Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
TRUSTCOM
TRUSTCOM 2013
Generate Citations
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
July 16 2013 to July 18 2013
Melbourne, Australia
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-xxiii
TrustCom 2013: Message from the General Chairs
Freely available from IEEE.
pp. xxiv-xxiv
TrustCom 2013: Message from the Program Chairs
Freely available from IEEE.
pp. xxv-xxv
TrustCom 2013: Message from the Steering Chairs
Freely available from IEEE.
pp. xxvi-xxvi
TrustCom 2013: Message from the Workshop/Symposium Chairs
Freely available from IEEE.
pp. xxvii-xxvii
TrustCom 2013: Organizing and Program Committees
Freely available from IEEE.
pp. xxviii-xxxii
ISPA 2013: Message from the General Chairs
Freely available from IEEE.
pp. xxxiii-xxxiii
ISPA 2013: Message from the Program Chairs
Freely available from IEEE.
pp. xxxiv-xxxiv
ISPA 2013: Organizing and Program Committees
Freely available from IEEE.
pp. xxxv-xxxviii
IUCC 2013: Message from the General Chairs
Freely available from IEEE.
pp. xxxix-xxxix
IUCC 2013: Message from the Program Chairs
Freely available from IEEE.
pp. xl-xl
IUCC 2013: Organizing and Program Committees
Freely available from IEEE.
pp. xli-xliii
TrustID 2013: Message from the Symposium Chairs
Freely available from IEEE.
pp. xliv-xliv
TrustID 2013: Organizing and Program Committees
Freely available from IEEE.
pp. xlv-xlv
TSCloud 2013: Message from the Chairs
Freely available from IEEE.
pp. xlvi-xlvi
TSCloud 2013: Organizing and Program Committees
Freely available from IEEE.
pp. xlvii-xlviii
WNM 2013: Message from the Workshop Chairs
Freely available from IEEE.
pp. xlvix-xlvix
WNM 2013: Organizing and Program Committees
Freely available from IEEE.
pp. l-l
A Privacy-Leakage-Tolerance Based Noise Enhancing Strategy for Privacy Protection in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Gaofeng Zhang
,
Yun Yang
,
Jinjun Chen
An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-16
by
Chang Liu
,
Xuyun Zhang
,
Chengfei Liu
,
Yun Yang
,
Rajiv Ranjan
,
Dimitrios Georgakopoulos
,
Jinjun Chen
A Fuzzy Modeling Approach for Risk-Based Access Control in eHealth Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-23
by
Juan Li
,
Yan Bai
,
Nazia Zaman
Scalable and Privacy-Preserving Variants of the Austrian Electronic Mandate System in the Public Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-33
by
Bernd Zwattendorfer
,
Daniel Slamanig
KP-ABE Based Verifiable Cloud Access Control Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-41
by
Xiaolin Si
,
Pengpian Wang
,
Liwu Zhang
Light-Weight Trust-Based On-Demand Multipath Routing Protocol for Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-49
by
Chuanhao Qu
,
Lei Ju
,
Zhiping Jia
,
Huaqiang Xu
,
Longpeng Zheng
Garbled Routing (GR): Towards Unification of Anonymous Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-57
by
Shaahin Madani
,
Ibrahim Khalil
Secure Routing Based on Network Coding in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-64
by
Jing Chen
,
Ruiying Du
,
Qian Wang
,
Shixiong Yao
TIGER: A Trust-based Intelligent Geographical Energy-aware Routing for Smart Grid Communication Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-72
by
Ming Xiang
,
William Liu
,
Quan Bai
AFC: An Effective Metric for Reliable Routing in Wireless Mesh Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-80
by
Rakesh Matam
,
Somanath Tripathy
Performance Evaluation of Trust-Based Collaborative Sanctioning in MANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-88
by
Marcin Seredynski
,
Riad Aggoune
,
Krzysztof Szczypiorski
,
Djamel Khadraoui
Novel Physically-Embedded Data Encryption for Embedded Device
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-93
by
Fangyong Hou
,
Nong Xiao
,
Hongjun He
,
Fang Liu
,
Zhiguang Chen
Server Assisted Key Establishment for WSN: A MIKEY-Ticket Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-101
by
Aymen Boudguiga
,
Alexis Olivereau
,
Nouha Oualha
A Fully-Secure RFID Authentication Protocol from Exact LPN Assumption
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-109
by
Mohammad Saiful Islam Mamun
,
Atsuko Miyaji
Determining Similar Recommenders Using Improved Collaborative Filtering in MANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 110-117
by
Raihana Ferdous
,
Vallipuram Muthukkumarasamy
,
Elankayer Sithirasenan
Privacy-Preserving Wireless Medical Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 118-125
by
Xun Yi
,
Jan Willemson
,
Farid Nait-Abdesselam
A Threat to Mobile Cyber-Physical Systems: Sensor-Based Privacy Theft Attacks on Android Smartphones
Full-text access may be available. Sign in or learn about subscription options.
