|
List of Past Discussion Papers
Steven Woodhouse(DBLP) and Peter White(DBLP)
Identity based Management:Extending the ISMS for Federation
In Oceania CACS 2007: Practical IT Governance in a Connected World -
2007, Auckland, New Zealand, 2007
|
BibTeX
|
Nguyen Anh Quynh(DBLP) and Yoshiyasu Takefuji(DBLP)
Towards a tamper-resistant kernel rootkit detector
In SAC '07: Proceedings of the 2007 ACM symposium on Applied
computing, pages 276-283, New York, NY, USA, 2007. ACM Press
|
BibTeX
|
Mila Dalla Preda(DBLP), Mihai Christodorescu(DBLP), Somesh Jha(DBLP), and Saumya Debray(DBLP)
A semantics-based approach to malware detection
In POPL '07: Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium
on Principles of programming languages, pages 377-388, New York, NY,
USA, 2007. ACM Press
|
BibTeX
|
Ty Mey Eap(DBLP), Marek Hatala(DBLP), and Dragan Gasevic(DBLP)
Enabling User Control with Personal Identity Management
In IEEE SCC, pages 60-67, 2007
|
BibTeX
|
Mariano Ceccato(DBLP), Mila Dalla Preda(DBLP), Jasvir Nagra(DBLP), Christian Collberg(DBLP), and Paolo Tonella(DBLP)
Barrier Slicing for Remote Software Trusting
In Seventh IEEE International Working Conference on Source Code Analysis
and Manipulation (SCAM 2007), pages 1-10, Paris, France, 2007. IEEE
Computer Society
|
BibTeX
|
Jinho
Lee(DBLP)
Perceptions of HIPAA Security Requirements by US Dental Schools
Master's thesis, University of Auckland, Auckland, New Zealand, September
2006
.
|
BibTeX
|
Samuel T. King(DBLP), Peter M. Chen(DBLP), Yi-Min Wang(DBLP), Chad Verbowski(DBLP), Helen J. Wang(DBLP), and Jacob R. Lorch(DBLP)
SubVirt: Implementing malware with virtual machines
In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy
(S\&P'06), pages 314-327, Washington, DC, USA, 2006. IEEE Computer
Society
|
BibTeX
Abstract
|
Mila Dalla Preda(DBLP), Matias Madou(DBLP), Koen De Bosschere(DBLP), and Roberto Giacobazzi(DBLP)
Opaque Predicates Detection by Abstract Interpretation
Lecture Notes in Computer Science, LNCS 4019 pp. 81-95, 2006
|
BibTeX
|
Abhilasha Bhargav-Spantzel(DBLP), Anna C. Squicciarini(DBLP), and Elisa Bertino(DBLP)
Establishing and protecting digital identity in federation systems
J. Comput. Secur., 14 no. 3 pp. 269-300, 2006
|
BibTeX
|
Adil Alsaid(DBLP) and Chris J. Mitchell(DBLP)
Preventing phishing attacks using trusted computing technology
In Proceedings of INC 2006, Sixth International Network Conference,
pages 221-228, Plymouth, UK, 2006. Publisher unknown
|
BibTeX
|
Ginger Myles(DBLP) and Christian Collberg(DBLP)
K-gram based software birthmarks
In SAC '05: Proceedings of the 2005 ACM symposium on Applied
computing, pages 314-318, New York, NY, USA, 2005. ACM Press
|
BibTeX
|
Audun Josang(DBLP), John Fabre(DBLP), Brian Hay(DBLP), James Dalziel(DBLP), and Simon Pope(DBLP)
Trust requirements in identity management
In ACSW Frontiers '05: Proceedings of the 2005 Australasian workshop on
Grid computing and e-research, pages 99-108, Darlinghurst, Australia,
Australia, 2005. Australian Computer Society, Inc.
|
BibTeX
|
K.S. Ivanov(DBLP) and V.A. Zakharov(DBLP)
Program obfuscation as obstruction of program static analysis
In Volume 6. ISPRAN 2005. Russian Academy of Sciences Technical Report
Series, pages 137-156. ISPRAN 2005, 2005
|
BibTeX
Abstract
|
Shafi Goldwasser(DBLP) and Yael Tauman Kalai(DBLP)
On the Impossibility of Obfuscation with Auxiliary Input
In FOCS '05: Proceedings of the 46th Annual IEEE Symposium on Foundations
of Computer Science, pages 553-562, Washington, DC, USA, 2005. IEEE
Computer Society
|
BibTeX
Abstract
|
Jun
Ge(DBLP), Soma Chaudhuri(DBLP), and Akhilesh Tyagi(DBLP)
Control flow based obfuscation
In DRM '05: Proceedings of the 5th ACM workshop on Digital rights
management, pages 83-92, New York, NY, USA, 2005. ACM Press
|
BibTeX
Abstract
|
Roberto J. Bayardo(DBLP) and Rakesh Agrawal(DBLP)
Data Privacy through Optimal k-Anonymization
In ICDE '05: Proceedings of the 21st International Conference on Data
Engineering (ICDE'05), pages 217-228, Washington, DC, USA, 2005. IEEE
Computer Society
|
BibTeX
Abstract
|
Shane Balfe(DBLP), Amit D. Lakhani(DBLP), and Kenneth G. Paterson(DBLP)
Trusted Computing: Providing Security for Peer-to-Peer Networks
In P2P '05: Proceedings of the Fifth IEEE International Conference on
Peer-to-Peer Computing (P2P'05), pages 117-124, Washington, DC, USA,
2005. IEEE Computer Society
|
BibTeX
|
Ben Adida(DBLP) and Douglas Wikström(DBLP)
Obfuscated Ciphertext Mixing
Cryptology ePrint Archive, Report 2005/394, 2005
http://eprint.iacr.org/
|
BibTeX
Abstract
|
Jasmine Novak(DBLP), Prabhakar Raghavan(DBLP), and Andrew Tomkins(DBLP)
Anti-aliasing on the web
In WWW '04: Proceedings of the 13th international conference on World
Wide Web, pages 30-39, New York, NY, USA, 2004. ACM Press
|
BibTeX
|
David M. Nicol(DBLP), William H. Sanders(DBLP), and Kishor S. Trivedi(DBLP)
Model-Based Evaluation: From Dependability to Security.
