Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
TRUSTCOM
TRUSTCOM 2014
Generate Citations
2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
Sept. 24 2014 to Sept. 26 2014
Beijing, China
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-xvi
Message from the TrustCom 2014 General Chairs
Freely available from IEEE.
pp. xvii-xvii
Message from the TrustCom 2014 Program Chairs
Freely available from IEEE.
pp. xviii-xviii
Message from the TrustCom 2014 Steering Chairs
Freely available from IEEE.
pp. xix-xix
Message from the TrustCom 2014 Workshop/Symposium Chairs
Freely available from IEEE.
pp. xx-xx
Message from the BDSE 2014 Chairs
Freely available from IEEE.
pp. xxi-xxi
Message from the EFINS 2014 Workshop Chairs
Freely available from IEEE.
pp. xxii-xxii
Message from the SpaIoT 2014 Symposium Chairs
Freely available from IEEE.
pp. xxiii-xxiii
Message from the NOPE 2014 Workshop Chairs
Freely available from IEEE.
pp. xxiv-xxiv
Message from the UbiSafe 2014 Symposium Chairs
Freely available from IEEE.
pp. xxv-xxv
Message from the TSCloud 2014 Symposium Chairs
Freely available from IEEE.
pp. xxvi-xxvi
Message from the SPMBB 2014 Workshop Chairs
Freely available from IEEE.
pp. xxvii-xxvii
TrustCom 2014 Organizing and Program Committees
Freely available from IEEE.
pp. xxviii-xxxi
BDSE 2014 Organizing and Program Committees
Freely available from IEEE.
pp. xxxii-xxxiii
EFINS 2014 Organizing and Program Committees
Freely available from IEEE.
pp. xxxiv-xxxvi
SpaIoT 2014 Organizing and Program Committees
Freely available from IEEE.
pp. xxxvii-xxxviii
NOPE 2014 Organizing and Program Committees
Freely available from IEEE.
pp. xxxix-xxxix
UbiSafe 2014 Organizing and Program Committees
Freely available from IEEE.
pp. xl-xli
TSCloud 2014 Organizing and Program Committees
Freely available from IEEE.
pp. xlii-xlii
SPMBB 2014 Organizing and Program Committees
Freely available from IEEE.
pp. xliii-xliii
A Clustering-Based Privacy-Preserving Method for Uncertain Trajectory Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Zhou-Fu Cai
,
He-Xing Yang
,
Wang Shuang
,
Xu Jian
,
Wang-Ming Wei
,
Wu-Li Na
A Lightweight Anonymous Mobile Shopping Scheme Based on DAA for Trusted Mobile Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-17
by
Bo Yang
,
Dengguo Feng
,
Yu Qin
Automated User Profiling in Location-Based Mobile Messaging Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-26
by
Yao Cheng
,
Chang Xu
,
Yi Yang
,
Lingyun Ying
,
Purui Su
,
Dengguo Feng
PrivateDroid: Private Browsing Mode for Android
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-36
by
Su Mon Kywe
,
Christopher Landis
,
Yutong Pei
,
Justin Satterfield
,
Yuan Tian
,
Patrick Tague
TTPCookie: Flexible Third-Party Cookie Management for Increasing Online Privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-44
by
Ashar Javed
,
Christian Merz
,
Joerg Schwenk
Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-52
by
Mu Yang
,
Yijun Yu
,
Arosha K. Bandara
,
Bashar Nuseibeh
Garbling in Reverse Order
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-60
by
Tommi Meskanen
,
Valtteri Niemi
,
Noora Nieminen
Private Outsourcing of Polynomial Functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-68
by
Peili Li
,
Haixia Xu
,
Jiaqi Hong
A Machine Learning Based Trust Evaluation Framework for Online Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-74
by
Kang Zhao
,
Li Pan
Multi-dimensions of Developer Trustworthiness Assessment in OSS Community
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-81
by
Yu Bai
,
Gang Yin
,
Huaimin Wang
A Novel Feature Selection Approach for Intrusion Detection Data Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-89
by
Mohammed A. Ambusaidi
,
Xiangjian He
,
Zhiyuan Tan
,
Priyadarsi Nanda
,
Liang Fu Lu
,
Upasana T. Nagar
An On-Line Anomaly Detection Method Based on a New Stationary Metric - Entropy-Ratio
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-97
by
Ziyu Wang
,
Jiahai Yang
,
Fuliang Li
Reaching Agreement in Security Policy Negotiation
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-105
by
Yanhuang Li
,
Nora Cuppens-Boulahia
,
Jean-Michel Crom
,
Frederic Cuppens
,
Vincent Frey
Remembrance of Local Information Status for Enforcing Robustness of Policy-Exchanged Strategies for Trust Negotiation
