HomeCall for PapersSpecial IssuesSubmit Your PaperCommitteesWorkshopsKeynote SpeakersAccepted PapersRegistrationSocial FunctionsVisa and TravelAccommodationPast EventsHPCC 2010ICKDE 2010

Accepted Papers

All the accepted regular papers and short papers will be published in the same NSS 2010 proceedings. The only difference is that the regular papers have 8 pages limit and short papers have 6 pages limit.

Accepted regular papers

Paper ID

Authors and Title

8

Mohamed Nassar, Radu State and Olivier Festor. A framework for monitoring SIP enterprise networks

12

Ion Alberdi, Vincent Nicomette and Philippe Owezarski. Luth: Composing and Parallelizing Midpoint Inspection Devices

19

Kun Peng and Feng Bao. Efficient Proof Of Validity Of Votes In Homomorphic E-Voting

22

Sebastian Roschke, Feng Cheng and Christoph Meinel. A Flexible and Efficient Alert Correlation Platform for Distributed IDS

23

McKay Williams, Sheldon Munns, Michael Temple and Michael Mendenhall. RF-DNA Fingerprinting for Airport WiMax Communications Security

24

Thomas Clausen and Ulrich Herberg. Router and Link Admittance Control in the Optimized Link State Routing Protocol version 2 (OLSRv2)

25

Cynthia Wagner, Gerard Wagener, Radu State, Alexandre Dulaunoy and Thomas Engel. Breaking Tor Anonymity with Game Theory and Data Mining

26

Hao Gao, Jun Yan and Yi Mu. Dynamic Trust Model for Federated Identity Management

29

Peter Danner, Daniel Hein and Stefan Kraxberger. Securing Emergency Response Operations Using Distributed Trust Decisions

31

Qiang Liu, Jian-ping Yin, Zhi-ping Cai and Ming Zhu. A Novel Threat Assessment Method for DDoS Early Warning Using Network Vulnerability Analysis

34

Mohammed Alzomai and Audun Josang. The Mobile Phone as a Multi OTP Device Using Trusted Computing

41

Jinchao Xu and Guosun Zeng. A software watermarking algorithm based on stack states transition graph

43

Mansoor Alicherry and Angelos Keromytis. DIPLOMA: Distributed Policy Enforcement Architecture for MANETs

45

Xiaoxun Sun and Hua Wang. Towards Identify Anonymization in Large Survey Rating Data

46

alban gabillon and leo letouzey. A view based access control model for SPARQL

48

Li Lin, Christopher Leckie and Chenfeng Zhou. Comparative Analysis of HTTP Anomaly Detection Algorithms: DFA vs N-Grams

50

Andrew White, Alan Tickle and Andrew Clark. Overcoming Reputation and Proof-of-Work Systems in Botnets

59

Yinghua Guo and Matthew Simon. Network forensics in MANET: traffic analysis of source spoofed DoS attacks

66

chunli lv, XiaoQi Jia, Li-Jun TIAN and JiWu Jing. Efficient Ideal Threshold Secret Sharing Schemes Based on EXCLUSIVE-OR operations

70

Aashish Sharma, Zbigniew Kalbarczyk, Ravishankar Iyer and James Barlow. Analysis of Credentials Stealing Attacks in an Open Networked Environment

72

Richard Sinnott and Sardar Hussain. Security-oriented Workflows for the Social Sciences

78

Fengyu Wang, Bin Gong, Shanqing Guo and Xiaofeng Wang. Monitoring Heavy-Hitter Flows in High-Speed Network Concurrently

80

Abdelberi Chaabane, Pere Manils and Mohamed Ali Kaafar. A Deep Analysis of the Tor Anonymizing Network

81

Suriadi Suriadi, Andrew Clark and Desmond Schmidt. Validating Denial of Service Vulnerabilities in Web Services

86

Juan E. Tapiador and John A. Clark. Information-Theoretic Detection of Masquerade Mimicry Attacks

89

Reginald Lal and Andrew Chiou. Computational Intelligence Utilisation in Simulation of Congestion Control in TCP/IP Edge Network

91

Yang Liu and Kai Han. Behavior-based Attack Detection and Reporting in Wireless Sensor Networks

104

Kobra Khanmohammadi and Siv Hilde Houmb. Business Process-based Information Security Risk Assessment

109

Wael Kanoun, Nora Cuppens-Boulahia, FrĄ§¦dĄ§¦ric Cuppens and Samuel Dubus. Risk-aware Framework for Activating and Deactivating Policy-based Response

121

Shan Juan Xie, Sook Yoon and Dong Sun Park. Fingerprint Reference Point Determination Based on Orientation Features

