default search action
13th TrustCom 2014: Beijing, China
- 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-6513-7
Privacy in Mobile & Wireless Networks
- Fucai Zhu, Xingyang He, Shuang Wang, Jian Xu, Mingwei Wang, Lina Wu:
A Clustering-Based Privacy-Preserving Method for Uncertain Trajectory Data. 1-8 - Bo Yang, Dengguo Feng, Yu Qin:
A Lightweight Anonymous Mobile Shopping Scheme Based on DAA for Trusted Mobile Platform. 9-17 - Yao Cheng, Chang Xu, Yi Yang, Lingyun Ying, Purui Su, Dengguo Feng:
Automated User Profiling in Location-Based Mobile Messaging Applications. 18-26 - Su Mon Kywe, Christopher Landis, Yutong Pei, Justin Satterfield, Yuan Tian, Patrick Tague:
PrivateDroid: Private Browsing Mode for Android. 27-36 - Ashar Javed, Christian Merz, Jörg Schwenk:
TTPCookie: Flexible Third-Party Cookie Management for Increasing Online Privacy. 37-44
Privacy and Trust in Social Networks
- Mu Yang, Yijun Yu, Arosha K. Bandara, Bashar Nuseibeh:
Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit. 45-52 - Tommi Meskanen, Valtteri Niemi, Noora Nieminen:
Garbling in Reverse Order. 53-60 - Peili Li, Haixia Xu, Jiaqi Hong:
Private Outsourcing of Polynomial Functions. 61-68 - Kang Zhao, Li Pan:
A Machine Learning Based Trust Evaluation Framework for Online Social Networks. 69-74 - Yu Bai, Gang Yin, Huaimin Wang:
Multi-dimensions of Developer Trustworthiness Assessment in OSS Community. 75-81
Security Algorithms
- Mohammed A. Ambusaidi, Xiangjian He, Zhiyuan Tan, Priyadarsi Nanda, Liang Fu Lu, Upasana T. Nagar:
A Novel Feature Selection Approach for Intrusion Detection Data Classification. 82-89 - Ziyu Wang, Jiahai Yang, Fuliang Li:
An On-Line Anomaly Detection Method Based on a New Stationary Metric - Entropy-Ratio. 90-97 - Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey:
Reaching Agreement in Security Policy Negotiation. 98-105 - Yunxi Zhang, Darren Mundy:
Remembrance of Local Information Status for Enforcing Robustness of Policy-Exchanged Strategies for Trust Negotiation. 106-113 - Fábio Borges, Leonardo A. Martucci, Filipe Beato, Max Mühlhäuser:
Secure and Privacy-Friendly Public Key Generation and Certification. 114-121
Security Applications
- Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan:
A Stateful Mechanism for the Tree-Rule Firewall. 122-129 - Md. Sadek Ferdous, Ron Poet:
CAFS: A Framework for Context-Aware Federated Services. 130-139 - Yong Ho Hwang, Jae Woo Seo, Il Joo Kim:
Encrypted Keyword Search Mechanism Based on Bitmap Index for Personal Storage Services. 140-147 - Shuai Liu, Lei Ju, Xiaojun Cai, Zhiping Jia, Zhiyong Zhang:
High Performance FPGA Implementation of Elliptic Curve Cryptography over Binary Fields. 148-155 - Chongxian Guo, Huaqiang Xu, Lei Ju, Zhiping Jia, Jihai Xu:
A High-Performance Distributed Certificate Revocation Scheme for Mobile Ad Hoc Networks. 156-163
Security Systems
- Günter Fahrnberger:
SIMS: A Comprehensive Approach for a Secure Instant Messaging Sifter. 164-173 - Wenjuan Li, Weizhi Meng, Zhiyuan Tan, Yang Xiang:
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. 174-181 - Zhenwei Zhao, Guoqiang Bai:
Ultra High-Speed SM2 ASIC Implementation. 182-188 - Yu Zhou, Yongzheng Zhang, Jun Xiao, Yipeng Wang, Weiyao Lin:
Visual Similarity Based Anti-phishing with the Combination of Local and Global Features. 189-196 - Chunqiang Hu, Fan Zhang, Tao Xiang, Hongjuan Li, Xiao Xiao, Guilin Huang:
A Practically Optimized Implementation of Attribute Based Cryptosystems. 197-204
Authentication
- Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, Zhiyuan Tan, Ren Ping Liu:
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. 205-211 - Licai Liu, Lihua Yin, Yunchuan Guo, Bingxing Fang:
Bargaining-Based Dynamic Decision for Cooperative Authentication in MANETs. 212-220 - Uthpala Subodhani Premarathne, Ibrahim Khalil:
Multiplicative Attributes Graph Approach for Persistent Authentication in Single-Sign-On Mobile Systems. 221-228 - Weixi Gu, Zheng Yang, Longfei Shangguan, Xiaoyu Ji, Yiyang Zhao:
ToAuth: Towards Automatic Near Field Authentication for Smartphones. 229-236 - Xiaoming Wang, Heyou Cheng, Ruihua Zhang:
One Kind of Cross-Domain DAA Scheme from Bilinear Mapping. 237-243
Attack & Defense
- Jia Yan, Lingyun Ying, Yi Yang, Purui Su, Dengguo Feng:
Long Term Tracking and Characterization of P2P Botnet. 244-251 - Shixiong Yao, Jing Chen, Ruiying Du, Lan Deng, Chiheng Wang:
A Survey of Security Network Coding toward Various Attacks. 252-259 - Xuerui Pan, Yibing Zhongyang, Zhi Xin, Bing Mao, Hao Huang:
Defensor: Lightweight and Efficient Security-Enhanced Framework for Android. 260-267 - Hui Cui, Yi Mu, Man Ho Au:
Public-Key Encryption Resilient against Linear Related-Key Attacks Revisited. 268-275 - Ya Tan, Jizeng Wei, Wei Guo:
The Micro-architectural Support Countermeasures against the Branch Prediction Analysis Attack. 276-283
Security and Trust in Cloud Computing (1)
- Ahmed Taha, Rubén Trapero, Jesus Luna, Neeraj Suri:
AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security. 284-291 - Zhiquan Lv, Jialin Chi, Min Zhang, Dengguo Feng:
Efficiently Attribute-Based Access Control for Mobile Cloud Storage System. 292-299 - Liang Deng, Qingkai Zeng, Weiguang Wang, Yao Liu:
EqualVisor: Providing Memory Protection in an Untrusted Commodity Hypervisor. 300-309 - Yu Zhang, Jing Chen, Ruiying Du, Lan Deng, Yang Xiang, Qing Zhou:
FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing. 310-319 - Kao Zhao, Hai Jin, Deqing Zou, Weiqi Dai:
ONHelp: Components in Building Secure Cloud Based on OpenNebula. 320-327
Security and Trust in Cloud Computing (2)
- Ruiying Du, Lan Deng, Jing Chen, Kun He, Minghui Zheng:
Proofs of Ownership and Retrievability in Cloud Storage. 328-335 - Nihal Balani, Sushmita Ruj:
Temporal Access Control with User Revocation for Cloud Data. 336-343 - Udaya Kiran Tupakula, Vijay Varadharajan:
Trust Enhanced Cloud Security for Healthcare Services. 344-351 - Nicolae Paladi, Mudassar Aslam, Christian Gehrmann:
Trusted Geolocation-Aware Data Placement in Infrastructure Clouds. 352-360 - Yuanlong Cao, Jianfeng Guan, Changqiao Xu, Wei Quan, Hongke Zhang:
Cognitive Adaptive Access-Control System for a Secure Locator/Identifier Separation Context. 361-369
Security in Mobile Networks
- Julian Schütte, Dennis Titze, José María de Fuentes:
AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps. 370-379 - Shuai Zhao, Xiaohong Li, Guangquan Xu, Lei Zhang, Zhiyong Feng:
Attack Tree Based Android Malware Detection with Hybrid Analysis. 380-387 - Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon:
Automatically Exploiting Potential Component Leaks in Android Applications. 388-397 - Kamran Zaidi, Milos Milojevic, Veselin Rakocevic, Muttukrishnan Rajarajan:
Data-centric Rogue Node Detection in VANETs. 398-405 - Tong Shen, Yibing Zhongyang, Zhi Xin, Bing Mao, Hao Huang:
Detect Android Malware Variants Using Component Based Topology Graph. 406-413
Network Security
- Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan:
Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation. 414-421 - Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes:
Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR. 422-431 - Zhihui Han, Liang Cheng, Yang Zhang, Shuke Zeng, Yi Deng, Xiaoshan Sun:
Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones. 432-439 - Charles Thevathayan, Peter Bertók, George Fernandez:
Synthesising End-to-End Security Protocols. 440-447
Parallel and Distributed Trust Applications
- Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron:
Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager. 448-456 - Byungho Min, Vijay Varadharajan:
Design and Analysis of a New Feature-Distributed Malware. 457-464 - Meng Li, Hiroki Nishiyama, Yasunori Owada, Kiyoshi Hamaguchi:
On Energy Efficient Scheduling and Load Distribution Based on Renewable Energy for Wireless Mesh Network in Disaster Area. 465-472 - Hui Xia, Jia Yu, Zhiyong Zhang, Xiangguo Cheng, Zhenkuan Pan:
Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs. 473-480 - Guanghao Wang, Yue Wu:
BIBRM: A Bayesian Inference Based Road Message Trust Model in Vehicular Ad Hoc Networks. 481-486
Trust Modeling and Algorithms
- JooYoung Lee, Jae C. Oh:
Convergence of True Cooperations in Bayesian Reputation Game. 487-494 - Roberto Sassu, Gianluca Ramunno, Antonio Lioy:
Practical Assessment of Biba Integrity for TCG-Enabled Platforms. 495-504 - Ahmad A. Kardan, Reza Salarmehr, Azade Farshad:
SigmoRep: A Robust Reputation Model for Open Collaborative Environments. 505-510 - Dongxia Wang, Tim Muller, Yang Liu, Jie Zhang:
Towards Robust and Effective Trust Management for Security: A Survey. 511-518 - Zeinab Noorian, Johnson Iyilade, Mohsen Mohkami, Julita Vassileva:
Trust Mechanism for Enforcing Compliance to Secondary Data Use Contracts. 519-526
Trust Applications and Systems
- Jun Li, Xiangqing Chang, Yongmao Ren, Zexin Zhang, Guodong Wang:
An Effective Path Load Balancing Mechanism Based on SDN. 527-533 - Christipher Jenkins, Lyndon Pierson:
Integrity Levels: A New Paradigm for Protecting Computing Systems. 534-543 - Michael Weiß, Steffen Wagner, Roland Hellman, Sascha Wessel:
Integrity Verification and Secure Loading of Remote Binaries for Microkernel-Based Runtime Environments. 544-551 - Ximing Fu, Zhiqing Xiao, Shenghao Yang:
Overhead-Free In-Place Recovery Scheme for XOR-Based Storage Codes. 552-557 - Zidan Yu, Huiqun Yu:
Untrusted User Detection in Microblogs. 558-564
Identity Management Systems and Mechanism
- Sanami Nakagawa, Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, Yusuke Sakai:
A Privacy-Enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures. 565-574 - Jiannan Wei, Guomin Yang, Yi Mu:
Anonymous Proxy Signature with Restricted Traceability. 575-581 - Shenglong Ding, Yiming Zhao, Yuyang Liu:
Efficient Traceable Attribute-Based Signature. 582-589 - Jianming Fu, Yan Lin, Xu Zhang, Pengwei Li:
Computation Integrity Measurement Based on Branch Transfer. 590-597 - Zheng Wang, Liyuan Xiao:
Emergency Key Rollover in DNSSEC. 598-604
Social Networking with Big Data
- Zheng Xu, Hui Zhang, Yunhuai Liu, Lin Mei:
Crowd Sensing of Urban Emergency Events Based on Social Media Big Data. 605-610 - Liang Chen, Kan Chen, Chengcheng Shao, Peidong Zhu:
SocAware: A Middleware for Social Applications in Online Social Networks. 611-615 - Conghuan Ye, Zenggang Xiong, Yaoming Ding, Jiping Li, Guangwei Wang, Xuemin Zhang, Kaibing Zhang:
Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed Domain. 616-621 - Phillip Viana, Liria M. Sato:
A Proposal for a Reference Architecture for Long-Term Archiving, Preservation, and Retrieval of Big Data. 622-629 - Yingxu Wang, Victor J. Wiebe:
Big Data Analyses for Collective Opinion Elicitation in Social Networks. 630-637
Big Data Storage
- Zhou Lei, Zhaoxin Li, Yu Lei, Yanling Bi, Luokai Hu, Wenfeng Shen:
An Improved Image File Storage Method Using Data Deduplication. 638-643 - Ningyu Zhang, Guozhou Zheng, Huajun Chen, Jiaoyan Chen, Xi Chen:
HBaseSpatial: A Scalable Spatial Data Storage Based on HBase. 644-651 - Parinaz Ameri, Udo Grabowski, Jörg Meyer, Achim Streit:
On the Application and Performance of MongoDB for Climate Satellite Data. 652-659 - Zhangxuan Luo, Guoyan Xu:
Research of Provenance Storage in Cloud Computing Environment. 660-664 - Frank Zhigang Wang, Theo Dimitrakos, Na Helian, Sining Wu, Yuhui Deng, Ling Li, Rodric Yates:
Data Interface All-iN-A-Place (DIANA) for Big Data. 665-672
Big Data Processing
- Jaehun Lee, Sungmin Park, Minsoo Ryu, Sooyong Kang:
Performance Evaluation of the SSD-Based Swap System for Big Data Processing. 673-680 - Chen Fu, Bai Xue, Zhan Shaobin:
A Study on Recursive Neural Network Based Sentiment Classification of Sina Weibo. 681-685 - Chenhui Li, George Baciu:
VALID: A Web Framework for Visual Analytics of Large Streaming Data. 686-692 - Bin Zhou, Hai Jin, Ran Zheng:
A High Speed Lossless Compression Algorithm Based on CPU and GPU Hybrid Platform. 693-698
Big Data Application
- Dong Wang, Shunfang Wang:
Improved 2DLDA Algorithm and Its Application in Face Recognition. 707-713 - Kyungwoo Kang, Yunhee Kang, Sungjin Sul:
The Evaluation of Emulab as an Environment for Bio-Informatics Research. 714-720 - Lianyong Qi, Jiancheng Ni, Xiaona Xia, Chao Yan, Hua Wang, Wanli Huang:
A Evaluation Method for Web Service with Large Numbers of Historical Records. 721-726 - Steve Hallman, Jasur Rakhimov, Michel Plaisent, Prosper Bernard:
BIG DATA: Preconditions to Productivity. 727-731 - Wilton W. T. Fok, Haohua Chen, Jiaqu Yi, Sizhe Li, H. H. Au Yeung, Wang Ying, Liu Fang:
Data Mining Application of Decision Trees for Student Profiling at the Open University of China. 732-738
MapReduce for Big Data
- Mohamed Nabeel, Nabanita Maji, Jing Zhang, Nataliya Timoshevskaya, Wu-chun Feng:
Aeromancer: A Workflow Manager for Large-Scale MapReduce-Based Scientific Workflows. 739-746 - Jianwei Ding, Yingbo Liu, Li Zhang, Jianmin Wang:
MapReduce for Large-Scale Monitor Data Analyses. 747-754 - Chun-Yu Wang, Tzu-Li Tai, Kuan-Chieh Huang, Tse-En Liu, Jyh-Biau Chang, Ce-Kuen Shieh:
FedLoop: Looping on Federated MapReduce. 755-762 - Muhammad Idris, Shujaat Hussain, Sungyoung Lee:
In-Map/In-Reduce: Concurrent Job Execution in MapReduce. 763-768
Big Data & Optimization
- Jisheng Pei, Xiaojun Ye:
Towards Policy Retrieval for Provenance Based Access Control Model. 769-776 - Bruce Martin:
SARAH - Statistical Analysis for Resource Allocation in Hadoop. 777-782 - Yunmei Lu, Piyaphol Phoungphol, Yanqing Zhang:
Privacy Aware Non-linear Support Vector Machine for Multi-source Big Data. 783-789 - Jiehua Kang, Guoyan Xu:
Modeling of Data Provenance on Space and Time Based on OPM. 790-794 - Wei Gao, Mingzhong Wang, Liehuang Zhu, Xiaoping Zhang:
Threshold-Based Secure and Privacy-Preserving Message Verification in VANETs. 795-802
Future Internet and Network Security
- Yuangang Yao, Xiaoyu Ma, Hui Liu, Jin Yi, Xianghui Zhao, Lin Liu:
A Semantic Knowledge Base Construction Method for Information Security. 803-808 - Daniel Kaiser, Marcel Waldvogel:
Adding Privacy to Multicast DNS Service Discovery. 809-816 - Dmytro Zhuravlev, Ihor Samoilovych, Roman Orlovskyi, Ievgen V. Bondarenko, Yaroslav Lavrenyuk:
Encrypted Program Execution. 817-822 - Duo Liu, Chung-Horng Lung, Nabil Seddigh, Biswajit Nandy:
Network Traffic Anomaly Detection Using Adaptive Density-Based Fuzzy Clustering. 823-830 - Raja Naeem Akram, Ryan K. L. Ko:
Unified Model for Data Security - A Position Paper. 831-839 - Ali Hussein Raheem, Aboubaker Lasebae, Jonathan Loo:
A Secure Authentication Protocol for IP-Based Wireless Sensor Communications Using the Location/ID Split Protocol (LISP). 840-845
Network Optimization and Performance Evaluation
- Tianyong Ao, Zhangqing He, Jinli Rao, Kui Dai, Xuecheng Zou:
A Compact Hardware Implementation of SM3 Hash Function. 846-850 - Yuanhao Zhou, Mingfa Zhu, Limin Xiao, Li Ruan, Wenbo Duan, Deguo Li, Rui Liu, Mingming Zhu:
A Load Balancing Strategy of SDN Controller Based on Distributed Decision. 851-856 - Florian Volk, Maria Pelevina, Sheikh Mahbub Habib, Sascha Hauke, Max Mühlhäuser:
Modeling Degrees of Fairness for Collaborations. 857-864 - Tao Zhou, Quan Wang, Gao-Cai Wang:
Performance Analysis on M2M Communication Network Based on Stochastic Network Calculus. 865-870 - Hongbin Pei, Xiaohong Li, Guangquan Xu, Zhiyong Feng:
Mining Specification of Insecure Browser Extension Behavior. 871-876
Security, Privacy, and Anonymity in Internet of Things
- Daiyong Quan, Lidong Zhai, Fan Yang, Peng Wang:
Detection of Android Malicious Apps Based on the Sensitive Behaviors. 877-883 - Raja Naeem Akram, Ryan K. L. Ko:
Digital Trust - Trusted Computing and Beyond: A Position Paper. 884-892 - Xiaolei Wang, Jie He, Yuexiang Yang:
Identifying P2P Network Activities on Encrypted Traffic. 893-899 - Sufian Hameed, Bilal Hameed, Syed Atyab Hussain, Waqas Khalid:
Lightweight Security Middleware to Detect Malicious Content in NFC Tags or Smart Posters. 900-905 - Chaoliang Li, Qin Li, Guojun Wang:
Survey of Integrity Detection Methods in Internet of Things. 906-913 - Hongfeng Chai, Zhijun Lu, Qingyang Meng, Jun Wang, Xiubang Zhang, Zhijian Zhang:
TEEI - A Mobile Security Infrastructure for TEE Integration. 914-920
Cloud Computing
- Maria Krotsiani, George Spanoudakis:
Continuous Certification of Non-repudiation in Cloud Storage Services. 921-928 - Haihe Ba, Zhiying Wang, Jiangchun Ren, Huaizhe Zhou:
JVM-Based Dynamic Attestation in Cloud Computing. 929-934 - Ben Martini, Kim-Kwang Raymond Choo:
Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept. 935-942 - Hao Zhang, Lei Zhao, Lai Xu, Lina Wang, Deming Wu:
vPatcher: VMI-Based Transparent Data Patching to Secure Software in the Cloud. 943-948 - Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud. 949-954
UbiSafe Computing
- Lingjiao Chen, Xinji Chen, Zhigang Peng:
A Novel Public Key Encryption Scheme for Large Image. 955-960 - Guorui Li, Ying Liu, Ying Wang:
Analysis of the Count-Min Sketch Based Anomaly Detection Scheme in WSN. 961-966 - Chaohui Du, Guoqiang Bai:
Attacks on Physically-Embedded Data Encryption for Embedded Devices. 967-972 - Hani Moaiteq Aljahdali, Ron Poet:
Challenge Set Designs and User Guidelines for Usable and Secured Recognition-Based Graphical Passwords. 973-982 - Baden Delamore, Ryan K. L. Ko:
Escrow: A Large-Scale Web Vulnerability Assessment Tool. 983-988 - Zheng Yan, Xueyun Li, Raimo Kantola:
Personal Data Access Based on Trust Assessment in Mobile Social Networking. 989-994
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.