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-113
by
Yunxi Zhang
,
Darren Mundy
Secure and Privacy-Friendly Public Key Generation and Certification
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-121
by
Fábio Borges
,
Leonardo A. Martucci
,
Filipe Beato
,
Max Mühlhäuser
A Stateful Mechanism for the Tree-Rule Firewall
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-129
by
Thawatchai Chomsiri
,
Xiangjian He
,
Priyadarsi Nanda
,
Zhiyuan Tan
CAFS: A Framework for Context-Aware Federated Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 130-139
by
Md. Sadek Ferdous
,
Ron Poet
Encrypted Keyword Search Mechanism Based on Bitmap Index for Personal Storage Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-147
by
Yong Ho Hwang
,
Jae Woo Seo
,
Il Joo Kim
High Performance FPGA Implementation of Elliptic Curve Cryptography over Binary Fields
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-155
by
Shuai Liu
,
Lei Ju
,
Xiaojun Cai
,
Zhiping Jia
,
Zhiyong Zhang
A High-Performance Distributed Certificate Revocation Scheme for Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-163
by
Chongxian Guo
,
Huaqiang Xu
,
Lei Ju
,
Zhiping Jia
,
Jihai Xu
SIMS: A Comprehensive Approach for a Secure Instant Messaging Sifter
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-173
by
Gunter Fahrnberger
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-181
by
Wenjuan Li
,
Weizhi Meng
,
Zhiyuan Tan
,
Yang Xiang
Ultra High-Speed SM2 ASIC Implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-188
by
Zhenwei Zhao
,
Guoqiang Bai
Visual Similarity Based Anti-phishing with the Combination of Local and Global Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-196
by
Yu Zhou
,
Yongzheng Zhang
,
Jun Xiao
,
Yipeng Wang
,
Weiyao Lin
A Practically Optimized Implementation of Attribute Based Cryptosystems
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-204
by
Chunqiang Hu
,
Fan Zhang
,
Tao Xiang
,
Hongjuan Li
,
Xiao Xiao
,
Guilin Huang
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-211
by
Mian Ahmad Jan
,
Priyadarsi Nanda
,
Xiangjian He
,
Zhiyuan Tan
,
Ren Ping Liu
Bargaining-Based Dynamic Decision for Cooperative Authentication in MANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-220
by
Liu Licai
,
Yin Lihua
,
Guo Yunchuan
,
Fang Bingxing
Multiplicative Attributes Graph Approach for Persistent Authentication in Single-Sign-On Mobile Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-228
by
Uthpala Subodhani Premarathne
,
Ibrahim Khalil
ToAuth: Towards Automatic Near Field Authentication for Smartphones
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-236
by
Weixi Gu
,
Zheng Yang
,
Longfei Shangguan
,
Xiaoyu Ji
,
Yiyang Zhao
One Kind of Cross-Domain DAA Scheme from Bilinear Mapping
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-243
by
Xiaoming Wang
,
Heyou Cheng
,
Ruihua Zhang
Long Term Tracking and Characterization of P2P Botnet
Full-text access may be available. Sign in or learn about subscription options.
pp. 244-251
by
Jia Yan
,
Lingyun Ying
,
Yi Yang
,
Purui Su
,
Dengguo Feng
A Survey of Security Network Coding toward Various Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-259
by
Shixiong Yao
,
Jing Chen
,
Ruiying Du
,
Lan Deng
,
Chiheng Wang
Defensor: Lightweight and Efficient Security-Enhanced Framework for Android
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-267
by
Xuerui Pan
,
Yibing Zhongyang
,
Zhi Xin
,
Bing Mao
,
Hao Huang
Public-Key Encryption Resilient against Linear Related-Key Attacks Revisited
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-275
by
Hui Cui
,
Yi Mu
,
Man Ho Au
The Micro-architectural Support Countermeasures against the Branch Prediction Analysis Attack
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-283
by
Ya Tan
,
Jizeng Wei
,
Wei Guo
AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 284-291
by
Ahmed Taha
,
Ruben Trapero
,
Jesus Luna
,
Neeraj Suri
Efficiently Attribute-Based Access Control for Mobile Cloud Storage System
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-299
by
Zhiquan Lv
,
Jialin Chi
,
Min Zhang
,
Dengguo Feng
EqualVisor: Providing Memory Protection in an Untrusted Commodity Hypervisor
Full-text access may be available. Sign in or learn about subscription options.
