


default search action
CODASPY 2014: San Antonio, TX, USA
- Elisa Bertino, Ravi S. Sandhu, Jaehong Park:

Fourth ACM Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, USA - March 03 - 05, 2014. ACM 2014, ISBN 978-1-4503-2278-2
Access control for applications
- William C. Garrison III, Yechen Qiao, Adam J. Lee

:
On the suitability of dissemination-centric access control systems for group-centric sharing. 1-12 - Tien Tuan Anh Dinh, Anwitaman Datta

:
Streamforce: outsourcing access control enforcement for stream data to the clouds. 13-24 - Yifei Wang, Srinivas Hariharan, Chenxi Zhao, Jiaming Liu, Wenliang Du:

Compac: enforce component-level access control in android. 25-36
Web security
- Fabien Duchene, Sanjay Rawat

, Jean-Luc Richier, Roland Groz:
KameleonFuzz: evolutionary fuzzing for black-box XSS detection. 37-48 - Xiaowei Li, Xujie Si, Yuan Xue:

Automated black-box detection of access control vulnerabilities in web applications. 49-60 - Bastian Braun, Martin Johns

, Johannes Köstler, Joachim Posegga:
PhishSafe: leveraging modern JavaScript API's for transparent and robust protection. 61-72
Keynote address 1
- Dongyan Xu:

Virtualization and security: happily ever after? 73-74
Novel techniques for application security
- Ebrahim Tarameshloo, Philip W. L. Fong, Payman Mohassel:

On protection in federated social computing systems. 75-86 - Euijin Choo, Jianchun Jiang, Ting Yu:

COMPARS: toward an empirical approach for comparing the resilience of reputation systems. 87-98 - Yiming Jing, Gail-Joon Ahn

, Ziming Zhao, Hongxin Hu:
RiskMon: continuous and automated risk assessment of mobile applications. 99-110 - Anna Cinzia Squicciarini

, Giuseppe Petracca, William G. Horne, Aurnob Nath:
Situational awareness through reasoning on network incidents. 111-122
Poster session
- Sandrine Blazy, Stéphanie Riaud:

Measuring the robustness of source program obfuscation: studying the impact of compiler optimizations on the obfuscation of C programs. 123-126 - Ragib Hasan

, Rasib Khan:
Interaction provenance model for unified authentication factors in service oriented computing. 127-130 - Visa Antero Vallivaara, Mirko Sailio

, Kimmo Halunen:
Detecting man-in-the-middle attacks on non-mobile systems. 131-134 - Justin Hummel, Andrew McDonald, Vatsal Shah, Riju Singh, Bradford D. Boyle, Tingshan Huang, Nagarajan Kandasamy, Harish Sethu, Steven Weber:

A modular multi-location anonymized traffic monitoring tool for a WiFi network. 135-138 - Anja Remshagen, Li Yang:

Consistency checking in access control. 139-142 - Seung-Hyun Seo

, Jongho Won, Elisa Bertino:
POSTER: a pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures. 143-146 - Holger Kühner, Hannes Hartenstein:

Spoilt for choice: graph-based assessment of key management protocols to share encrypted data. 147-150 - Haruna Kibirige, Lila Ghemri

:
Trust ranking of medical websites. 151-154 - Koki Murakami, Tsuyoshi Yamada, Rie Shigetomi Yamaguchi, Masahiro Goshima, Shuichi Sakai

:
A cloud architecture for protecting guest's information from malicious operators with memory management. 155-158 - Mihai Maruseac, Gabriel Ghinita, Razvan Rughinis

:
Privacy-preserving publication of provenance workflows. 159-162 - Kevin Allix

, Tegawendé F. Bissyandé
, Quentin Jérome, Jacques Klein
, Radu State, Yves Le Traon
:
Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with reality. 163-166 - Mohamed Shehab

, Fadi Mohsen:
Securing OAuth implementations in smart phones. 167-170 - Kalpana Gondi, A. Prasad Sistla, V. N. Venkatakrishnan:

Minimizing lifetime of sensitive data in concurrent programs. 171-174
Mobile security
- Michael Mitchell, Guanyu Tian, Zhi Wang:

Systematic audit of third-party android phones. 175-186 - Tsung-Hsuan Ho, Daniel Joseph Dean, Xiaohui Gu, William Enck:

PREC: practical root exploit containment for android devices. 187-198 - Wu Zhou, Zhi Wang, Yajin Zhou, Xuxian Jiang:

DIVILAR: diversifying intermediate language for anti-repackaging on android platform. 199-210
Novel techniques for data security
- Enrico Lovat, Johan Oudinet, Alexander Pretschner:

On quantitative dynamic data flow tracking. 211-222 - Muhammad Umer Arshad, Ashish Kundu, Elisa Bertino, Krishna Madhavan, Arif Ghafoor:

Security of graph data: hashing schemes and definitions. 223-234 - Mohammad Saiful Islam, Mehmet Kuzu, Murat Kantarcioglu:

Inference attack against encrypted range queries on outsourced databases. 235-246
Keynote address 2
- Jarret Raim:

Shared responsibility is better than no responsibility: federated encryption in the cloud. 247-248
Short papers 1
- Mehmet Kuzu, Mohammad Saiful Islam, Murat Kantarcioglu:

Efficient privacy-aware search over encrypted databases. 249-256 - Hussain M. J. Almohri

, Danfeng (Daphne) Yao
, Dennis G. Kafura:
DroidBarrier: know what is executing on your android. 257-264 - Kangjie Lu, Siyang Xiong, Debin Gao

:
RopSteg: program steganography with return oriented programming. 265-272 - Julian Horsch

, Sascha Wessel, Frederic Stumpf, Claudia Eckert:
SobrTrA: a software-based trust anchor for ARM cortex application processors. 273-280
Short papers 2
- Julian Horsch

, Konstantin Böttinger, Michael Weiß
, Sascha Wessel, Frederic Stumpf:
TrustID: trustworthy identities for untrusted mobile devices. 281-288 - Chee Meng Tey, Payas Gupta, Kartik Muralidharan, Debin Gao

:
Keystroke biometrics: the user perspective. 289-296 - Davide Alberto Albertini, Barbara Carminati

:
Relationship-based information sharing in cloud-based decentralized social networks. 297-304 - Birhanu Eshete

, V. N. Venkatakrishnan:
WebWinnow: leveraging exploit kit workflows to detect malicious urls. 305-312 - Se Eun Oh, Ji Young Chun, Limin Jia

, Deepak Garg, Carl A. Gunter, Anupam Datta:
Privacy-preserving audit for broker-based health information exchange. 313-320
Privacy preserving techniques
- Gabriel Ghinita, Razvan Rughinis

:
An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical. 321-332 - Paul Giura, Ilona Murynets, Roger Piqueras Jover, Yevgeniy Vahlis:

Is it really you?: user identification via adaptive behavior fingerprinting. 333-344 - Hemant Sengar, Haining Wang, Seyed Amir Iranmanesh:

Wiretap-proof: what they hear is not what you speak, and what you speak they do not hear. 345-356

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














