Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Tsung-Hsuan Ho, Daniel Joseph Dean, Xiaohui Gu, William Enck |
PREC: practical root exploit containment for android devices. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Wu Zhou 0001, Zhi Wang 0004, Yajin Zhou, Xuxian Jiang |
DIVILAR: diversifying intermediate language for anti-repackaging on android platform. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Davide Alberto Albertini, Barbara Carminati |
Relationship-based information sharing in cloud-based decentralized social networks. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gabriel Ghinita, Razvan Rughinis |
An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ragib Hasan, Rasib Khan |
Interaction provenance model for unified authentication factors in service oriented computing. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Elisa Bertino, Ravi S. Sandhu, Jaehong Park (eds.) |
Fourth ACM Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, USA - March 03 - 05, 2014 |
CODASPY |
2014 |
DBLP BibTeX RDF |
|
1 | Ebrahim Tarameshloo, Philip W. L. Fong, Payman Mohassel |
On protection in federated social computing systems. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Seung-Hyun Seo, Jongho Won, Elisa Bertino |
POSTER: a pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mihai Maruseac, Gabriel Ghinita, Razvan Rughinis |
Privacy-preserving publication of provenance workflows. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Holger Kühner, Hannes Hartenstein |
Spoilt for choice: graph-based assessment of key management protocols to share encrypted data. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Chee Meng Tey, Payas Gupta, Kartik Muralidharan, Debin Gao |
Keystroke biometrics: the user perspective. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Saiful Islam, Mehmet Kuzu, Murat Kantarcioglu |
Inference attack against encrypted range queries on outsourced databases. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Allix, Tegawendé F. Bissyandé, Quentin Jérome, Jacques Klein, Radu State, Yves Le Traon |
Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with reality. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Haruna Kibirige, Lila Ghemri |
Trust ranking of medical websites. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Paul Giura, Ilona Murynets, Roger Piqueras Jover, Yevgeniy Vahlis |
Is it really you?: user identification via adaptive behavior fingerprinting. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tien Tuan Anh Dinh, Anwitaman Datta |
Streamforce: outsourcing access control enforcement for stream data to the clouds. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bastian Braun, Martin Johns, Johannes Köstler, Joachim Posegga |
PhishSafe: leveraging modern JavaScript API's for transparent and robust protection. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Koki Murakami, Tsuyoshi Yamada, Rie Shigetomi Yamaguchi, Masahiro Goshima, Shuichi Sakai |
A cloud architecture for protecting guest's information from malicious operators with memory management. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hussain M. J. Almohri, Danfeng (Daphne) Yao, Dennis G. Kafura |
DroidBarrier: know what is executing on your android. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yifei Wang, Srinivas Hariharan, Chenxi Zhao, Jiaming Liu, Wenliang Du |
Compac: enforce component-level access control in android. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jarret Raim |
Shared responsibility is better than no responsibility: federated encryption in the cloud. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Umer Arshad, Ashish Kundu, Elisa Bertino, Krishna Madhavan, Arif Ghafoor |
Security of graph data: hashing schemes and definitions. |
CODASPY |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Filipe Beato, Iulia Ion, Srdjan Capkun, Bart Preneel, Marc Langheinrich |
For some eyes only: protecting online information sharing. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Malgorzata Urbanska, Mark Roberts, Indrajit Ray, Adele E. Howe, Zinta S. Byrne |
Accepting the inevitable: factoring the user into home computer security. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rui Zhao 0005, Chuan Yue |
All your browser-saved passwords could belong to us: a security analysis and a cloud-based new design. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mahdi N. Al-Ameen, Matthew K. Wright |
Persea: a sybil-resistant social DHT. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Vaibhav Rastogi, Yan Chen 0004, William Enck |
AppsPlayground: automatic security analysis of smartphone applications. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ashwini Rao, Birendra Jha, Gananand Kini |
Effect of grammar on security of long passwords. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Salmin Sultana, Elisa Bertino |
A file provenance system. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wu Zhou 0001, Yajin Zhou, Michael C. Grace, Xuxian Jiang, Shihong Zou |
Fast, scalable detection of "Piggybacked" mobile applications. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Timothy Vidas, Nicolas Christin |
Sweetening android lemon markets: measuring and combating malware in application marketplaces. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sumeet Gujrati, Eugene Y. Vasserman |
The usability of truecrypt, or how i learned to stop whining and fix an interface. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lianshan Sun, Jaehong Park, Ravi S. Sandhu |
