TrustCOM 2014 Sept. 24, 2014 to Sept. 26, 2014, bejing,china

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote I :Modelling the Propagation of Worms and Rumours in Networks Wanlei Zhou N/A
Keynote II :Advanced Ad Hoc and Mesh Networks Technologies to Facilitate Specialized Disaster-resilient Networks Nei Kato N/A
Keynote III :Cloud Computing, Big Data and Scalable Privacy Preservation Junjin Chen N/A
TrustCom Session #1: Privacy in Mobile & Wireless Networks Fábio Borges N/A
A Clustering-Based Privacy-Preserving Method for Uncertain Trajectory Data Zhou-fu Cai , He-xing Yang , Wang Shuang , Xu Jian , Wang-ming Wei , Wu-li Na N/A
A Lightweight Anonymous Mobile Shopping Scheme Based on DAA for Trusted Mobile Platform Dengguo Feng , Bo Yang , Yu Qin N/A
Automated User Profiling in Location-Based Mobile Messaging Applications Dengguo Feng , Yao Cheng , Lingyun Ying , Purui Su , Chang Xu , Yi Yang N/A
PrivateDroid: Private Browsing Mode for Android Yuan Tian , Su Mon Kywe , Christopher Landis , Yutong Pei , Justin Satterfield , Patrick Tague N/A
TTPCookie: Flexible Third-Party Cookie Management for Increasing Online Privacy Ashar Javed , Christian Merz , Joerg Schwenk N/A
TrustCom Session #2: Privacy and Trust in Social Networks Ron Poet N/A
Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit Mu Yang , Yijun Yu , Arosha K. Bandara , Bashar Nuseibeh N/A
Garbling in Reverse Order Valtteri Niemi , Tommi Meskanen , Noora Nieminen N/A
Private Outsourcing of Polynomial Functions Peili Li , Haixia Xu , Jiaqi Hong N/A
A Machine Learning Based Trust Evaluation Framework for Online Social Networks Kang Zhao , Li Pan N/A
Multi-dimensions of Developer Trustworthiness Assessment in OSS Community Yu Bai , Gang Yin , Huaimin Wang N/A
TrustCom Paper Session #3: Security Algorithms Su Mon Kywe N/A
A Novel Feature Selection Approach for Intrusion Detection Data Classification Mohammed A. Ambusaidi , Xiangjian He , Zhiyuan Tan , Priyadarsi Nanda , Liang Fu Lu , Upasana T. Nagar N/A
An On-Line Anomaly Detection Method Based on a New Stationary Metric - Entropy-Ratio Ziyu Wang , Jiahai Yang , Fuliang Li N/A
Reaching Agreement in Security Policy Negotiation Nora Cuppens-boulahia , Frédéric Cuppens , Yanhuang Li , Jean-michel Crom , Vincent Frey N/A
Remembrance of Local Information Status for Enforcing Robustness of Policy-Exchanged Strategies for Trust Negotiation Yunxi Zhang , Darren Mundy N/A
Secure and Privacy-Friendly Public Key Generation and Certification Filipe Beato , Max Mühlhäuser , Fábio Borges , Leonardo A. Martucci N/A
TrustCom Paper Session #4: Security Applications Mu Yang N/A
A Stateful Mechanism for the Tree-Rule Firewall Xiangjian He , Zhiyuan Tan , Priyadarsi Nanda , Thawatchai Chomsiri N/A
CAFS: A Framework for Context-Aware Federated Services Ron Poet , Md. Sadek Ferdous N/A
Encrypted Keyword Search Mechanism Based on Bitmap Index for Personal Storage Services Yong Ho Hwang , Jae Woo Seo , Il Joo Kim N/A
High Performance FPGA Implementation of Elliptic Curve Cryptography over Binary Fields Shuai Liu , Lei Ju , Xiaojun Cai , Zhiping Jia , Zhiyong Zhang N/A
A High-Performance Distributed Certificate Revocation Scheme for Mobile Ad Hoc Networks Lei Ju , Zhiping Jia , Chongxian Guo , Huaqiang Xu , Jihai Xu N/A
TrustCom Paper Session #5: Security Systems Weixi Gu N/A
SIMS: A Comprehensive Approach for a Secure Instant Messaging Sifter Günter Fahrnberger N/A
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning Wenjuan Li , Yang Xiang , Zhiyuan Tan , Weizhi Meng N/A
Ultra High-Speed SM2 ASIC Implementation Zhenwei Zhao , Guoqiang Bai N/A
