default search action
10th TrustCom 2011: Changsha, China
- IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-2135-9
- Ivan Stojmenovic:
Access Control in Distributed Systems: Merging Theory with Practice. 1-2 - Huaimin Wang:
TRUSTIE: Design of a Trustworthy Software Production Environment. 3-4 - Moon Ho Lee:
Jacket Matrix and Its Applications to Signal Processing. 5-6 - Yang Xiang:
Defending against Large-Scale and Coordinated Attacks in the Ubiquitous Environments. 7-8 - Valtteri Niemi:
Privacy, Identity and Trust in Context-Aware Mobile Services. 9-10 - Hakem Beitollahi, Geert Deconinck:
A Cooperative Mechanism to Defense against Distributed Denial of Service Attacks. 11-20 - Teodor Sommestad, Hannes Holm, Mathias Ekstedt:
Estimates of Success Rates of Denial-of-Service Attacks. 21-28 - Lin Liu:
Uncovering SIP Vulnerabilities to DoS Attacks Using Coloured Petri Nets. 29-36 - Limin Liu, Jin Han, Debin Gao, Jiwu Jing, Daren Zha:
Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables. 37-44 - Ben S. Y. Fung, Patrick P. C. Lee:
A Privacy-Preserving Defense Mechanism against Request Forgery Attacks. 45-52 - Lei Zhang, Shui Yu, Di Wu, Paul A. Watters:
A Survey on Latest Botnet Attack and Defense. 53-60 - Zorana Bankovic, José Manuel Moya, Juan Carlos Vallejo, David Fraga, Pedro Malagón:
Holistic Solution for Confining Insider Attacks in Wireless Sensor Networks Using Reputation Systems Coupled with Clustering Techniques. 61-72 - Jianan Hao, Wentong Cai:
Trusted Block as a Service: Towards Sensitive Applications on the Cloud. 73-82 - Miao Zhou, Yi Mu, Willy Susilo, Man Ho Au, Jun Yan:
Privacy-Preserved Access Control for Cloud Computing. 83-90 - Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic:
DACC: Distributed Access Control in Clouds. 91-98 - Imad M. Abbadi, Muntaha Alawneh, Andrew P. Martin:
Secure Virtual Layer Management in Clouds. 99-110 - Mahbub Ahmed, Yang Xiang:
Trust Ticket Deployment: A Notion of a Data Owner's Trust in Cloud Computing. 111-117 - Jemal H. Abawajy:
Establishing Trust in Hybrid Cloud Computing Environments. 118-125 - Lingfeng Chen, Doan B. Hoang:
Towards Scalable, Fine-Grained, Intrusion-Tolerant Data Protection Models for Healthcare Cloud. 126-133 - Mark Heydenrych, Elizabeth Marie Ehlers:
A Charged PSO Inspired Method for Generating Immune Detectors for Network Intrusion Detection. 134-141 - Ji Guo, Alan Marshall, Bosheng Zhou:
A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad Hoc Networks. 142-149 - Shaoyin Cheng, Jun Yang, Jiajie Wang, Jinding Wang, Fan Jiang:
LoongChecker: Practical Summary-Based Semi-simulation to Detect Vulnerability in Binary Code. 150-159 - Hong Song, Xiao Xiao, Weiping Wang, Luming Yang:
DENNC: A Wireless Malicious Detection Approach Based on Network Coding. 160-165 - Chi-Man Pun, Xiaochen Yuan, C. L. Philip Chen:
Geometric Invariant Digital Image Watermarking Scheme Based on Feature Points Detector and Histogram Distribution. 166-172 - Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe:
Forecasting the Distribution of Network Traffic for Anomaly Detection. 173-180 - Silvio Cesare, Yang Xiang:
Malware Variant Detection Using Similarity Search over Sets of Control Flow Graphs. 181-189 - Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel:
A Method for Detecting Unknown Malicious Executables. 190-196 - Shao-Yu Wu, Ming-Hung Wang, Kuan-Ta Chen:
Privacy Crisis Due to Crisis Response on the Web. 197-205 - Mahdi Asadpour, Mohammad Torabi Dashti:
A Privacy-Friendly RFID Protocol Using Reusable Anonymous Tickets. 206-213 - Sebastian Ries, Marc Fischlin, Leonardo A. Martucci, Max Mühlhäuser:
Learning Whom to Trust in a Privacy-Friendly Way. 214-225 - Qingrui Li, Juan Li, Hui Wang, Ashok Ginjala:
Semantics-Enhanced Privacy Recommendation for Social Networking Sites. 226-233 - Hervais Simo Fhom, Kpatcha M. Bayarou:
Towards a Holistic Privacy Engineering Approach for Smart Grid Systems. 234-241 - Ricardo Jorge Santos, Jorge Bernardino, Marco Vieira:
Balancing Security and Performance for Enhancing Data Privacy in Data Warehouses. 242-249 - Lili Sun, Hua Wang, Xiaohui Tao, Yanchun Zhang, Jing Yang:
Privacy Preserving Access Control Policy and Algorithms for Conflicting Problems. 250-257 - Wanita Sherchan, Surya Nepal, Athman Bouguettaya:
A Trust Prediction Model for Service Web. 258-265 - Lizi Zhang, Hui Fang, Wee Keong Ng, Jie Zhang:
IntRank: Interaction Ranking-Based Trustworthy Friend Recommendation. 266-273 - Zheng Yan, Raimo Kantola, Peng Zhang:
A Research Model for Human-Computer Trust Interaction. 274-281 - Sancheng Peng, Guojun Wang:
Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks. 282-287 - Aarthi Krishna, Vijay Varadharajan:
A Hybrid Trust Model for Authorisation Using Trusted Platforms. 288-295 - Partheeban Chandrasekaran, Babak Esfandiari:
A Model for a Testbed for Evaluating Reputation Systems. 296-303 - Ruixuan Li, Li Nie, Xiaopu Ma, Meng Dong, Wei Wang:
SMEF: An Entropy-Based Security Framework for Cloud-Oriented Service Mashup. 304-311 - Hui Fang, Jie Zhang, Murat Sensoy, Nadia Magnenat-Thalmann:
A Reputation Mechanism for Virtual Reality - Five-Sense Oriented Feedback Provision and Subjectivity Alignment. 312-319 - Wenjun Jiang, Guojun Wang:
SWTrust: Generating Trusted Graph for Trust Evaluation in Online Social Networks. 320-327 - Jianming Fu, Xinwen Liu, Binling Cheng:
Malware Behavior Capturing Based on Taint Propagation and Stack Backtracing. 328-335 - Quan Bai, Xing Su, Qing Liu, Andrew Terhorst, Minjie Zhang, Yi Mu:
Case-Based Trust Evaluation from Provenance Information. 336-343 - Han Jiao, Jixue Liu, Jiuyong Li, Chengfei Liu:
A Framework for Reputation Bootstrapping Based on Reputation Utility and Game Theories. 344-351 - Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai:
Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Based on Domain and IP Address Registration. 352-361 - Rehab Alnemr, Maxim Schnjakin, Christoph Meinel:
Towards Context-Aware Service-Oriented Semantic Reputation Framework. 362-372 - Xiaolin Cao, Máire O'Neill:
A Private and Scalable Authentication for RFID Systems Using Reasonable Storage. 373-380 - Yong Cheng, Zhiying Wang, Jiangjiang Wu, Songzhu Mei, Jiangchun Ren, Jun Ma:
SWHash: An Efficient Data Integrity Verification Scheme Appropriate for USB Flash Disk. 381-388 - Elankayer Sithirasenan, Saurabh Kumar, Khosrow Ramezani, Vallipuram Muthukkumarasamy:
An EAP Framework for Unified Authentication in Wireless Networks. 389-397 - Fangyong Hou, Nong Xiao, Hongjun He, Fang Liu:
Inter-Chip Authentication through I/O Character. 398-402 - Fuwen Liu, Hartmut König:
A Simple Balanced Password-Authenticated Key Agreement Protocol. 403-408 - Tassos Dimitriou, Ahmad Sabouri:
Pollination: A Data Authentication Scheme for Unattended Wireless Sensor Networks. 409-416 - Harinda Fernando, Jemal H. Abawajy:
Mutual Authentication Protocol for Networked RFID Systems. 417-424 - Wei Feng, Yu Qin, Aimin Yu, Dengguo Feng:
A DRTM-Based Method for Trusted Network Connection. 425-435 - Julian Jang, Hon Hwang, Surya Nepal:
Biometric Enabled Portable Trusted Computing Platform. 436-442 - André Seffrin, Sorin A. Huss:
Ensuring Secure Information Flow in Partially Reconfigurable Architectures by Means of Process Algebra Analysis. 443-450 - Firas Bader, Andra Radoveneanu, Hani Ragab Hassen:
A New Security Architecture for BitTorrent. 451-455 - Owen Sacco, Alexandre Passant, Stefan Decker:
An Access Control Framework for the Web of Data. 456-463 - Gonzalo Huerta Cánepa, Dongman Lee, Seon-Yeong Han:
Trust ME: A Trust Decision Framework for Mobile Environments. 464-471 - Yanjun Zuo, Suhas Lande:
A Logical Framework of Proof-Carrying Survivability. 472-481 - Rongrong Xi, Shuyuan Jin, Xiao-chun Yun, Yongzheng Zhang:
CNSSA: A Comprehensive Network Security Situation Awareness System. 482-487 - Daniel Granlund, Christer Åhlund:
A Scalability Study of AAA Support in Heterogeneous Networking Environments with Global Roaming Support. 488-493 - Youliang Tian, Jianfeng Ma, Changgen Peng, Jianming Zhu:
Secret Sharing Scheme with Fairness. 494-500 - Yongming Xie, Guojun Wang:
Distributed Private-Key Generation Scheme with Self-Certified Identity. 501-508 - Qian Sun, Min Wu:
A Double Key-Sharing Based False Data Filtering Scheme in Wireless Sensor Networks. 509-516 - Ahmed Al-Khazzar, Nick Savage:
Biometric Identification Using User Interactions with Virtual Worlds. 517-524 - Jianyong Huang, Willy Susilo, Jennifer Seberry:
Repeated Differential Properties of the AES-128 and AES-256 Key Schedules. 525-532 - Andriy Panchenko, Otto Spaniol, André Egners, Thomas Engel:
Lightweight Hidden Services. 533-540 - Lior Okman, Nurit Gal-Oz, Yaron Gonen, Ehud Gudes, Jenny Abramov:
Security Issues in NoSQL Databases. 541-547 - Muhammad Bashir Abdullahi, Guojun Wang, Felix Musau:
A Reliable and Secure Distributed In-network Data Storage Scheme in Wireless Sensor Networks. 548-555 - Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi:
Trust-Based Approaches to Solve Routing Issues in Ad-Hoc Wireless Networks: A Survey. 556-563 - Miao Xie, Song Han, Biming Tian:
Highly Efficient Distance-Based Anomaly Detection through Univariate with PCA in Wireless Sensor Networks. 564-571 - Junjie Xiong, Edith C. H. Ngai, Yangfan Zhou, Michael R. Lyu:
RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks. 572-581 - Fabio Marturana, Gianluigi Me, Rosamaria Berte, Simone Tacconi:
A Quantitative Approach to Triaging in Mobile Forensics. 582-588 - Raihana Ferdous, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan:
Trust-Based Cluster Head Selection Algorithm for Mobile Ad Hoc Networks. 589-596 - Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Cross-Platform Application Sharing Mechanism. 597-605 - Udaya Kiran Tupakula, Vijay Varadharajan:
TVLAN: Trusted and Virtualised Local Area Networks. 606-612 - Hsiao-Ying Lin, Wen-Guey Tzeng, Bao-Shuh Paul Lin:
A Decentralized Repair Mechanism for Decentralized Erasure Code Based Storage Systems. 613-620 - Helen Balinsky, Neil C. A. Moore, Steven J. Simske:
Intelligent Assistant for Context-Aware Policies. 621-630 - Helen Balinsky, Liqun Chen, Steven J. Simske:
Publicly Posted Composite Documents in Variably Ordered Workflows. 631-638 - Trey Reece, Daniel B. Limbrick, William H. Robinson:
Design Comparison to Identify Malicious Hardware in External Intellectual Property. 639-646 - Zheng Yan, Raimo Kantola, Yue Shen:
Unwanted Traffic Control via Global Trust Management. 647-654 - Andreu Pere Isern-Deyà, M. Francisca Hinarejos, Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà:
A Secure Multicoupon Solution for Multi-merchant Scenarios. 655-663 - Stephen W. Neville, Michael Horie:
Efficiently Achieving Full Three-Way Non-repudiation in Consumer-Level eCommerce and M-Commerce Transactions. 664-672 - Haiyang Jiang, Jianhua Yang, Gaogang Xie:
Exploring and Enhancing the Performance of Parallel IDS on Multi-core Processors. 673-680 - Bhume Bhumiratana:
A Model for Automating Persistent Identity Clone in Online Social Network. 681-686 - Kaiyu Wan, Vangalur S. Alagar:
Dependable Context-Sensitive Services in Cyber Physical Systems. 687-694 - Rongwei Yu, Lei Zhao, Lina Wang, Xiaodan Yin:
Statistical Fault Localization via Semi-dynamic Program Slicing. 695-700 - Chunlei Mei, Maoxiang Yi, Zhifei Shen:
Decreasing SoC Test Power Dissipation and Test Data Volume Based on Pattern Recombination. 701-705 - Carlos Ballester Lafuente, Xavier Titi, Jean-Marc Seigneur:
Flexible Communication: A Secure and Trust-Based Free Wi-Fi Password Sharing Service. 706-713 - Fatemeh Barani, Mahdi Abadi:
An ABC-AIS Hybrid Approach to Dynamic Anomaly Detection in AODV-Based MANETs. 714-720 - Mohammad Amin Morid, Amin Omidvar, Hamid Reza Shahriari:
An Enhanced Method for Computation of Similarity between the Contexts in Trust Evaluation Using Weighted Ontology. 721-725 - Tong Liu, Prathima Agrawal:
A Trusted Integrity Measurement Architecture for Securing Enterprise Network. 726-731 - Fang Huang, Cai-xia Wang, Jun Long:
Design and Implementation of Single Sign on System with Cluster CAS for Public Service Platform of Science and Technology Evaluation. 732-737 - Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård:
A Framework for the Assessment of the Trustworthiness of Digital Records over Time. 738-744 - Mei Liu, Ge Fu, Jiwu Jing:
eHCBAC: Flexible Column Based Access Control for Electronic Healthcare Systems. 745-750 - Aimin Yu, Shijun Zhao:
Enhancing Flexibility of TCG's TNC through Layered Property Attestation. 751-756 - Md. Tanzim Khorshed, A. B. M. Shawkat Ali, Saleh A. Wasimi:
Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning. 757-764 - Ryan K. L. Ko, Peter Jagadpramana, Bu-Sung Lee:
Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments. 765-771 - Xinxin Fan, Guang Gong, Honggang Hu:
Remedying the Hummingbird Cryptographic Algorithm. 772-778 - Jinfang Sheng, Wen Zou, Liu Yang, Bin Wang:
A RFID-Based Context-Aware Service Model. 779-784 - Muntaha Alawneh, Imad M. Abbadi:
Defining and Analyzing Insiders and Their Threats in Organizations. 785-794 - Chi-Man Pun, Jing-Jing Jiang, C. L. Philip Chen:
Adaptive Client-Side LUT-Based Digital Watermarking. 795-799 - Fei Tang, Changlu Lin, Yong Li, Shengyuan Zhang:
Identity-Based Strong Designated Verifier Signature Scheme with Full Non-Delegatability. 800-805 - Hyun-Jung Lee, Kwang-Woo Lee, Dongho Won:
Protection Profile of Personal Information Security System: Designing a Secure Personal Information Security System. 806-811 - Chi-won Song, Sungmin Park, Dongwook Kim, Sooyong Kang:
Parity Cloud Service: A Privacy-Protected Personal Data Recovery Service. 812-817 - Warodom Werapun, Julien Fasson, Béatrice Paillassa:
Home Service Communities and Authentication. 818-823 - Qiang Wang, Xue Qiu, Quan Zhang, Chaojing Tang:
Key Privacy in McEliece Public Key Cryptosystem. 824-828 - Ronald Petrlic:
Integrity Protection for Automated Teller Machines. 829-834 - Felix Musau, Guojun Wang, Muhammad Bashir Abdullahi:
Group Formation with Neighbor Similarity Trust in P2P E-Commerce. 835-840 - Surya Nepal, Wanita Sherchan, Cécile Paris:
STrust: A Trust Model for Social Networks. 841-846 - Mohd Izuan Hafez Ninggal, Jemal H. Abawajy:
Attack Vector Analysis and Privacy-Preserving Social Network Data Publishing. 847-852 - Zheng Yan, Raimo Kantola, Peng Zhang:
Theoretical Issues in the Study of Trust in Human-Computer Interaction. 853-856 - Yu Chen, Zheng Yan, Valtteri Niemi:
Implementation of a Reputation System for Pervasive Social Networking. 857-862