Engineering access control policies for provenance-aware systems. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Majid Arianezhad, L. Jean Camp, Timothy Kelley, Douglas Stebila |
Comparative eye tracking of experts and novices in web single sign-on. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Le Métayer |
Privacy by design: a formal framework for the analysis of architectural choices. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rimma V. Nehme, Hyo-Sang Lim, Elisa Bertino |
FENCE: continuous access control enforcement in dynamic data stream environments. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xihui Chen, Jun Pang 0001 |
Exploring dependency for query privacy protection in location-based services. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mark A. Gondree, Zachary N. J. Peterson |
Geolocation of data in the cloud. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tongbo Luo, Xing Jin, Wenliang Du |
Mediums: visual integrity preserving framework. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | S. M. Taiabul Haque, Matthew K. Wright, Shannon Scielzo |
A study of user password strategy for multiple accounts. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Adam Bates 0001, Benjamin Mood, Masoud Valafar, Kevin R. B. Butler |
Towards secure provenance-based access control in cloud environments. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Anna Cinzia Squicciarini, Giuseppe Petracca, Elisa Bertino |
Adaptive data protection in distributed systems. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Devdatta Kulkarni |
A fine-grained access control model for key-value systems. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wei Xu, Fangfang Zhang 0005, Sencun Zhu |
JStill: mostly static detection of obfuscated malicious JavaScript code. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hans Lo, Gabriel Ghinita |
Authenticating spatial skyline queries with low communication overhead. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sanae Rosen, Zhiyun Qian, Zhuoqing Morley Mao |
AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Li Xu, Zhenxin Zhan, Shouhuai Xu, Keying Ye |
Cross-layer detection of malicious websites. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Elisa Bertino, Ravi S. Sandhu, Lujo Bauer, Jaehong Park (eds.) |
Third ACM Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013 |
CODASPY |
2013 |
DBLP BibTeX RDF |
|
1 | Florian Kerschbaum |
Expression rewriting for optimizing secure computation. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ronnie L. Killough |
I see we still like C. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Naoki Tanaka, Marianne Winslett, Adam J. Lee, David K. Y. Yau, Feng Bao 0001 |
Insured access: an approach to ad-hoc information sharing for virtual organizations. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Bo Chen, Reza Curtmola |
Towards self-repairing replication-based storage systems using untrusted clouds. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Florian Kelbert, Alexander Pretschner |
Data usage control enforcement in distributed systems. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Graciela Perera, Nathan Miller, John Mela, Michael P. McGarry, Jaime C. Acosta |
Emulating internet topology snapshots in deterlab. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xiao Liang Hu, Sylvia L. Osborn |
A new approach for delegation in usage control. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christoph Busold, Ahmed Taha 0002, Christian Wachsmann, Alexandra Dmitrienko, Hervé Seudie, Majid Sobhani, Ahmad-Reza Sadeghi |
Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Bin Zan, Zhanbo Sun, Marco Gruteser, Xuegang Ban |
Linking anonymous location traces through driving characteristics. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Labitzke, Florian Werling, Jens Mittag, Hannes Hartenstein |
Do online social network friends still threaten my privacy? |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Stephen R. Tate, Roopa Vishwanathan, Lance Everhart |
Multi-user dynamic proofs of data possession using trusted hardware. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Razvan Rughinis |
Enhancing performance of searchable encryption in cloud computing. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nazari Skrupsky, Prithvi Bisht, Timothy L. Hinrichs, V. N. Venkatakrishnan, Lenore D. Zuck |
TamperProof: a server-agnostic defense for parameter tampering attacks on web applications. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino |
An efficient certificateless cryptography scheme without pairing. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Weiyi Xia, Raymond Heatherly, Xiaofeng Ding 0001, Jiuyong Li, Bradley A. Malin |
Efficient discovery of de-identification policy options through a risk-utility frontier. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zhongyuan Xu, Scott D. Stoller |
Mining parameterized role-based policies. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wei Wei, Ting Yu 0001, Rui Xue 0001 |
iBigTable: practical data integrity for bigtable in public cloud. |
CODASPY |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael T. Goodrich, Michael Mitzenmacher, Olga Ohrimenko, Roberto Tamassia |
Practical oblivious storage. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Murillo Pontual, Andreas Gampe, Omar Chowdhury, Bazoumana Kone, Md. Shamim Ashik, William H. Winsborough |
The privacy in the time of the internet: secrecy vs transparency. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Vincent Toubiana, Vincent Verdot, Benoit Christophe |