Visual Similarity Based Anti-phishing with the Combination of Local and Global Features Yipeng Wang , Yongzheng Zhang , Yu Zhou , Jun Xiao , Weiyao Lin N/A
A Practically Optimized Implementation of Attribute Based Cryptosystems Chunqiang Hu , Fan Zhang , Tao Xiang , Hongjuan Li , Xiao Xiao , Guilin Huang N/A
TrustCom Paper Session #6: Authentication Zhiquan Lv N/A
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment Xiangjian He , Zhiyuan Tan , Priyadarsi Nanda , Mian Ahmad Jan , Ren Ping Liu N/A
Bargaining-Based Dynamic Decision for Cooperative Authentication in MANETs Liu Licai , Yin Lihua , Guo Yunchuan , Fang Bingxing N/A
Multiplicative Attributes Graph Approach for Persistent Authentication in Single-Sign-On Mobile Systems Uthpala Subodhani Premarathne , Ibrahim Khalil N/A
ToAuth: Towards Automatic Near Field Authentication for Smartphones Zheng Yang , Weixi Gu , Longfei Shangguan , Xiaoyu Ji , Yiyang Zhao N/A
One Kind of Cross-Domain DAA Scheme from Bilinear Mapping Xiaoming Wang , Heyou Cheng , Ruihua Zhang N/A
TrustCom Paper Session #7: Attack & Defense Yu Zhou N/A
Long Term Tracking and Characterization of P2P Botnet Dengguo Feng , Lingyun Ying , Purui Su , Yi Yang , Jia Yan N/A
A Survey of Security Network Coding toward Various Attacks Shixiong Yao , Jing Chen , Ruiying Du , Lan Deng , Chiheng Wang N/A
Defensor: Lightweight and Efficient Security-Enhanced Framework for Android Yibing Zhongyang , Zhi Xin , Bing Mao , Xuerui Pan , Hao Huang N/A
Public-Key Encryption Resilient against Linear Related-Key Attacks Revisited Man ho Au , Hui Cui , Yi Mu N/A
The Micro-architectural Support Countermeasures against the Branch Prediction Analysis Attack Ya Tan , Jizeng Wei , Wei Guo N/A
TrustCom Paper Session #8: Security and Trust in Cloud Computing (1) Liu Licai N/A
AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security Neeraj Suri , Ahmed Taha , Ruben Trapero , Jesus Luna N/A
Efficiently Attribute-Based Access Control for Mobile Cloud Storage System Dengguo Feng , Zhiquan Lv , Jialin Chi , Min Zhang N/A
EqualVisor: Providing Memory Protection in an Untrusted Commodity Hypervisor Liang Deng , Qingkai Zeng , Weiguang Wang , Yao Liu N/A
FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing Yang Xiang , Jing Chen , Ruiying Du , Lan Deng , Yu Zhang , Qing Zhou N/A
ONHelp: Components in Building Secure Cloud Based on OpenNebula Kao Zhao , Hai Jin , Deqing Zou , Weiqi Dai N/A
TrustCom Paper Session #9: Security and Trust in Cloud Computing (2) Muttukrishnan Rajarajan N/A
Proofs of Ownership and Retrievability in Cloud Storage Jing Chen , Ruiying Du , Lan Deng , Kun He , Minghui Zheng N/A
Temporal Access Control with User Revocation for Cloud Data Nihal Balani , Sushmita Ruj N/A
Trusted Geolocation-Aware Data Placement in Infrastructure Clouds Nicolae Paladi , Mudassar Aslam , Christian Gehrman N/A
Cognitive Adaptive Access-Control System for a Secure Locator/Identifier Separation Context Yuanlong Cao , Jianfeng Guan , Changqiao Xu , Wei Quan , Hongke Zhang N/A
Trust Enhanced Cloud Security for Healthcare Services Udaya Tupakula , Vijay Varadharajan N/A
TrustCom Paper Session #10: Security in Mobile Networks Meng Li N/A
AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps Julian Schütte , Dennis Titze , J.m. De Fuentes N/A
Attack Tree Based Android Malware Detection with Hybrid Analysis Lei Zhang , Shuai Zhao , Xiaohong Li , Guangquan Xu , Zhiyong Feng N/A
Automatically Exploiting Potential Component Leaks in Android Applications Alexandre Bartel , Jacques Klein , Yves Le Traon , Li Erran Li N/A