IEEE Trans. Dependable Sec. Comput., 1 no. 1 pp. 48-65, 2004
|
BibTeX
|
Qiang
Huang(DBLP) and Changxing Shen(DBLP)
A new MLS mandatory policy combining secrecy and integrity implemented in
highly classified secure level OS
In 7th International Conference on Signal Processing : (ICSP'04) (Aug.
31-Sept 4, 2004, Beijing, China), Beijing , China, 2004. IEEE
|
BibTeX
|
Patrick Cousot(DBLP) and Radhia Cousot(DBLP)
An abstract interpretation-based framework for software
watermarking
In POPL '04: Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on
Principles of programming languages, pages 173-185, New York, NY, USA,
2004. ACM Press
|
BibTeX
Abstract
|
Elisa
Bertino(DBLP), Elena Ferrari(DBLP), and Anna Squicciarini(DBLP)
Trust Negotiations: Concepts, Systems, and Languages
Computing in Science and Engg., 6 no. 4 pp. 27-34, 2004
|
BibTeX
|
Masahide Nakamura(DBLP), Akito Monden(DBLP), Tomoaki Itoh(DBLP), Ken ichi Matsumoto(DBLP), Yuichiro Kanzaki(DBLP), and Hirotsugu Satoh(DBLP)
Queue-Based Cost Evaluation of Mental Simulation Process in Program
Comprehension
In METRICS '03: Proceedings of the 9th International Symposium on
Software Metrics, page 351, Washington, DC, USA, 2003. IEEE Computer
Society
|
BibTeX
|
Latanya Sweeney(DBLP)
k-anonymity: a model for protecting privacy
Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10 no. 5 pp.
557-570, 2002
|
BibTeX
|
Martin S. Olivier(DBLP)
Database privacy: balancing confidentiality, integrity and
availability
SIGKDD Explor. Newsl., 4 no. 2 pp. 20-27, 2002
|
BibTeX
|
Bill Horne(DBLP), Lesley Matheson(DBLP), Casey Sheehan(DBLP), and Robert Tarjan(DBLP)
Dynamic Self-Checking Techniques for Improved Tamper Resistance
Security and Privacy in Digital Rights Management, Lecture Notes in
Computer Science, 2320 pp. 141-159, 2002
|
BibTeX
Abstract
|
Liqun Chen(DBLP), Siani Pearson(DBLP), and Athanasios Vamvakas(DBLP)
A Trusted Biometric System
Technical Report HPL-2002-185, HP Labs, 2002
|
BibTeX
|
David Wagner(DBLP) and Drew Dean(DBLP)
Intrusion detection via static analysis
In IEEE Symposium on Security and Privacy, 2001. S&P 2001, pages
156-168. IEEE, 2001
|
BibTeX
Abstract
|
Sebastian Claub(DBLP) and Marit Köhntopp(DBLP)
Identity management and its support of multilateral security
Comput. Networks, 37 no. 2 pp. 205-219, 2001
|
BibTeX
|
Ingemar J. Cox(DBLP), Matt L. Miller(DBLP), and Jeffrey A. Bloom(DBLP)
Watermarking applications and their properties
In ITCC '00: Proceedings of the The International Conference on
Information Technology: Coding and Computing (ITCC'00), page 6,
Washington, DC, USA, 2000. IEEE Computer Society
|
BibTeX
|
Ognjen Prnjat(DBLP) and Lionel E. Sacks(DBLP)
Integrity Methodology for Interoperable Environments
Communications Magazine, IEEE, 37 no. 5 pp. 126-132, May
1999
|
BibTeX
|
Daniel Jackson(DBLP) and Eugene J. Rollins(DBLP)
A new model of program dependences for reverse engineering
In SIGSOFT '94: Proceedings of the 2nd ACM SIGSOFT symposium on
Foundations of software engineering, pages 2-10, New York, NY, USA,
1994. ACM Press
|
BibTeX
Abstract
|
K. Heisler(DBLP), Y. Kasho(DBLP), and Wei-Tek Tsai(DBLP)
A reverse engineering model for C programs
Inf. Sci., 68 no. 1-2 pp. 155-189, 1993
|
BibTeX
|
David D. Clark(DBLP) and David R. Wilson(DBLP)
A Comparison of Commercial and Military Computer Security Policies
In Security and Privacy, volume 00, page 184, Los Alamitos, CA, USA,
1987. IEEE Computer Society
|
BibTeX
|
|
|
|