Cookie-based privacy issues on google services. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kalpana Gondi, Prithvi Bisht, Praveen Venkatachari, A. Prasad Sistla, V. N. Venkatakrishnan |
SWIPE: eager erasure of sensitive data in large scale systems software. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Suhendry Effendy, Roland H. C. Yap, Felix Halim |
Revisiting link privacy in social networks. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mina Askari, Reihaneh Safavi-Naini, Ken Barker 0001 |
An information theoretic privacy and utility measure for data sanitization mechanisms. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Qingji Zheng, Shouhuai Xu |
Secure and efficient proof of storage with deduplication. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xihui Chen, Jun Pang 0001 |
Measuring query privacy in location-based services. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ashish Kundu, Mikhail J. Atallah, Elisa Bertino |
Leakage-free redactable signatures. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Martinelli, Charles Morisset |
Quantitative access control with partially-observable Markov decision processes. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xiaowei Li 0003, Wei Yan, Yuan Xue 0001 |
SENTINEL: securing database from logic flaws in web applications. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Glenn Bruns, Philip W. L. Fong, Ida Sri Rejeki Siahaan, Michael Huth 0001 |
Relationship-based access control: its expression and enforcement through hybrid logic. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Musheer Ahmed, Mustaque Ahamad |
Protecting health information on mobile devices. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nino Vincenzo Verde, Jaideep Vaidya, Vijay Atluri, Alessandro Colantonio |
Role engineering: from theory to practice. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yuxin Chen 0001, Bo Luo |
S2A: secure smart household appliances. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ian M. Molloy, Luke Dickens, Charles Morisset, Pau-Chen Cheng, Jorge Lobo 0001, Alessandra Russo |
Risk-based security decisions under uncertainty. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Martin Kost, Johann Christoph Freytag |
Privacy analysis using ontologies. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Prachi Kumari, Alexander Pretschner |
Deriving implementation-level policies for usage control enforcement. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Konstantine Arkoudas, Akshay Vashist |
A model-theoretic approach to data anonymity and inference control. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Wu Zhou 0001, Yajin Zhou, Xuxian Jiang, Peng Ning |
Detecting repackaged smartphone applications in third-party android marketplaces. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin Wu 0001, Yonggang Wen 0001 |
Towards end-to-end secure content storage and delivery with public cloud. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hussain M. J. Almohri, Danfeng (Daphne) Yao, Dennis G. Kafura |
Identifying native applications with high assurance. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Wanying Zhao, Jianwei Niu 0001, William H. Winsborough |
Refinement-based design of a group-centric secure information sharing model. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Elisa Bertino, Ravi S. Sandhu (eds.) |
Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, San Antonio, TX, USA, February 7-9, 2012 |
CODASPY |
2012 |
DBLP BibTeX RDF |
|
1 | Xi Gong, Ting Yu 0001, Adam J. Lee |
Bounding trust in reputation systems with incomplete information. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jie Shi, Darren Sim, Yingjiu Li, Robert Huijie Deng |
SecDS: a secure EPC discovery service system in EPCglobal network. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Wen Ming Liu, Lingyu Wang 0001 |
Privacy streamliner: a two-stage approach to improving algorithm efficiency. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yuhao Yang 0007, Jonathan Lutes, Fengjun Li, Bo Luo, Peng Liu 0005 |
Stalking online: on user privacy in social networks. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yan Zhu 0010, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, Hong-Jia Zhao |
Comparison-based encryption for fine-grained access control in clouds. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lujo Bauer, Yuan Liang, Michael K. Reiter, Chad Spensky |
Discovering access-control misconfigurations: new approaches and evaluation methodologies. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ninghui Li, Haining Chen, Elisa Bertino |
On practical specification and enforcement of obligations. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Armando, Silvio Ranise, Fatih Turkmen, Bruno Crispo |
Efficient run-time solving of RBAC user authorization queries: pushing the envelope. |
CODASPY |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Prachi Kumari, Alexander Pretschner, Jonas Peschla, Jens-Michael Kuhn |
Distributed data usage control for web applications: a social network implementation. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michael T. Goodrich, Florian Kerschbaum |
Privacy-enhanced reputation-feedback methods to reduce feedback extortion in online auctions. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu, Elisa Bertino (eds.) |
First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings |
CODASPY |
2011 |
DBLP BibTeX RDF |
|