Sciweavers

ICISS
2009
Springer
13 years 9 months ago
Method-Specific Java Access Control via RMI Proxy Objects Using Annotations
We propose a novel approach for granting partial access on arbitrary objects at the granularity of methods to remote clients. The applications that we target use Remote Method Invo...
Jeff Zarnett, Patrick Lam, Mahesh V. Tripunitara
ICISS
2009
Springer
13 years 9 months ago
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
Abstract. Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual...
Vanessa Frías-Martínez, Salvatore J....
ICISS
2009
Springer
13 years 9 months ago
On Some Weaknesses in the Disk Encryption Schemes EME and EME2
Abstract. Tweakable enciphering schemes are a certain type of blockcipher mode of operation which provide security in the sense of a strong pseudo-random permutation. It has been p...
Cuauhtemoc Mancillas-López, Debrup Chakrabo...
ICISS
2009
Springer
14 years 4 months ago
A Generic Distortion Free Watermarking Technique for Relational Databases
In this paper we introduce a distortion free watermarking e for relational databases based on the Abstract Interpretation framework. The watermarking technique is partition based. ...
Sukriti Bhattacharya, Agostino Cortesi
ICISS
2009
Springer
14 years 6 months ago
A Framework for Behavior-Based Malware Analysis in the Cloud
Abstract. To ease the analysis of potentially malicious programs, dynamic behavior-based techniques have been proposed in the literature. Unfortunately, these techniques often give...
Lorenzo Martignoni, Roberto Paleari, Danilo Brusch...
ICISS
2009
Springer
14 years 6 months ago
Remote Electronic Voting with Revocable Anonymity
We present a new remote, coercion-free electronic voting protocol which satisfies a number of properties previously considered contradictory. We introduce (and justify) the idea ...
Matt Smart, Eike Ritter
ICISS
2009
Springer
14 years 6 months ago
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles
Many peer-assisted content-distribution systems reward a peer based on the amount of data that this peer serves to others. However, validating that a peer did so is, to our knowled...
Michael K. Reiter, Vyas Sekar, Chad Spensky, Zheng...
ICISS
2009
Springer
14 years 6 months ago
A Survey of Voice over IP Security Research
We present a survey of Voice over IP security research. Our goal is to provide a roadmap for researchers seeking to understand existing capabilities and, and to identify gaps in ad...
Angelos D. Keromytis
ICISS
2009
Springer
14 years 6 months ago
Biometrics and Security
Venu Govindaraju