


default search action
CODASPY 2013: San Antonio, TX, USA
- Elisa Bertino, Ravi S. Sandhu, Lujo Bauer, Jaehong Park:

Third ACM Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013. ACM 2013, ISBN 978-1-4503-1890-7 - Filipe Beato, Iulia Ion, Srdjan Capkun, Bart Preneel

, Marc Langheinrich
:
For some eyes only: protecting online information sharing. 1-12 - Sebastian Labitzke, Florian Werling, Jens Mittag, Hannes Hartenstein:

Do online social network friends still threaten my privacy? 13-24 - Mark A. Gondree

, Zachary N. J. Peterson:
Geolocation of data in the cloud. 25-36 - Xihui Chen, Jun Pang:

Exploring dependency for query privacy protection in location-based services. 37-48
Privacy-preserving techniques and usage control
- Florian Kerschbaum:

Expression rewriting for optimizing secure computation. 49-58 - Weiyi Xia, Raymond Heatherly, Xiaofeng Ding, Jiuyong Li

, Bradley A. Malin
:
Efficient discovery of de-identification policy options through a risk-utility frontier. 59-70 - Florian Kelbert, Alexander Pretschner:

Data usage control enforcement in distributed systems. 71-82
Usable security and privacy
- Sumeet Gujrati, Eugene Y. Vasserman

:
The usability of truecrypt, or how i learned to stop whining and fix an interface. 83-94 - Daniel Le Métayer:

Privacy by design: a formal framework for the analysis of architectural choices. 95-104 - Majid Arianezhad, L. Jean Camp, Timothy Kelley, Douglas Stebila

:
Comparative eye tracking of experts and novices in web single sign-on. 105-116
Web security
- Wei Xu, Fangfang Zhang, Sencun Zhu:

JStill: mostly static detection of obfuscated malicious JavaScript code. 117-128 - Nazari Skrupsky, Prithvi Bisht, Timothy L. Hinrichs, V. N. Venkatakrishnan, Lenore D. Zuck:

TamperProof: a server-agnostic defense for parameter tampering attacks on web applications. 129-140 - Li Xu, Zhenxin Zhan, Shouhuai Xu, Keying Ye

:
Cross-layer detection of malicious websites. 141-152
Poster session
- Salmin Sultana, Elisa Bertino:

A file provenance system. 153-156 - Razvan Rughinis

:
Enhancing performance of searchable encryption in cloud computing. 157-160 - Devdatta Kulkarni:

A fine-grained access control model for key-value systems. 161-164 - Graciela Perera, Nathan Miller, John Mela, Michael P. McGarry, Jaime C. Acosta:

Emulating internet topology snapshots in deterlab. 165-168 - Mahdi N. Al-Ameen, Matthew K. Wright

:
Persea: a sybil-resistant social DHT. 169-172 - S. M. Taiabul Haque, Matthew K. Wright

, Shannon Scielzo
:
A study of user password strategy for multiple accounts. 173-176 - Hans Lo, Gabriel Ghinita:

Authenticating spatial skyline queries with low communication overhead. 177-180 - Seung-Hyun Seo

, Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino:
An efficient certificateless cryptography scheme without pairing. 181-184
Mobile-device security and privacy
- Wu Zhou, Yajin Zhou, Michael C. Grace, Xuxian Jiang, Shihong Zou:

Fast, scalable detection of "Piggybacked" mobile applications. 185-196 - Timothy Vidas, Nicolas Christin

:
Sweetening android lemon markets: measuring and combating malware in application marketplaces. 197-208 - Vaibhav Rastogi, Yan Chen, William Enck:

AppsPlayground: automatic security analysis of smartphone applications. 209-220 - Sanae Rosen, Zhiyun Qian

, Zhuoqing Morley Mao:
AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users. 221-232
Access control for applications
- Christoph Busold, Ahmed Taha, Christian Wachsmann, Alexandra Dmitrienko, Hervé Seudie, Majid Sobhani, Ahmad-Reza Sadeghi:

Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer. 233-242 - Rimma V. Nehme, Hyo-Sang Lim, Elisa Bertino:

FENCE: continuous access control enforcement in dynamic data stream environments. 243-254 - Zhongyuan Xu, Scott D. Stoller:

Mining parameterized role-based policies. 255-266
Keynote address
- Ronnie L. Killough:

I see we still like C. 267-268
Short papers: access control and uusage control for distributed systems
- Xiao Liang Hu, Sylvia L. Osborn:

A new approach for delegation in usage control. 269-276 - Adam Bates

, Benjamin Mood, Masoud Valafar, Kevin R. B. Butler
:
Towards secure provenance-based access control in cloud environments. 277-284 - Lianshan Sun, Jaehong Park, Ravi S. Sandhu:

Engineering access control policies for provenance-aware systems. 285-292 - Bin Zan, Zhanbo Sun, Marco Gruteser, Xuegang Ban:

Linking anonymous location traces through driving characteristics. 293-300
Short papers: users and security economics
- Naoki Tanaka, Marianne Winslett, Adam J. Lee

, David K. Y. Yau, Feng Bao:
Insured access: an approach to ad-hoc information sharing for virtual organizations. 301-308 - Tongbo Luo, Xing Jin, Wenliang Du:

Mediums: visual integrity preserving framework. 309-316 - Ashwini Rao, Birendra Jha

, Gananand Kini:
Effect of grammar on security of long passwords. 317-324 - Malgorzata Urbanska, Mark Roberts, Indrajit Ray, Adele E. Howe, Zinta S. Byrne:

Accepting the inevitable: factoring the user into home computer security. 325-332 - Rui Zhao, Chuan Yue:

All your browser-saved passwords could belong to us: a security analysis and a cloud-based new design. 333-340
Cloud and distributed computing security and privacy
- Wei Wei, Ting Yu, Rui Xue:

iBigTable: practical data integrity for bigtable in public cloud. 341-352 - Stephen R. Tate, Roopa Vishwanathan, Lance Everhart:

Multi-user dynamic proofs of data possession using trusted hardware. 353-364 - Anna Cinzia Squicciarini

, Giuseppe Petracca, Elisa Bertino:
Adaptive data protection in distributed systems. 365-376 - Bo Chen, Reza Curtmola:

Towards self-repairing replication-based storage systems using untrusted clouds. 377-388

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