pp. 300-309
by
Liang Deng
,
Qingkai Zeng
,
Weiguang Wang
,
Yao Liu
FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 310-319
by
Yu Zhang
,
Jing Chen
,
Ruiying Du
,
Lan Deng
,
Yang Xiang
,
Qing Zhou
ONHelp: Components in Building Secure Cloud Based on OpenNebula
Full-text access may be available. Sign in or learn about subscription options.
pp. 320-327
by
Kao Zhao
,
Hai Jin
,
Deqing Zou
,
Weiqi Dai
Proofs of Ownership and Retrievability in Cloud Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-335
by
Ruiying Du
,
Lan Deng
,
Jing Chen
,
Kun He
,
Minghui Zheng
Temporal Access Control with User Revocation for Cloud Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-343
by
Nihal Balani
,
Sushmita Ruj
Trust Enhanced Cloud Security for Healthcare Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 344-351
by
Udaya Tupakula
,
Vijay Varadharajan
Trusted Geolocation-Aware Data Placement in Infrastructure Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 352-360
by
Nicolae Paladi
,
Mudassar Aslam
,
Christian Gehrmann
Cognitive Adaptive Access-Control System for a Secure Locator/Identifier Separation Context
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-369
by
Yuanlong Cao
,
Jianfeng Guan
,
Changqiao Xu
,
Wei Quan
,
Hongke Zhang
AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 370-379
by
Julian Schutte
,
Dennis Titze
,
J. M. de Fuentes
Attack Tree Based Android Malware Detection with Hybrid Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-387
by
Shuai Zhao
,
Xiaohong Li
,
Guangquan Xu
,
Lei Zhang
,
Zhiyong Feng
Automatically Exploiting Potential Component Leaks in Android Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 388-397
by
Li Li
,
Alexandre Bartel
,
Jacques Klein
,
Yves le Traon
Data-centric Rogue Node Detection in VANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-405
by
Kamran Zaidi
,
Milos Milojevic
,
Veselin Rakocevic
,
Muttukrishnan Rajarajan
Detect Android Malware Variants Using Component Based Topology Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 406-413
by
Tong Shen
,
Yibing Zhongyang
,
Zhi Xin
,
Bing Mao
,
Hao Huang
Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation
Full-text access may be available. Sign in or learn about subscription options.
pp. 414-421
by
Parvez Faruki
,
Ammar Bharmal
,
Vijay Laxmi
,
M.S. Gaur
,
Mauro Conti
,
Muttukrishnan Rajarajan
Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR
Full-text access may be available. Sign in or learn about subscription options.
pp. 422-431
by
Sarah Abughazalah
,
Kostantinos Markantonakis
,
Keith Mayes
Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones
Full-text access may be available. Sign in or learn about subscription options.
pp. 432-439
by
Zhihui Han
,
Liang Cheng
,
Yang Zhang
,
Shuke Zeng
,
Yi Deng
,
Xiaoshan Sun
Synthesising End-to-End Security Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 440-447
by
Charles Thevathayan
,
Peter Bertok
,
George Fernandez
Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager
Full-text access may be available. Sign in or learn about subscription options.
pp. 448-456
by
Raja Naeem Akram
,
Konstantinos Markantonakis
,
Damien Sauveron
Design and Analysis of a New Feature-Distributed Malware
Full-text access may be available. Sign in or learn about subscription options.
pp. 457-464
by
Byungho Min
,
Vijay Varadharajan
On Energy Efficient Scheduling and Load Distribution Based on Renewable Energy for Wireless Mesh Network in Disaster Area
Full-text access may be available. Sign in or learn about subscription options.
