2. ASIACCS 2007:
Singapore
Feng Bao, Steven Miller (Eds.):
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007.
ACM 2007, ISBN 1-59593-574-6
Keynote speeches
- Mark Bregman:
Keynote speech.
1
- Sushil Jajodia:
Topological analysis of network attack vulnerability.
2
- Virgil D. Gligor:
On the evolution of adversary models in security protocols: from the beginning to sensor networks.
3
Network security
- Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer:
Analyzing network traffic to detect self-decrypting exploit code.
4-12
- Yang Li, Binxing Fang, Li Guo, You Chen:
Network anomaly detection based on TCM-KNN algorithm.
13-19
- Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig:
BASE: an incrementally deployable mechanism for viable IP spoofing prevention.
20-31
- Guanhua Yan, Hector D. Flores, Leticia Cuellar, Nicolas W. Hengartner, Stephan Eidenbenz, Vincent Vu:
Bluetooth worm propagation: mobility pattern matters!
32-44
Anonymity systems & formal method
Access control
- Mikhail J. Atallah, Marina Blanton, Keith B. Frikken:
Efficient techniques for realizing geo-spatial access control.
82-92
- Meenakshi Balasubramanian, Abhishek Bhatnagar, Namit Chaturvedi, Atish Datta Chowdhury, Arul Ganesh:
A framework for decentralized access control.
93-104
- Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee, Peng Liu, Wang-Chien Lee:
Incremental adaptation of XPath access control views.
105-116
- Xinwen Zhang, Michael J. Covington, Songqing Chen, Ravi S. Sandhu:
SecureBus: towards application-transparent trusted computing with mandatory access control.
117-126
- Ninghui Li, Ziqing Mao:
Administration in role-based access control.
127-138
- Chaoyi Pang, David P. Hansen, Anthony J. Maeder:
Managing RBAC states with transitive relations.
139-148
Authentication & trust management
Applications & security policy
RFID & watermarking
Short papers
- Jianjun Shen, Sihan Qing:
A dynamic information flow model of secure systems.
341-343
- Hioki Hirohisa:
Crocus: a steganographic filesystem manager.
344-346
- David Arditti, Côme Berbain, Olivier Billet, Henri Gilbert:
Compact FPGA implementations of QUAD.
347-349
- Debra L. Cook, Angelos D. Keromytis, Moti Yung:
Elastic block ciphers: the basic design.
350-352
- Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Raymond N. J. Veldhuis:
Fuzzy extractors for continuous distributions.
353-355
- Victor K. Wei:
Invisible designated confirmer signatures without random oracles.
356-358
- Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu:
Keystroke statistical learning model for web authentication.
359-361
- Lawrence Teo, Gail-Joon Ahn:
Managing heterogeneous network environments using an extensible policy framework.
362-364
- Xiaoxin Wu, David K. Y. Yau:
Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach.
365-367
- Joonsang Baek, Willy Susilo, Jianying Zhou:
New constructions of fuzzy identity-based encryption.
368-370
- Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay:
Non-intrusive IP traceback for DDoS attacks.
371-373
- Kazuki Yoneyama, Kazuo Ohta:
Ring signatures: universally composable definitions and constructions.
374-376
- Tae-Kyou Park, Ilkyeun Ra:
SPECS: smart partial enciphering service for accessing encrypted files with efficient and transparent.
377-379
- Johann Großschädl, Alexander Szekely, Stefan Tillich:
The energy cost of cryptographic key establishment in wireless sensor networks.
380-382
- M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle:
Extended privilege inheritance in RBAC.
383-385
- Patrick Röder, Omid Tafreschi, Claudia Eckert:
History-based access control for XML documents.
386-388
- Vishwas Patil, Alessandro Mei, Luigi V. Mancini:
Addressing interoperability issues in access control models.
389-391
- Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis Hsu, Karl N. Levitt:
A framework for diversifying windows native APIs to tolerate code injection attacks.
392-394
- Chinyang Henry Tseng, Shiau-Huey Wang, Karl N. Levitt:
DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET.
395-397
- Jeongseok Seo, Sung Deok Cha:
Masquerade detection based on SVM and sequence-based user commands profile.
398-400
Copyright © Sun Mar 14 22:57:23 2010
by Michael Ley (ley@uni-trier.de)