The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 03 - May/June (vol. 9)
ISSN: 1545-5971
Papers

A Taxonomy of Buffer Overflow Characteristics (Abstract)

Matt Bishop , University of California, Davis, Davis
Sean Whalen , University of California, Davis, Davis and Lawrence Berkeley National Laboratory, Berkeley
Damien Howard , Northwestern University School of Law, Chicago
Sophie Engle , University of San Francisco, San Francisco
pp. 305-317

Detecting and Resolving Firewall Policy Anomalies (Abstract)

Ketan Kulkarni , Emerson Network Power, USA
Gail-Joon Ahn , Arizona State University, Tempe
Hongxin Hu , Arizona State University, Tempe
pp. 318-331

Detecting Anomalous Insiders in Collaborative Information Systems (Abstract)

Steve Nyemba , Vanderbilt University, Nashville
You Chen , Vanderbilt University, Nashville
Bradley Malin , Vanderbilt University, Nashville
pp. 332-344

Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities (Abstract)

Ernie Brickell , Intel Corporation, Hillsboro
Jiangtao Li , Intel Corporation, Hillsboro
pp. 345-360

ES-MPICH2: A Message Passing Interface with Enhanced Security (Abstract)

Qing Yang , Montana State University, MT
Mohammed I. Alghamdi , Al-Baha University, Al-Baha City
Xiao Qin , Auburn University, Auburn
Xiaojun Ruan , West Chester University of Pennsylvania, PA
Shu Yin , Auburn University, Auburn
pp. 361-374

Iterative Trust and Reputation Management Using Belief Propagation (Abstract)

Erman Ayday , Georgia Institute of Technology, Atlanta
Faramarz Fekri , Georgia Institute of Technology, Atlanta
pp. 375-386

JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks (Abstract)

Linda Pareschi , University of Milan, Milano
Claudio Bettini , University of Milan, Milano
Daniele Riboni , University of Milan, Milano
pp. 387-400

Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts (Abstract)

Zhang Fu , Chalmers University of Technology, Gothenborg
Philippas Tsigas , Chalmers University of Technology, Gothenborg
Marina Papatriantafilou , Chalmers University of Technology, Gothenborg
pp. 401-413

M-Score: A Misuseability Weight Measure (Abstract)

Asaf Shabtai , Ben Gurion University of the Negev, Beer-Sheva
Lior Rokach , Ben Gurion University of the Negev, Beer-Sheva
Yuval Elovici , Ben Gurion University of the Negev, Beer-Sheva
Amir Harel , Ben Gurion University of the Negev, Beer-Sheva
pp. 414-428

Remote Attestation with Domain-Based Integrity Model and Policy Analysis (Abstract)

Jean-Pierre Seifert , Technical University of Berlin, Berlin
Hongxin Hu , Arizona State University, Tempe
Gail-Joon Ahn , Arizona State University, Tempe
Xinwen Zhang , Huawei Research Center, Santa Clara
Wenjuan Xu , Frostburg State University, Frostburg
pp. 429-442
Comments

On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks (Abstract)

Yuqing Zhang , National Computer Network Intrusion Protection Center, GUCAS, Beijing,
Huaqun Wang , Dalian Ocean University, Dalian
pp. 443-446
97 ms
(Ver )