pp. 126-133
by
Lingguang Lei
,
Yuewu Wang
,
Jian Zhou
,
Daren Zha
,
Zhongwen Zhang
Protocol Formats Reverse Engineering Based on Association Rules in Wireless Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-141
by
Yong Wang
,
Nan Zhang
,
Yan-mei Wu
,
Bin-bin Su
,
Yong-jian Liao
Power Based Malicious Code Detection Techniques for Smartphones
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-149
by
Bryan Dixon
,
Shivakant Mishra
A Privacy-Preserved Joint Group Time Scheduling Mechanism for Mobile Social Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-155
by
Yu-Jia Chen
,
Chia-Yu Lin
,
Li-Chun Wang
ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-162
by
Qihui Zhou
,
Dan Wang
,
Yan Zhang
,
Bo Qin
,
Aimin Yu
,
Baohua Zhao
Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-171
by
Min Zheng
,
Mingshen Sun
,
John C. S. Lui
Securing Domain Name System Combined with MIPv6 for Mobile Hosts
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-179
by
Younchan Jung
,
Marnel Peradilla
,
William Atwood
Securing Mobile Mashups with SCCM
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-187
by
F. Batard
,
K. Boudaoud
,
M. Riveill
Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-195
by
Soufiene Ben Othman
,
Abdelbasset Trad
,
Habib Youssef
,
Hani Alzaid
Modeling Malware Propagation in Smartphone Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-201
by
Sancheng Peng
,
Guojun Wang
,
Shui Yu
Unwanted Content Control via Trust Management in Pervasive Social Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-209
by
Zheng Yan
,
Raimo Kantola
,
Gaowa Shi
,
Peng Zhang
Trust Inference Computation for Online Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-217
by
Sana Hamdi
,
Amel Bouzeghoub
,
Alda Lopes Gancarski
,
Sadok Ben Yahia
Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-225
by
Owen Sacco
,
John G. Breslin
,
Stefan Decker
Preserving Utility in Social Network Graph Anonymization
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-232
by
Mohd Izuan Hafez Ninggal
,
Jemal H. Abawajy
DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-240
by
Yuan Tao
,
Shui Yu
Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-248
by
Yuxin Meng
,
Lam-For Kwok
Rational Secret Sharing Information -- Theoretically Secure against Adaptive Adversaries
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-256
by
Yang Yu
,
Zhanfei Zhou
What is the Pattern of a Botnet?
Full-text access may be available. Sign in or learn about subscription options.
