electronic Edition (ACM DL) BibTeX
- Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy Ganguly:
Analyzing the vulnerability of superpeer networks against attack.
225-234
Electronic Edition (ACM DL) BibTeX
- Serdar Cabuk, Chris I. Dalton, HariGovind V. Ramasamy, Matthias Schunter:
Towards automated provisioning of secure virtualized networks.
235-245
Electronic Edition (ACM DL) BibTeX
Election systems and applied cryptography
Side and covert channels detection
Protocols and spam filters
Internet security
Key management
Policies
- Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh:
Protecting browsers from dns rebinding attacks.
421-431
Electronic Edition (ACM DL) BibTeX
- Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, Robert Morris, M. Frans Kaashoek:
Alpaca: extensible authorization for distributed services.
432-444
Electronic Edition (ACM DL) BibTeX
- Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, Mikhail I. Gofman:
Efficient policy analysis for administrative role based access control.
445-455
Electronic Edition (ACM DL) BibTeX
Cryptography and cryptoanalysis
Data privacy
- Paul Bunn, Rafail Ostrovsky:
Secure two-party k-means clustering.
486-497
Electronic Edition (ACM DL) BibTeX
- Justin Brickell, Donald E. Porter, Vitaly Shmatikov, Emmett Witchel:
Privacy-preserving remote diagnostics.
498-507
Electronic Edition (ACM DL) BibTeX
- Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu:
Automaton segmentation: a new approach to preserve privacy in xml information brokering.
508-518
Electronic Edition (ACM DL) BibTeX
- Juan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser, Mehmet Utku Celik:
Privacy preserving error resilient dna searching through oblivious automata.
519-528
Electronic Edition (ACM DL) BibTeX
Software security
- Stephan Neuhaus, Thomas Zimmermann, Christian Holler, Andreas Zeller:
Predicting vulnerable software components.
529-540
Electronic Edition (ACM DL) BibTeX
- Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, Salvatore J. Stolfo:
On the infeasibility of modeling polymorphic shellcode.
541-551
Electronic Edition (ACM DL) BibTeX
- Hovav Shacham:
The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86).
552-561
Electronic Edition (ACM DL) BibTeX
- Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu:
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities.
562-572
Electronic Edition (ACM DL) BibTeX
Data disclosure
Copyright © Sat May 16 23:00:56 2009
by Michael Ley (ley@uni-trier.de)