122

Anya Apavatjrut, Wassim Znaidi, Antoine Fraboulet, Claire Goursault, CĄ§¦dric Lauradoux and Marine Minier. Energy Friendly Integrity for Network Coding in Wireless Sensor Networks

125

Alessandro Artale, Bruno Crispo, Fausto Giunchiglia, Fatih Turkmen and Rui Zhang. Reasoning about Relation Based Access Control

127

Hua Wang and Li Sun. Trust-involved access control in collaborative open social networks

128

Sheng Wen and Wanlei Zhou. CALD: Surviving Various Application-Layer DDoS Attacks That Mimic Flash Crowd

Accepted short papers

Paper ID

Authors and Title

10

Islam Tharwat, Hossam Fahmy, Ayman M. Bahaa El-Din and Mohamed hassan El-Shafie. Agent-Based Trusted On-Demand Routing Protocol for Mobile Ad-hoc Networks

17

Celia Li, Zhuang Wang and Cungang Yang. Secure Routing for Wireless Mesh Networks

38

Sheila Becker, Humberto Abdelnur, Jorge Lucangeli Obes, Radu State and Olivier Festor. Improving Fuzz Testing using Game Theory

44

Rodrigo Roman, Javier Lopez, Cristina Alcaraz and Pablo Najera. Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?

47

Adonis P.H. Fung and K.W. Cheung. HTTPSLock: Enforcing HTTPS in Unmodified Browsers with Cached Javascript

49

Raihana Ferdous, Vallipuram Muthukkumarasamy and Abdul Sattar. A Node-based Trust Management Scheme for Mobile Ad-Hoc Networks

54

Lifang Zi, John Yearwood and Xinwen Wu. Adaptive Clustering with Feature Ranking for DDoS Attacks Detection

56

Ahmad Jabas, wael abdulal and Ramachandram Sirandas. An Efficient and High Scalable Key distribution Scheme for Mobile Ad Hoc Network through Mining Traffic Meta-data Patterns

57

Yinghua Guo and Ivan Lee. Forensic analysis of DoS attack traffic in MANET

58

Yingjie Zhou and Guangmin Hu. Graph Based Network-Wide Concealed Anomaly Detection

64

Robert Koch and Gabi Dreo. Command Evaluation in Encrypted Remote Sessions

67

Rong-Jian Chen, Yu-Cheng Peng, Jun-Jian Lin, Jui-Lin Lai and Shi-Jinn Horng. Novel Multi-bit Bitwise Adaptive Embedding Algorithms with Minimum Error for Data Hiding

71

Qussai Yaseen and Brajendra Panda. Organizing Access Privileges: Maximizing the Availability and Mitigating the Threat of Insiders¡¯ Knowledgebase

77

Mao Huang, Liangfu Lu, Mehmet Orgun and Jiawan Zhang. An Improved Wavelet Analysis Method for Detecting DDoS Attacks

79

Patryk Szewczyk and Craig Valli. Ignorant Experts: Computer and Network Security Support from Internet Service Providers

94

Ray Hunt and jill Slay. The Design of Real-time Adaptive Forensically Sound Secure Critical Infrastructure

97

Eun-Jun Yoon and kee-Young Yoo. A Three-Factor Authenticated Key Agreement Scheme for SIP on Elliptic Curves

98

Ron van Schyndel, Udaya Parampalli, Oscar Moreno and Andrew Tirkel. New Families of 2D & 3D Arrays for Sub-Image Watermarking

102

Manzur Murshed, Tishna Sabrina, Anindya Iqbal and Kh Mahmudul Alam. A Novel Anonymization Technique to Trade-off Location Privacy and Data Integrity in Participatory Sensing System

103

Shamsul Kamal Ahmad Khalid, Jacob Zimmermann, Diane Corney and Colin Fidge. Automatic Generation of Assertions to Detect Potential Security Vulnerabilities in C Programs That Use Union and Pointer Types

113

Thaneswaran Velauthapillai, Aaron Harwood and Shanika Karunasekera. Global Detection of Flooding-Based DDoS Attacks Using a Cooperative Overlay Network

117

Steven Simpson, Adam Lindsay and David Hutchison. Identifying Legitimate Clients under Distributed Denial-of-Service Attacks

123

Matthieu-P. Schapranow. A Dynamic Mutual RFID Authentication Model Preventing Unauthorized Third-Party Access

126

Ping Li, Wanlei Zhou and Yini Wang. Getting the Real-Time Precise Round-Trip Time for Stepping Stone Detection

129

Kamaruddin Mohamad, jemal abawajy and Mustafa Deris. DQT-Based Data Hiding Technique in Digital Images

The 4th International Conference on Network and System Security
Copyright © 2010 NSS 2010. All rights reserved. Contact: ieee.nss@gmail.com