pp. 257-264
by
Tianzuo Wang
,
Huaimin Wang
,
Bo Liu
,
Peichang Shi
Analyzing Malware by Abstracting the Frequent Itemsets in API Call Sequences
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-270
by
Yong Qiao
,
Jie He
,
Yuexiang Yang
,
Lin Ji
Kappa-Fuzzy ARTMAP: A Feature Selection Based Methodology to Intrusion Detection in Computer Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-276
by
Nelcileno Virgilio Araujo De Souza
,
Ruy De Oliveira
,
Ed Wilson Tavares Ferreira
,
Valtemir Emerencio do Nascimento
,
Ailton Akira Shinoda
,
Bharat Bhargava
Visual Analytics Model for Intrusion Detection in Flood Attack
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-284
by
Jinson Zhang
,
Mao Lin Huang
A Regional Statistics Detection Scheme against Sybil Attacks in WSNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 285-291
by
Mingxi Li
,
Yan Xiong
,
Xuangou Wu
,
Xiancun Zhou
,
Yuhui Sun
,
Shenpei Chen
,
Xiaoya Zhu
A Framework for Improving the Accuracy of Unsupervised Intrusion Detection for SCADA Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-301
by
Abdulmohsen Almalawi
,
Zahir Tari
,
Adil Fahad
,
Ibrahim Khalil
Security Aspects of Military Sensor-Based Defence Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 302-309
by
Michael N. Johnstone
,
Robert Thompson
A Secure and Efficient Fault-Tolerant Group Key Agreement Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 310-314
by
Anmin Fu
,
Gongxuan Zhang
,
Zhenchao Zhu
MDS-Based Trust Estimation of Event Reporting Node in VANET
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-320
by
T. Raghu Vamsi Krishna
,
Rajesh P. Barnwal
,
Soumya K. Ghosh
sEncrypt: An Encryption Algorithm Inspired from Biological Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-327
by
Oliver Bonham-Carter
,
Abhishek Parakh
,
Dhundy Bastola
A Scalable Architecture for Highly Reliable Certification
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-335
by
Xavier Bonnaire
,
Rudyar Cortes
,
Fabrice Kordon
,
Olivier Marin
A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-345
by
Raja Naeem Akram
,
Konstantinos Markantonakis
,
Keith Mayes
A Model for Context-Aware Location Identity Preservation Using Differential Privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 346-353
by
Roland Assam
,
Thomas Seidl
P3MCF: Practical Privacy-Preserving Multi-domain Collaborative Filtering
Full-text access may be available. Sign in or learn about subscription options.
pp. 354-361
by
Toru Nakamura
,
Shinsaku Kiyomoto
,
Ryu Watanabe
,
Yutaka Miyake
On the Use of LSH for Privacy Preserving Personalization
Full-text access may be available. Sign in or learn about subscription options.
pp. 362-371
by
Armen Aghasaryan
,
Makram Bouzid
,
Dimitre Kostadinov
,
Mohit Kothari
,
Animesh Nandi
Improving the Utility of Differentially Private Data Releases via k-Anonymity
Full-text access may be available. Sign in or learn about subscription options.
pp. 372-379
by
Jordi Soria-Comas
,
Josep Domingo-Ferrer
,
David Sanchez
,
Sergio Martinez
Scheme of User Privacy Protection Applied to Online Marketing
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-387
by
Maria das Gracas da Silva Oliveira
,
Ruy J. G. B. de Queiroz
An Effective Deferentially Private Data Releasing Algorithm for Decision Tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 388-395
by
Tianqing Zhu
,
Ping Xiong
,
Yang Xiang
,
Wanlei Zhou
An Application Security Framework for Near Field Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 396-403
by
Dirar Abu-Saymeh
,
Dhiah El Diehn I. Abou-Tair
,
Ahmad Zmily
Scalable Attack Representation Model Using Logic Reduction Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 404-411
by
Jin Bum Hong
,
Dong Seong Kim
,
Tadao Takaoka
Formalizing and Modeling Fairness for Benefit Distribution in Collaborations
Full-text access may be available. Sign in or learn about subscription options.
pp. 412-420
by
Florian Volk
,
Florian Sokoli
,
Sascha Hauke
,
Max Muhlhauser
Attribute-Based Mining Process for the Organization-Based Access Control Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 421-430
by
Ahmad Samer Wazan
,
Gregory Blanc
,
Herve Debar
,
Joaquin Garcia-Alfaro
Private Multiparty Set Intersection Protocol in Rational Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 431-438
by
Keita Emura
,
Atsuko Miyaji
,
Mohammad Shahriar Rahman
A Mutual Nonrepudiation Protocol for Cloud Storage with Interchangeable Accesses of a Single Account from Multiple Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 439-446
by
Gwan-Hwan Hwang
,
Jenn-Zjone Peng
,
Wei-Sian Huang
Privacy-Enhanced Keyword Search in Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 447-451
by
Miao Zhou
,
Yi Mu
,
Willy Susilo
,
Man Ho Au
iPEKS: Fast and Secure Cloud Data Retrieval from the Public-Key Encryption with Keyword Search
Full-text access may be available. Sign in or learn about subscription options.
pp. 452-458
by
Fu-Kuo Tseng
,
Rong-Jaye Chen
,
Bao-Shuh Paul Lin
A Trust-Aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces
Full-text access may be available. Sign in or learn about subscription options.
