default search action
CODASPY 2013: San Antonio, TX, USA
- Elisa Bertino, Ravi S. Sandhu, Lujo Bauer, Jaehong Park:
Third ACM Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013. ACM 2013, ISBN 978-1-4503-1890-7 - Filipe Beato, Iulia Ion, Srdjan Capkun, Bart Preneel, Marc Langheinrich:
For some eyes only: protecting online information sharing. 1-12 - Sebastian Labitzke, Florian Werling, Jens Mittag, Hannes Hartenstein:
Do online social network friends still threaten my privacy? 13-24 - Mark A. Gondree, Zachary N. J. Peterson:
Geolocation of data in the cloud. 25-36 - Xihui Chen, Jun Pang:
Exploring dependency for query privacy protection in location-based services. 37-48
Privacy-preserving techniques and usage control
- Florian Kerschbaum:
Expression rewriting for optimizing secure computation. 49-58 - Weiyi Xia, Raymond Heatherly, Xiaofeng Ding, Jiuyong Li, Bradley A. Malin:
Efficient discovery of de-identification policy options through a risk-utility frontier. 59-70 - Florian Kelbert, Alexander Pretschner:
Data usage control enforcement in distributed systems. 71-82
Usable security and privacy
- Sumeet Gujrati, Eugene Y. Vasserman:
The usability of truecrypt, or how i learned to stop whining and fix an interface. 83-94 - Daniel Le Métayer:
Privacy by design: a formal framework for the analysis of architectural choices. 95-104 - Majid Arianezhad, L. Jean Camp, Timothy Kelley, Douglas Stebila:
Comparative eye tracking of experts and novices in web single sign-on. 105-116
Web security
- Wei Xu, Fangfang Zhang, Sencun Zhu:
JStill: mostly static detection of obfuscated malicious JavaScript code. 117-128 - Nazari Skrupsky, Prithvi Bisht, Timothy L. Hinrichs, V. N. Venkatakrishnan, Lenore D. Zuck:
TamperProof: a server-agnostic defense for parameter tampering attacks on web applications. 129-140 - Li Xu, Zhenxin Zhan, Shouhuai Xu, Keying Ye:
Cross-layer detection of malicious websites. 141-152
Poster session
- Salmin Sultana, Elisa Bertino:
A file provenance system. 153-156 - Razvan Rughinis:
Enhancing performance of searchable encryption in cloud computing. 157-160 - Devdatta Kulkarni:
A fine-grained access control model for key-value systems. 161-164 - Graciela Perera, Nathan Miller, John Mela, Michael P. McGarry, Jaime C. Acosta:
Emulating internet topology snapshots in deterlab. 165-168 - Mahdi N. Al-Ameen, Matthew K. Wright:
Persea: a sybil-resistant social DHT. 169-172 - S. M. Taiabul Haque, Matthew K. Wright, Shannon Scielzo:
A study of user password strategy for multiple accounts. 173-176 - Hans Lo, Gabriel Ghinita:
Authenticating spatial skyline queries with low communication overhead. 177-180 - Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino:
An efficient certificateless cryptography scheme without pairing. 181-184
Mobile-device security and privacy
- Wu Zhou, Yajin Zhou, Michael C. Grace, Xuxian Jiang, Shihong Zou:
Fast, scalable detection of "Piggybacked" mobile applications. 185-196 - Timothy Vidas, Nicolas Christin:
Sweetening android lemon markets: measuring and combating malware in application marketplaces. 197-208 - Vaibhav Rastogi, Yan Chen, William Enck:
AppsPlayground: automatic security analysis of smartphone applications. 209-220 - Sanae Rosen, Zhiyun Qian, Zhuoqing Morley Mao:
AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users. 221-232
Access control for applications
- Christoph Busold, Ahmed Taha, Christian Wachsmann, Alexandra Dmitrienko, Hervé Seudie, Majid Sobhani, Ahmad-Reza Sadeghi:
Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer. 233-242 - Rimma V. Nehme, Hyo-Sang Lim, Elisa Bertino:
FENCE: continuous access control enforcement in dynamic data stream environments. 243-254 - Zhongyuan Xu, Scott D. Stoller:
Mining parameterized role-based policies. 255-266
Keynote address
- Ronnie L. Killough:
I see we still like C. 267-268
Short papers: access control and uusage control for distributed systems
- Xiao Liang Hu, Sylvia L. Osborn:
A new approach for delegation in usage control. 269-276 - Adam Bates, Benjamin Mood, Masoud Valafar, Kevin R. B. Butler:
Towards secure provenance-based access control in cloud environments. 277-284 - Lianshan Sun, Jaehong Park, Ravi S. Sandhu:
Engineering access control policies for provenance-aware systems. 285-292 - Bin Zan, Zhanbo Sun, Marco Gruteser, Xuegang Ban:
Linking anonymous location traces through driving characteristics. 293-300
Short papers: users and security economics
- Naoki Tanaka, Marianne Winslett, Adam J. Lee, David K. Y. Yau, Feng Bao:
Insured access: an approach to ad-hoc information sharing for virtual organizations. 301-308 - Tongbo Luo, Xing Jin, Wenliang Du:
Mediums: visual integrity preserving framework. 309-316 - Ashwini Rao, Birendra Jha, Gananand Kini:
Effect of grammar on security of long passwords. 317-324 - Malgorzata Urbanska, Mark Roberts, Indrajit Ray, Adele E. Howe, Zinta S. Byrne:
Accepting the inevitable: factoring the user into home computer security. 325-332 - Rui Zhao, Chuan Yue:
All your browser-saved passwords could belong to us: a security analysis and a cloud-based new design. 333-340
Cloud and distributed computing security and privacy
- Wei Wei, Ting Yu, Rui Xue:
iBigTable: practical data integrity for bigtable in public cloud. 341-352 - Stephen R. Tate, Roopa Vishwanathan, Lance Everhart:
Multi-user dynamic proofs of data possession using trusted hardware. 353-364 - Anna Cinzia Squicciarini, Giuseppe Petracca, Elisa Bertino:
Adaptive data protection in distributed systems. 365-376 - Bo Chen, Reza Curtmola:
Towards self-repairing replication-based storage systems using untrusted clouds. 377-388
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.