Data-centric Rogue Node Detection in VANETs Muttukrishnan Rajarajan , Kamran Zaidi , Milos Milojevic , Veselin Rakocevic N/A
Detect Android Malware Variants Using Component Based Topology Graph Yibing Zhongyang , Zhi Xin , Bing Mao , Hao Huang , Tong Shen N/A
TrustCom Paper Session #11: Network Security Shuai Zhao N/A
Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation Vijay Laxmi , Muttukrishnan Rajarajan , Mauro Conti , Parvez Faruki , Ammar Bharmal , M.s. Gaur N/A
Secure Mobile Payment on NFC-Enabled Mobile Phones Formally AnalysedUsing CasperFDR Keith Mayes , Sarah Abughazalah , Kostantinos Markantonakis N/A
Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones Yang Zhang , Zhihui Han , Liang Cheng , Shuke Zeng , Yi Deng , Xiaoshan Sun N/A
TrustCom Paper Session #12: Parallel and Distributed Trust Applications Li Erran Li N/A
Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager Konstantinos Markantonakis , Raja Naeem Akram , Damien Sauveron N/A
Design and Analysis of a New Feature-Distributed Malware Vijay Varadharajan , Byungho Min N/A
On Energy Efficient Scheduling and Load Distribution Based on Renewable Energy for Wireless Mesh Network in Disaster Area Meng Li , Hiroki Nishiyama , Yasunori Owada , Kiyoshi Hamaguchi N/A
Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs Hui Xia , Jia Yu , Zhi-yong Zhang , Xiang-guo Cheng , Zhen-kuan Pan N/A
BIBRM: A Bayesian Inference Based Road Message Trust Model in Vehicular Ad Hoc Networks Yue Wu , Guanghao Wang N/A
TrustCom Paper Session #13: Trust Modeling and Algorithms Gu Weixi N/A
Convergence of True Cooperations in Bayesian Reputation Game Jooyoung Lee , Jae C. Oh N/A
Practical Assessment of Biba Integrity for TCG-Enabled Platforms Antonio Lioy , Roberto Sassu , Gianluca Ramunno N/A
SigmoRep: A Robust Reputation Model for Open Collaborative Environments Ahmad A. Kardan , Reza Salarmehr , Azade Farshad N/A
Towards Robust and Effective Trust Management for Security: A Survey Tim Muller , Yang Liu , Dongxia Wang , Jie Zhang N/A
Trust Mechanism for Enforcing Compliance to Secondary Data Use Contracts Julita Vassileva Vassileva , Zeinab Noorian , Johnson Iyilade , Mohsen Mohkami N/A
TrustCom Paper Session #14: Trust Applications and Systems Jooyoung Lee N/A
An Effective Path Load Balancing Mechanism Based on SDN Jun Li , Xiangqing Chang , Yongmao Ren , Zexin Zhang , Guodong Wang N/A
Integrity Levels: A New Paradigm for Protecting Computing Systems Christipher Jenkins , Lyndon Pierson N/A
Integrity Verification and Secure Loading of Remote Binaries for Microkernel-Based Runtime Environments Michael Weiß , Sascha Wessel , Steffen Wagner , Roland Hellman N/A
Overhead-Free In-Place Recovery Scheme for XOR-Based Storage Codes Ximing Fu , Zhiqing Xiao , Shenghao Yang N/A
Untrusted User Detection in Microblogs Zidan Yu , Huiqun Yu N/A
TrustCom Paper Session #15: Identity Management Systems and Mechanism Roberto Sassu N/A
A Privacy-Enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures Goichiro Hanaoka , Keita Emura , Eiji Okamoto , Takashi Nishide , Yusuke Sakai , Sanami Nakagawa , Akihisa Kodate N/A
Anonymous Proxy Signature with Restricted Traceability Yi Mu , Jiannan Wei , Guomin Yang N/A
Efficient Traceable Attribute-Based Signature Shenglong Ding , Yiming Zhao , Yuyang Liu N/A
Computation Integrity Measurement Based on Branch Transfer Jianming Fu , Yan Lin , Xu Zhang , Pengwei Li N/A
Emergency Key Rollover in DNSSEC Zheng Wang , Liyuan Xiao N/A
BDSE Session #1: Social Networking with Big Data Chenhui Li N/A
Crowd Sensing of Urban Emergency Events Based on Social Media Big Data Hui Zhang , Zheng Xu , Yunhuai Liu , Lin Mei N/A