pp. 459-468
by
Sheikh Mahbub Habib
,
Vijay Varadharajan
,
Max Muhlhauser
Reputation Attacks Detection for Effective Trust Assessment among Cloud Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 469-476
by
Talal H. Noor
,
Quan Z. Sheng
,
Abdullah Alfazi
Hierarchical Attribute-Based Access Control with Authentication for Outsourced Data in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 477-484
by
Xuejiao Liu
,
Yingjie Xia
,
Shasha Jiang
,
Fubiao Xia
,
Yanbo Wang
Access Control Management for Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 485-492
by
Mansura Habiba
,
Md Rafiqul Islam
,
A. B. M. Shawkat Ali
Cloud Computing: Insider Attacks on Virtual Machines during Migration
Full-text access may be available. Sign in or learn about subscription options.
pp. 493-500
by
Adrian Duncan
,
Sadie Creese
,
Michael Goldsmith
,
Jamie S. Quinton
Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 501-508
by
Xuyun Zhang
,
Chang Liu
,
Surya Nepal
,
Chi Yang
,
Wanchun Dou
,
Jinjun Chen
A Framework for Authentication and Authorization Credentials in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 509-516
by
Nelson Mimura Gonzalez
,
Marco Antonio Torrez Rojas
,
Marcos Vinicius Maciel da Silva
,
Fernando Redigolo
,
Tereza Cristina Melo de Brito Carvalho
,
Charles Christian Miers
,
Mats Naslund
,
Abu Shohel Ahmed
On the Design of a Trust Enhanced Distributed Authorisation Architecture for Service Oriented Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 517-524
by
Aarthi Krishna
,
Vijay Varadharajan
,
Nathan Tarr
On the Application of Supervised Machine Learning to Trustworthiness Assessment
Full-text access may be available. Sign in or learn about subscription options.
pp. 525-534
by
Sascha Hauke
,
Sebastian Biedermann
,
Max Muhlhauser
,
Dominik Heider
Building Confidence in Information-Trustworthiness Metrics for Decision Support
Full-text access may be available. Sign in or learn about subscription options.
pp. 535-543
by
Jason R. C. Nurse
,
Ioannis Agrafiotis
,
Sadie Creese
,
Michael Goldsmith
,
Koen Lamberts
Efficient Fair UC-Secure Two-Party Computation on Committed Inputs
Full-text access may be available. Sign in or learn about subscription options.
pp. 544-551
by
Ruan Ou
,
Fu Cai
,
Zhou Jing
,
Han Lansheng
,
Xiao-Yang Liu
Trust Enhanced Security Architecture for Detecting Insider Threats
Full-text access may be available. Sign in or learn about subscription options.
pp. 552-559
by
Udaya Tupakula
,
Vijay Varadharajan
Integrating Trust with Cryptographic Role-Based Access Control for Secure Cloud Data Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 560-569
by
Lan Zhou
,
Vijay Varadharajan
,
Michael Hitchens
An Online Query Authentication System for Outsourced Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 570-577
by
Ying Zhou
,
Chen Wang
Word N-Gram Based Classification for Data Leakage Prevention
Full-text access may be available. Sign in or learn about subscription options.
pp. 578-585
by
Sultan Alneyadi
,
Elankayer Sithirasenan
,
Vallipuram Muthukkumarasamy
Privacy Protected Data Forwarding in Human Associated Delay Tolerant Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 586-593
by
Longxiang Gao
,
Ming Li
,
Wanlei Zhou
,
Wen Shi
S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance
Full-text access may be available. Sign in or learn about subscription options.
pp. 594-602
by
Chun Hui Suen
,
Ryan K. L. Ko
,
Yu Shyang Tan
,
Peter Jagadpramana
,
Bu Sung Lee
A Direct Insight into Victims of Cybercrime
Full-text access may be available. Sign in or learn about subscription options.
pp. 603-610
by
Nicholas Patterson
,
Michael Hobbs
,
Darren Palmer
Card-Present Transactions on the Internet Using the Smart Card Web Server
Full-text access may be available. Sign in or learn about subscription options.
pp. 611-619
by
Lazaros Kyrillidis
,
Keith Mayes
,
Boris Chazalet
,
Konstantinos Markantonakis
Secure Single Sign-On Schemes Constructed from Nominative Signatures
Full-text access may be available. Sign in or learn about subscription options.
pp. 620-627
by
Jingquan Wang
,
Guilin Wang
,
Willy Susilo
Showing 100 out of 279
Load More
Load All