List of Past Discussion Papers

Steven Woodhouse(DBLP) and Peter White(DBLP)
Identity based Management:Extending the ISMS for Federation
In Oceania CACS 2007: Practical IT Governance in a Connected World - 2007, Auckland, New Zealand, 2007
BibTeX
Nguyen Anh Quynh(DBLP) and Yoshiyasu Takefuji(DBLP)
Towards a tamper-resistant kernel rootkit detector
In SAC '07: Proceedings of the 2007 ACM symposium on Applied computing, pages 276-283, New York, NY, USA, 2007. ACM Press
BibTeX
Mila Dalla Preda(DBLP), Mihai Christodorescu(DBLP), Somesh Jha(DBLP), and Saumya Debray(DBLP)
A semantics-based approach to malware detection
In POPL '07: Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 377-388, New York, NY, USA, 2007. ACM Press
BibTeX
Ty Mey Eap(DBLP), Marek Hatala(DBLP), and Dragan Gasevic(DBLP)
Enabling User Control with Personal Identity Management
In IEEE SCC, pages 60-67, 2007
BibTeX
Mariano Ceccato(DBLP), Mila Dalla Preda(DBLP), Jasvir Nagra(DBLP), Christian Collberg(DBLP), and Paolo Tonella(DBLP)
Barrier Slicing for Remote Software Trusting
In Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007), pages 1-10, Paris, France, 2007. IEEE Computer Society
BibTeX
Jinho Lee(DBLP)
Perceptions of HIPAA Security Requirements by US Dental Schools
Master's thesis, University of Auckland, Auckland, New Zealand, September 2006 .
BibTeX
Samuel T. King(DBLP), Peter M. Chen(DBLP), Yi-Min Wang(DBLP), Chad Verbowski(DBLP), Helen J. Wang(DBLP), and Jacob R. Lorch(DBLP)
SubVirt: Implementing malware with virtual machines
In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S\&P'06), pages 314-327, Washington, DC, USA, 2006. IEEE Computer Society
BibTeX
Abstract
Mila Dalla Preda(DBLP), Matias Madou(DBLP), Koen De Bosschere(DBLP), and Roberto Giacobazzi(DBLP)
Opaque Predicates Detection by Abstract Interpretation
Lecture Notes in Computer Science, LNCS 4019 pp. 81-95, 2006
BibTeX
Abhilasha Bhargav-Spantzel(DBLP), Anna C. Squicciarini(DBLP), and Elisa Bertino(DBLP)
Establishing and protecting digital identity in federation systems
J. Comput. Secur., 14 no. 3 pp. 269-300, 2006
BibTeX
Adil Alsaid(DBLP) and Chris J. Mitchell(DBLP)
Preventing phishing attacks using trusted computing technology
In Proceedings of INC 2006, Sixth International Network Conference, pages 221-228, Plymouth, UK, 2006. Publisher unknown
BibTeX
Ginger Myles(DBLP) and Christian Collberg(DBLP)
K-gram based software birthmarks
In SAC '05: Proceedings of the 2005 ACM symposium on Applied computing, pages 314-318, New York, NY, USA, 2005. ACM Press
BibTeX
Audun Josang(DBLP), John Fabre(DBLP), Brian Hay(DBLP), James Dalziel(DBLP), and Simon Pope(DBLP)
Trust requirements in identity management
In ACSW Frontiers '05: Proceedings of the 2005 Australasian workshop on Grid computing and e-research, pages 99-108, Darlinghurst, Australia, Australia, 2005. Australian Computer Society, Inc.
BibTeX
K.S. Ivanov(DBLP) and V.A. Zakharov(DBLP)
Program obfuscation as obstruction of program static analysis
In Volume 6. ISPRAN 2005. Russian Academy of Sciences Technical Report Series, pages 137-156. ISPRAN 2005, 2005
BibTeX
Abstract
Shafi Goldwasser(DBLP) and Yael Tauman Kalai(DBLP)
On the Impossibility of Obfuscation with Auxiliary Input
In FOCS '05: Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science, pages 553-562, Washington, DC, USA, 2005. IEEE Computer Society
BibTeX
Abstract
Jun Ge(DBLP), Soma Chaudhuri(DBLP), and Akhilesh Tyagi(DBLP)
Control flow based obfuscation
In DRM '05: Proceedings of the 5th ACM workshop on Digital rights management, pages 83-92, New York, NY, USA, 2005. ACM Press
BibTeX
Abstract
Roberto J. Bayardo(DBLP) and Rakesh Agrawal(DBLP)
Data Privacy through Optimal k-Anonymization
In ICDE '05: Proceedings of the 21st International Conference on Data Engineering (ICDE'05), pages 217-228, Washington, DC, USA, 2005. IEEE Computer Society
BibTeX
Abstract
Shane Balfe(DBLP), Amit D. Lakhani(DBLP), and Kenneth G. Paterson(DBLP)
Trusted Computing: Providing Security for Peer-to-Peer Networks
In P2P '05: Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05), pages 117-124, Washington, DC, USA, 2005. IEEE Computer Society
BibTeX
Ben Adida(DBLP) and Douglas Wikström(DBLP)
Obfuscated Ciphertext Mixing
Cryptology ePrint Archive, Report 2005/394, 2005 http://eprint.iacr.org/
BibTeX
Abstract
Jasmine Novak(DBLP), Prabhakar Raghavan(DBLP), and Andrew Tomkins(DBLP)
Anti-aliasing on the web
In WWW '04: Proceedings of the 13th international conference on World Wide Web, pages 30-39, New York, NY, USA, 2004. ACM Press
BibTeX
David M. Nicol(DBLP), William H. Sanders(DBLP), and Kishor S. Trivedi(DBLP)
Model-Based Evaluation: From Dependability to Security.
