The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 04 - July-Aug. (vol. 9)
ISSN: 1545-5971
Special Section on Learning, Games, and Security

Incentive Compatible Privacy-Preserving Distributed Classification (Abstract)

Robert Nix , University of Texas at Dallas, Richardson
Murat Kantarcioglu , University of Texas at Dallas, Richardson
pp. 451-462

Large Margin Gaussian Mixture Models with Differential Privacy (Abstract)

Bhiksha Raj , Carnegie Mellon University, Pittsburgh
Manas A. Pathak , Carnegie Mellon University, Pittsburgh
pp. 463-469

On Privacy of Encrypted Speech Communications (Abstract)

Ye Zhu , Cleveland State University, Cleveland
Anil Vikram , Cleveland State University, Cleveland
Yuanchao Lu , Cleveland State University, Cleveland
pp. 470-481

A Learning-Based Approach to Reactive Security (Abstract)

Peter L. Bartlett , University of California Berkeley, Berkeley
Benjamin I.P. Rubinstein , Microsoft Research, Mountain View
Adam Barth , Google Inc., Mountain View
John C. Mitchell , Stanford University, Stanford
Mukund Sundararajan , Google Inc., Mountain View
Dawn Song , University of California Berkeley, Berkeley
pp. 482-493

ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing (Abstract)

Jun-Won Ho , Seoul Women's University, Seoul
Sajal K. Das , The University of Texas at Arlington, Arlington
Matthew Wright , The University of Texas at Arlington, Arlington
pp. 494-510

DoubleGuard: Detecting Intrusions in Multitier Web Applications (Abstract)

Brent ByungHoon Kang , George Mason University, Fairfax
Meixing Le , George Mason University, fairfax
Angelos Stavrou , George Mason University, Fairfax
pp. 511-524
Papers

Automated Security Test Generation with Formal Threat Models (Abstract)

Manghui Tu , Dakota State University, Madison
Daniel Woodraska , Dakota State University, Madison
Michael Sanford , Dakota State University, Madison
Weifeng Xu , Gannon University, Erie
Lijo Thomas , Dakota State University, Madison
Dianxiang Xu , Dakota State University, Madison
pp. 525-539

Enforcing Mandatory Access Control in Commodity OS to Disable Malware (Abstract)

Xin Wang , Stony Brook University, Stony Brook
Zhiyong Shan , Renmin University of China, Beijing
Tzi-cker Chiueh , Stony Brook University, Stony Brook
pp. 540-554

Ensuring Distributed Accountability for Data Sharing in the Cloud (Abstract)

Smitha Sundareswaran , The Pennsylvania State University, University Park
Dan Lin , Missouri University of Science and Technology, Rolla
Anna C. Squicciarini , The Pennsylvania State University, University Park
pp. 555-567

Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals (Abstract)

Alessandro Mei , Sapienza University of Rome, Rome
Julinda Stefa , Sapienza University of Rome, Rome
pp. 568-581

Recommendation Models for Open Authorization (Abstract)

Mohamed Shehab , University of North Carolina at Charlotte, Charlotte
Said Marouf , University of North Carolina at Charlotte, Charlotte
pp. 582-594

Resilient Authenticated Execution of Critical Applications in Untrusted Environments (Abstract)

Gabriel Ghinita , University of Massachusetts, Boston
Michael S. Kirkpatrick , James Madison University, Harrisonburg
Elisa Bertino , Purdue University, West Lafayette
pp. 595-607

Secure Failure Detection and Consensus in TrustedPals (Abstract)

Felix C. Freiling , Friedrich-Alexander-University Erlangen-Nuremberg, Erlangen
Roberto Cortiñas , Universidad del País Vasco, San Sebastian
Iratxe Soraluze , Universidad del País Vasco, San Sebastian
Marjan Ghajar-Azadanlou , RWTH Aachen University, Aachen
Mikel Larrea , Universidad del País Vasco, San Sebastian
Alberto Lafuente , Universidad del País Vasco, San Sebastian
Lucia Draque Penso , TU Ilmenau, Ilmenau
pp. 608-623
82 ms
(Ver 3.1 (10032016))