Date of Meeting |
Leader |
Title of the Paper |
Author(s) |
Link
|
Thu 06 Dec 07 |
Yu-Cheng |
identity management and its support of multilateral security |
Sebastian ClauB and Merit kohntopp |
X
|
Thu 22 Nov 07 |
Zulfiqar |
Establishing and protecting digital identity in federation systems |
Abhilasha Bhargav-Spantzel et al |
X
|
Thu 15 Nov 07 |
Zulfiqar |
Trust requirements in identity management |
Audun Jøsang et al |
X
|
Thu 08 Nov 07 |
Zulfiqar |
A new MLS mandatory policy combining secrecy and integrity implemented in highly classified secure level OS |
Qiang Huang and Changxing Shen |
X
|
Tue 23 Oct 07 |
Yu-Cheng |
Enabling User Control with Personal Identity Management |
Eap et al |
X
|
Tue 25 Sep 07 |
Zulfiqar |
Identity based Management:Extending the ISMS for Federation |
Woodhouse and White |
X
|
Thu 13 Sep 07 |
Yu-Cheng |
Perceptions of HIPAA Security Requirements by US Dental Schools |
Jinho Lee |
X
|
Tue 04 Sep 07 |
Zulfiqar |
Data privacy through optimal k-anonymization |
Bayardo and Agrawal |
X
|
Tue 21 Aug 07 |
James |
SubVirt: Implementing malware with virtual machines |
King et al. |
X
|
Tue 14 Aug 07 |
Zulfiqar |
k-anonymity: a model for protecting privacy |
Sweeney |
X
|
Tue 07 Aug 07 |
James |
Towards a tamper-resistant kernel rootkit detector |
Quynh and Takefuji |
X
|
Thu 02 Aug 07 |
Clark |
A Comparison of Commercial and Military Computer Security Policies |
Clark and Wilson |
X
|
Tue 24 Jul 07 |
Zulfiqar |
Preventing phishing attacks using trusted computing technology |
Alsaid and Mitchell |
X
|
Tue 17 Jul 07 |
Anirban |
Barrier Slicing for Remote Software Trusting |
Ceccato et al. |
X
|
Tue 19 Jun 07 |
Zulfiqar |
Trusted Computing: Providing Security for Peer-to-Peer Networks |
Balfe et al. |
X
|
Tue 05 Jun 07 |
Anirban |
Opaque Predicates Detection by Abstract Interpretation |
Preda et al. |
X
|
Tue 29 May 07 |
Zulfiqar |
Integrity Methodology for Interoperable Environments |
Prnjat and Sacks |
X
|
Tue 22 Mar 07 |
James |
A Trusted Biometric System |
Chen et al. |
X
|
Tue 15 May 07 |
Zulfiqar |
Database Privacy: Balancing Confidentiality, Integrity and Availability |
Olivier |
X
|
Tue 08 May 07 |
Gilbert |
Anti-Aliasing on the Web |
Novak et al |
X
|
Tue 01 May 07 |
Anirban |
Queue-based Cost Evaluation of Mental Simulation Process in Program Comprehension |
Nakamura et al |
X
|
Date of Meeting |
Leader |
Title of the Paper |
Author(s) |
Link
|
Thu 18 May 06 |
Anirban |
Intrusion detection via static analysis |
Wagner & Dean |
X
|
Thu 04 May 06 |
Jasvir |
An Abtract Interpretation-Based Framework for Software Watermarking |
Cousot & Cousot |
X
|
Thu 27 Apr 06 |
Anirban |
Control Flow Based Obfuscation |
Ge & Chaudhuri & Tyagi |
X
|
Thu 20 Apr 06 |
Jun |
Watermarking applications and their properties |
Cox & Miller & Bloom |
X
|
Thu 13 Apr 06 |
Teng Teng |
k-gram Based Software Birthmarks |
Myles & Collberg |
X
|
Thu 30 Mar 06 |
Han |
Model-Based Evaluation: From Dependability to Security |
Nicol & Sanders & Trivedi |
X
|
Thu 23 Mar 06 |
Lei |
Dynamic Self-Checking Techniques for Improved Tamper Resistance |
Horne et al |
X
|
Thu 16 Mar 06 |
Anirban |
Program Obfuscation as Obstruction of Program Static Analysis |
Ivanov & Zakharov |
X
|