The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 02 - Feb. (vol. 25)
ISSN: 1045-9219

Verifying Keys through Publicity and Communities of Trust: Quantifying Off-Axis Corroboration (Abstract)

Eric Osterweil , Verisign Labs., Reston, VA, USA
Dan Massey , Comput. Sci. Dept., Colorado State Univ., Fort Collins, CO, USA
Danny McPherson , Verisign Labs., Reston, VA, USA
Lixia Zhang , Comput. Sci. Dept., UCLA, Los Angeles, CA, USA
pp. 283-291

Trustworthy Operations in Cellular Networks: The Case of PF Scheduler (Abstract)

Konstantinos Pelechrinis , Sch. of Inf. Sci., Univ. of Pittsburgh, Pittsburgh, PA, USA
Prashant Krishanmurthy , Sch. of Inf. Sci., Univ. of Pittsburgh, Pittsburgh, PA, USA
Christos Gkantsidis , Microsoft Res. Ltd., Cambridge, UK
pp. 292-300

Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks (Abstract)

Hiroki Nishiyama , Tohoku University, Sendai
Desmond Fomo , University of Yaounde I, Cameroon and Tohoku University, Sendai
Zubair Md. Fadlullah , Islamic University of Technology, Bangladesh and Tohoku University, Sendai
Nei Kato , Polytechnic University, Japan and Tohoku University, Sendai
pp. 301-309

Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks (Abstract)

Xiaohui Liang , University of Waterloo , Waterloo Waterloo
Xiaodong Lin , University of Ontario Institute of Technology, Oshawa
Xuemin Sherman Shen , University of Waterloo, Waterloo
pp. 310-320

ReDS: A Framework for Reputation-Enhanced DHTs (Abstract)

Ruj Akavipat , Dept. of Comput. Eng., Mahidol Univ., Nakornpathom, Thailand
Mahdi N. Al-Ameen , Dept. of Comput. Sci. & Eng., Univ. of Texas at Arlington, Arlington, TX, USA
Apu Kapadia , Sch. of Inf. & Comput., Indiana Univ. Bloomington, Bloomington, IN, USA
Zahid Rahman , Sch. of Inf. & Comput., Indiana Univ. Bloomington, Bloomington, IN, USA
Roman Schlegel , Corp. Res., ABB Switzerland Ltd., Baden-Dattwil, Switzerland
Matthew Wright , Dept. of Comput. Sci. & Eng., Univ. of Texas at Arlington, Arlington, TX, USA
pp. 321-331

Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks (Abstract)

Jingwei Liu , Xidian University, Xi'an
Zonghua Zhang , Institute Mines-Telecom/TELECOM Lille1, Villeneuve d'Ascq
Xiaofeng Chen , Xidian University, Xi'an
Kyung Sup Kwak , Inha University, Incheon
pp. 332-342

LocaWard: A security and privacy aware location-based rewarding system (Abstract)

Ming Li , Dept. of Electr. & Comput. Eng., Mississippi State Univ., Starkville, MS, USA
Sergio Salinas , Dept. of Electr. & Comput. Eng., Mississippi State Univ., Starkville, MS, USA
Pan Li , Dept. of Electr. & Comput. Eng., Mississippi State Univ., Starkville, MS, USA
pp. 343-352

Internet Traffic Privacy Enhancement with Masking: Optimization and Tradeoffs (Abstract)

Alfonso Iacovazzi , Dept. of Inf. Eng., Electron. & Telecommun., Univ. of Roma Sapienza, Rome, Italy
Andrea Baiocchi , Dept. of Inf. Eng., Electron. & Telecommun., Univ. of Roma Sapienza, Rome, Italy
pp. 353-362

A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud (Abstract)

Xuyun Zhang , Sch. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China
Laurence T. Yang , Sch. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China
Chang Liu , Fac. of Eng. & IT, Univ. of Technol., Sydney, NSW, Australia
Jinjun Chen , Fac. of Eng. & IT, Univ. of Technol., Sydney, NSW, Australia
pp. 363-373

Exploiting Service Similarity for Privacy in Location-Based Search Queries (Abstract)

Rinku Dewri , Dept. of Comput. Sci., Univ. of Denver, Denver, CO, USA
Ramakrisha Thurimella , Dept. of Comput. Sci., Univ. of Denver, Denver, CO, USA
pp. 374-383

Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds (Abstract)

Sushmita Ruj , Indian Institute of Technology, Indore
Milos Stojmenovic , Singidunum University, Belgrade
Amiya Nayak , University of Ottawa, Ottawa
pp. 384-394

RRE: A Game-Theoretic Intrusion Response and Recovery Engine (Abstract)

Saman A. Zonouz , University of Miami, Coral Gables
Himanshu Khurana , Honeywell Automation and Control Systems Lab, Minneapolis
William H. Sanders , University of Illinois at Urbana-Champaign, Urbana
Timothy M. Yardley , University of Illinois at Urbana-Champaign, Urbana
pp. 395-406

Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation (Abstract)

Henry C. H. Chen , Dept. of Comput. Sci. & Eng., Chinese Univ. of Hong Kong, Hong Kong, China
Patrick P. C. Lee , Dept. of Comput. Sci. & Eng., Chinese Univ. of Hong Kong, Hong Kong, China
pp. 407-416

Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions (Abstract)

Marian K. Iskander , University of Pittsburgh, Pittsburgh
Tucker Trainor , University of Pittsburgh, Pittsburgh
Dave W. Wilkinson , University of Pittsburgh, Pittsburgh
Adam J. Lee , University of Pittsburgh, Pittsburgh
Panos K. Chrysanthis , University of Pittsburgh, Pittsburgh
pp. 417-426

Dynamic Authentication with Sensory Information for the Access Control Systems (Abstract)

Yuanchao Shu , Dept. of Control Sci. & Eng., Zhejiang Univ., Hangzhou, China
Yu Jason Gu , Pillar of Inf. Syst. Technol. & Design, Singapore Univ. of Technol. & Design, Singapore, Singapore
Jiming Chen , Dept. of Control Sci. & Eng., Zhejiang Univ., Hangzhou, China
pp. 427-436

Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases (Abstract)

Luca Ferretti , Univ. of Modena & Reggio Emilia, Modena, Italy
Michele Colajanni , Univ. of Modena & Reggio Emilia, Modena, Italy
Mirco Marchetti , Univ. of Modena & Reggio Emilia, Modena, Italy
pp. 437-446

A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis (Abstract)

Zhiyuan Tan , Sch. of Comput. & Commun., Univ. of Technol., Sydney, Broadway, NSW, Australia
Aruna Jamdagni , Sch. of Comput. & Math., Univ. of Western Sydney, Sydney, NSW, Australia
Xiangjian He , Sch. of Comput. & Commun., Univ. of Technol., Sydney, Broadway, NSW, Australia
Priyadarsi Nanda , Sch. of Comput. & Commun., Univ. of Technol., Sydney, Broadway, NSW, Australia
Ren Ping Liu , ICT Centre, CSIRO, Epping, NSW, Australia
pp. 447-456

A $(\rm UCON_{ABC})$ Resilient Authorization Evaluation for Cloud Computing (Abstract)

Arlindo Luis Marcon , Pontifical Catholic University of Parana, Curitiba
Altair Olivo Santin , Pontifical Catholic University of Parana, Curitiba
Maicon Stihler , Pontifical Catholic University of Parana, Curitiba
Juliana Bachtold , Pontifical Catholic University of Parana, Curitiba
pp. 457-467

Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage (Abstract)

Cheng-Kang Chu , Dept. of Cryptography & Security, Inst. for Infocomm Res., Singapore, Singapore
Sherman S. M. Chow , Dept. of Inf. Eng., Chinese Univ. of Hong Kong, Hong Kong, China
Wen-Guey Tzeng , Dept. of Comput. Sci., Nat. Chiao Tung Univ., Hsinchu, Taiwan
Jianying Zhou , Dept. of Cryptography & Security, Inst. for Infocomm Res., Singapore, Singapore
Robert H. Deng , Sch. of Inf. Syst., Singapore Manage. Univ., Singapore, Singapore
pp. 468-477

A Distributed Information Divergence Estimation over Data Streams (Abstract)

Emmanuelle Anceaume , IRISA, Rennes, France
Yann Busnel , Dept. of Comput. Sci., Univ. de Nantes, Nantes, France
pp. 478-487

FLAP: An Efficient WLAN Initial Access Authentication Protocol (Abstract)

Xinghua Li , State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an, China
Fenye Bao , Dept. of Comput. Sci., Virginia Polytech. Inst. & State Univ., Falls Church, VA, USA
Shuxin Li , State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an, China
Jianfeng Ma , State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an, China
pp. 488-497

Collaborative Policy Administration (Abstract)

Weili Han , Software Sch., Fudan Univ., Shanghai, China
Zheran Fang , Software Sch., Fudan Univ., Shanghai, China
Laurence Tianruo Yang , Dept. of Comput. Sci., St. Francis Xavier Univ., Antigonish, NS, Canada
Gang Pan , Sch. of Comput. Sci. & Technol., Zhejiang Univ., Hangzhou, China
Zhaohui Wu , Sch. of Comput. Sci. & Technol., Zhejiang Univ., Hangzhou, China
pp. 498-507

An Error-Minimizing Framework for Localizing Jammers in Wireless Networks (Abstract)

Zhenhua Liu , Dept. of Comput. Sci. & Eng., Univ. of South Carolina, Columbia, SC, USA
Hongbo Liu , Dept. of Electr. & Comput. Sci., Stevens Inst. of Technol., Hoboken, NJ, USA
Wenyuan Xu , Dept. of Comput. Sci. & Eng., Univ. of South Carolina, Columbia, SC, USA
Yingying Chen , Dept. of Electr. & Comput. Sci., Stevens Inst. of Technol., Hoboken, NJ, USA
pp. 508-517

Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption (Abstract)

Muhammad Adnan Tariq , Inst. of Parallel & Distrib. Syst., Univ. of Stuttgart, Stuttgart, Germany
Boris Koldehofe , Inst. of Parallel & Distrib. Syst., Univ. of Stuttgart, Stuttgart, Germany
Kurt Rothermel , Inst. of Parallel & Distrib. Syst., Univ. of Stuttgart, Stuttgart, Germany
pp. 518-528
104 ms
(Ver )