IEEE Trans. Dependable Sec. Comput., 1 no. 1 pp. 48-65, 2004
BibTeX
Qiang Huang(DBLP) and Changxing Shen(DBLP)
A new MLS mandatory policy combining secrecy and integrity implemented in highly classified secure level OS
In 7th International Conference on Signal Processing : (ICSP'04) (Aug. 31-Sept 4, 2004, Beijing, China), Beijing , China, 2004. IEEE
BibTeX
Patrick Cousot(DBLP) and Radhia Cousot(DBLP)
An abstract interpretation-based framework for software watermarking
In POPL '04: Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 173-185, New York, NY, USA, 2004. ACM Press
BibTeX
Abstract
Elisa Bertino(DBLP), Elena Ferrari(DBLP), and Anna Squicciarini(DBLP)
Trust Negotiations: Concepts, Systems, and Languages
Computing in Science and Engg., 6 no. 4 pp. 27-34, 2004
BibTeX
Masahide Nakamura(DBLP), Akito Monden(DBLP), Tomoaki Itoh(DBLP), Ken ichi Matsumoto(DBLP), Yuichiro Kanzaki(DBLP), and Hirotsugu Satoh(DBLP)
Queue-Based Cost Evaluation of Mental Simulation Process in Program Comprehension
In METRICS '03: Proceedings of the 9th International Symposium on Software Metrics, page 351, Washington, DC, USA, 2003. IEEE Computer Society
BibTeX
Latanya Sweeney(DBLP)
k-anonymity: a model for protecting privacy
Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10 no. 5 pp. 557-570, 2002
BibTeX
Martin S. Olivier(DBLP)
Database privacy: balancing confidentiality, integrity and availability
SIGKDD Explor. Newsl., 4 no. 2 pp. 20-27, 2002
BibTeX
Bill Horne(DBLP), Lesley Matheson(DBLP), Casey Sheehan(DBLP), and Robert Tarjan(DBLP)
Dynamic Self-Checking Techniques for Improved Tamper Resistance
Security and Privacy in Digital Rights Management, Lecture Notes in Computer Science, 2320 pp. 141-159, 2002
BibTeX
Abstract
Liqun Chen(DBLP), Siani Pearson(DBLP), and Athanasios Vamvakas(DBLP)
A Trusted Biometric System
Technical Report HPL-2002-185, HP Labs, 2002
BibTeX
David Wagner(DBLP) and Drew Dean(DBLP)
Intrusion detection via static analysis
In IEEE Symposium on Security and Privacy, 2001. S&P 2001, pages 156-168. IEEE, 2001
BibTeX
Abstract
Sebastian Claub(DBLP) and Marit Köhntopp(DBLP)
Identity management and its support of multilateral security
Comput. Networks, 37 no. 2 pp. 205-219, 2001
BibTeX
Ingemar J. Cox(DBLP), Matt L. Miller(DBLP), and Jeffrey A. Bloom(DBLP)
Watermarking applications and their properties
In ITCC '00: Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00), page 6, Washington, DC, USA, 2000. IEEE Computer Society
BibTeX
Ognjen Prnjat(DBLP) and Lionel E. Sacks(DBLP)
Integrity Methodology for Interoperable Environments
Communications Magazine, IEEE, 37 no. 5 pp. 126-132, May 1999
BibTeX
Daniel Jackson(DBLP) and Eugene J. Rollins(DBLP)
A new model of program dependences for reverse engineering
In SIGSOFT '94: Proceedings of the 2nd ACM SIGSOFT symposium on Foundations of software engineering, pages 2-10, New York, NY, USA, 1994. ACM Press
BibTeX
Abstract
K. Heisler(DBLP), Y. Kasho(DBLP), and Wei-Tek Tsai(DBLP)
A reverse engineering model for C programs
Inf. Sci., 68 no. 1-2 pp. 155-189, 1993
BibTeX
David D. Clark(DBLP) and David R. Wilson(DBLP)
A Comparison of Commercial and Military Computer Security Policies
In Security and Privacy, volume 00, page 184, Los Alamitos, CA, USA, 1987. IEEE Computer Society
BibTeX
University of Auckland   © Secure Systems Group 2008