default search action
12. ASIAN 2007: Doha, Qatar
- Iliano Cervesato:
Advances in Computer Science - ASIAN 2007. Computer and Network Security, 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings. Lecture Notes in Computer Science 4846, Springer 2007, ISBN 978-3-540-76927-9
Invited Speaker
- Andrei Sabelfeld:
Dimensions of Declassification in Theory and Practice. 1
Program Security
- Seokwoo Choi, Heewan Park, Hyun-il Lim, Taisook Han:
A Static Birthmark of Binary Executables Based on API Call Structure. 2-16 - Takahiro Kosakai, Toshiyuki Maeda, Akinori Yonezawa:
Compiling C Programs into a Strongly Typed Assembly Language. 17-32 - Gurvan Le Guernic:
Information Flow Testing. 33-47
Short Papers on Computer Security
- Gavin O'Gorman, Stephen Blott:
Large Scale Simulation of Tor: . 48-54 - Junji Nakazato, Lihua Wang, Akihiro Yamamura:
Privacy Enhancing Credentials. 55-61 - Sriperumbuduru Kandala Simhalu, Keiji Takeda:
Browser Based Agile E-Voting System. 62-69 - Muhammad Torabi Dashti, Yanjing Wang:
Risk Balance in Exchange Protocols. 70-77 - Hyoungshick Kim:
Scalable DRM System for Media Portability. 78-85 - Gergei Bana, Koji Hasebe, Mitsuhiro Okada:
Computational Semantics for Basic Protocol Logic - A Stochastic Approach. 86-94
Access Control
- Mohammad Jafari, Mohammad Fathian:
Management Advantages of Object Classification in Role-Based Access Control (RBAC). 95-110 - Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
An Integrated Model for Access Control and Information Flow Requirements. 111-125 - Imad M. Abbadi:
Digital Rights Management Using a Master Control Device. 126-141
Invited Speaker
- Joshua D. Guttman:
How to do Things with Cryptographic Protocols. 142-149
Protocols
- Han Gao, Chiara Bodei, Pierpaolo Degano, Hanne Riis Nielson:
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols. 150-165 - Mengjun Li, Ti Zhou, Zhoujun Li, Huowang Chen:
An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming. 166-180 - Vitaly Shmatikov, Ming-Hsiu Wang:
Secure Verification of Location Claims with Simultaneous Distance Modification. 181-195
Invited Speaker
- Kazuhiko Kato:
Modeling and Virtualization for Secure Computing Environments. 196-197
Intrusion Detection
- E. Ramirez-Silva, Marc Dacier:
Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces. 198-211 - Elie Bursztein, Jean Goubault-Larrecq:
A Logical Framework for Evaluating Network Resilience Against Faults and Attacks. 212-227 - Wilson Naik Bhukya, Suneel Kumar Kommuru, Atul Negi:
Masquerade Detection Based Upon GUI User Profiling in Linux Systems. 228-239
Short Papers on Network Security
- Atsushi Sakurai, Takashi Minohara, Ryota Sato, Keisuke Mizutani:
One-Time Receiver Address in IPv6 for Protecting Unlinkability. 240-246 - Jungsuk Song, Hayato Ohba, Hiroki Takakura, Yasuo Okabe, Kenji Ohira, Yongjin Kwon:
A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts. 247-253 - Ali Borji:
Combining Heterogeneous Classifiers for Network Intrusion Detection. 254-260 - Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas:
Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments. 261-267
Safe Execution
- Harshit J. Shah, R. K. Shyamasundar:
On Run-Time Enforcement of Policies. 268-281 - Michele Bugliesi, Damiano Macedonio, Sabina Rossi:
Static vs Dynamic Typing for Access Control in Pi-Calculus. 282-296 - Tomohiro Shioya, Yoshihiro Oyama, Hideya Iwasaki:
A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications. 297-311
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.