pp. 465-472
by
Meng Li
,
Hiroki Nishiyama
,
Yasunori Owada
,
Kiyoshi Hamaguchi
Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 473-480
by
Hui Xia
,
Jia Yu
,
Zhi-Yong Zhang
,
Xiang-Guo Cheng
,
Zhen-Kuan Pan
BIBRM: A Bayesian Inference Based Road Message Trust Model in Vehicular Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 481-486
by
Guanghao Wang
,
Yue Wu
Convergence of True Cooperations in Bayesian Reputation Game
Full-text access may be available. Sign in or learn about subscription options.
pp. 487-494
by
Jooyoung Lee
,
Jae C. Oh
Practical Assessment of Biba Integrity for TCG-Enabled Platforms
Full-text access may be available. Sign in or learn about subscription options.
pp. 495-504
by
Roberto Sassu
,
Gianluca Ramunno
,
Antonio Lioy
SigmoRep: A Robust Reputation Model for Open Collaborative Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 505-510
by
Ahmad A. Kardan
,
Reza Salarmehr
,
Azade Farshad
Towards Robust and Effective Trust Management for Security: A Survey
Full-text access may be available. Sign in or learn about subscription options.
pp. 511-518
by
Dongxia Wang
,
Tim Muller
,
Yang Liu
,
Jie Zhang
Trust Mechanism for Enforcing Compliance to Secondary Data Use Contracts
Full-text access may be available. Sign in or learn about subscription options.
pp. 519-526
by
Zeinab Noorian
,
Johnson Iyilade
,
Mohsen Mohkami
,
Julita Vassileva
An Effective Path Load Balancing Mechanism Based on SDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 527-533
by
Jun Li
,
Xiangqing Chang
,
Yongmao Ren
,
Zexin Zhang
,
Guodong Wang
Integrity Levels: A New Paradigm for Protecting Computing Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 534-543
by
Christipher Jenkins
,
Lyndon Pierson
Integrity Verification and Secure Loading of Remote Binaries for Microkernel-Based Runtime Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 544-551
by
Michael Weiß
,
Steffen Wagner
,
Roland Hellman
,
Sascha Wessel
Overhead-Free In-Place Recovery Scheme for XOR-Based Storage Codes
Full-text access may be available. Sign in or learn about subscription options.
pp. 552-557
by
Ximing Fu
,
Zhiqing Xiao
,
Shenghao Yang
Untrusted User Detection in Microblogs
Full-text access may be available. Sign in or learn about subscription options.
pp. 558-564
by
Zidan Yu
,
Huiqun Yu
A Privacy-Enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures
Full-text access may be available. Sign in or learn about subscription options.
pp. 565-574
by
Sanami Nakagawa
,
Keita Emura
,
Goichiro Hanaoka
,
Akihisa Kodate
,
Takashi Nishide
,
Eiji Okamoto
,
Yusuke Sakai
Anonymous Proxy Signature with Restricted Traceability
Full-text access may be available. Sign in or learn about subscription options.
pp. 575-581
by
Jiannan Wei
,
Guomin Yang
,
Yi Mu
Efficient Traceable Attribute-Based Signature
Full-text access may be available. Sign in or learn about subscription options.
pp. 582-589
by
Shenglong Ding
,
Yiming Zhao
,
Yuyang Liu
Computation Integrity Measurement Based on Branch Transfer
Full-text access may be available. Sign in or learn about subscription options.
pp. 590-597
by
Jianming Fu
,
Yan Lin
,
Xu Zhang
,
Pengwei Li
Emergency Key Rollover in DNSSEC
Full-text access may be available. Sign in or learn about subscription options.
pp. 598-604
by
Zheng Wang
,
Liyuan Xiao
Crowd Sensing of Urban Emergency Events Based on Social Media Big Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 605-610
by
Zheng Xu
,
Hui Zhang
,
Yunhuai Liu
,
Lin Mei
SocAware: A Middleware for Social Applications in Online Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 611-615
by
Liang Chen
,
Kan Chen
,
Chengcheng Shao
,
Peidong Zhu
Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 616-621
by
Conghuan Ye
,
Zenggang Xiong
,
Yaoming Ding
,
Jiping Li
,
Guangwei Wang
,
Xuemin Zhang
,
Kaibing Zhang
Showing 100 out of 155
Load More
Load All