SocAware: A Middleware for Social Applications in Online Social Networks Liang Chen , Chengcheng Shao , Kan Chen , Peidong Zhu N/A
Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed Domain Conghuan Ye , Zenggang Xiong , Yaoming Ding , Jiping Li , Guangwei Wang , Xuemin Zhang , Kaibing Zhang N/A
A Proposal for a Reference Architecture for Long-Term Archiving, Preservation, and Retrieval of Big Data Phillip Viana , Liria Sato N/A
Big Data Analyses for Collective Opinion Elicitation in Social Networks Yingxu Wang , Victor J. Wiebe N/A
BDSE Session #2: Big Data Processing Yingxu Wang N/A
Performance Evaluation of the SSD-Based Swap System for Big Data Processing Jaehun Lee , Sungmin Park , Minsoo Ryu , Sooyong Kang N/A
A Study on Recursive Neural Network Based Sentiment Classification of Sina Weibo Chen Fu , Bai Xue , Zhan Shaobin N/A
VALID: A Web Framework for Visual Analytics of Large Streaming Data Chenhui Li , George Baciu N/A
A High Speed Lossless Compression Algorithm Based on CPU and GPU Hybrid Platform Hai Jin , Bin Zhou , Ran Zheng N/A
Picky Partial Least Squares for Feature Selection from Alzheimer's Data Torbjorn Wasterlid , Li Bai N/A
BDSE Session #3: Big Data Application Jisheng Pei N/A
Improved 2DLDA Algorithm and Its Application in Face Recognition Dong Wang , Shunfang Wang N/A
The Evaluation of Emulab as an Environment for Bio-Informatics Research Kyungwoo Kang , Yunhee Kang , Sungjin Sul N/A
A Evaluation Method for Web Service with Large Numbers of Historical Records Hua Wang , Lianyong Qi , Jiancheng Ni , Xiaona Xia , Chao Yan , Wanli Huang N/A
BIG DATA: Preconditions to Productivity Steve Hallman , Jasur Rakhimov , Michel Plaisent , Prosper Bernard N/A
Data Mining Application of Decision Trees for Student Profiling at the Open University of China Wilton W.t. Fok , Haohua Chen , Jiaqu Yi , Sizhe Li , H.h. Au Yeung , Wang Ying , Liu Fang N/A
BDSE Session #4: Big Data & Optimization Xinlin Zhang N/A
Towards Policy Retrieval for Provenance Based Access Control Model Jisheng Pei , Xiaojun Ye N/A
SARAH - Statistical Analysis for Resource Allocation in Hadoop Bruce Martin N/A
Privacy Aware Non-linear Support Vector Machine for Multi-source Big Data Yunmei Lu , Piyaphol Phoungphol , Yanqing Zhang N/A
Modeling of Data Provenance on Space and Time Based on OPM Kang Jiehua , Xu Guoyan N/A
Threshold-Based Secure and Privacy-Preserving Message Verification in VANETs Wei Gao , Mingzhong Wang , Liehuang Zhu , Xiaoping Zhang N/A
BDSE Session #5: MapReduce for Big Data Parinaz Ameri N/A
Aeromancer: A Workflow Manager for Large-Scale MapReduce-Based Scientific Workflows Jing Zhang , Nabeel Mohamed , Nabanita Maji , Nataliya Timoshevskaya , Wu-chun Feng N/A
MapReduce for Large-Scale Monitor Data Analyses Li Zhang , Jianwei Ding , Yingbo Liu , Jianmin Wang N/A
FedLoop: Looping on Federated MapReduce Chun-yu Wang , Tzu-li Tai , Kuan-chieh Huang , Tse-en Liu , Jyh-biau Chang , Ce-kuen Shieh N/A
In-Map/In-Reduce: Concurrent Job Execution in MapReduce Muhammad Idris , Shujaat Hussain , Sungyoung Lee N/A
BDSE Session #6: Big Data Storage Tzu-li Tai N/A
An Improved Image File Storage Method Using Data Deduplication Zhou Lei , Zhaoxin Li , Yu Lei , Yanling Bi , Luokai Hu , Wenfeng Shen N/A
HBaseSpatial: A Scalable Spatial Data Storage Based on HBase Ningyu Zhang , Guozhou Zheng , Huajun Chen , Jiaoyan Chen , Xi Chen N/A
On the Application and Performance of MongoDB for Climate Satellite Data Parinaz Ameri , Udo Grabowski , Jörg Meyer , Achim Streit N/A
Research of Provenance Storage in Cloud Computing Environment Zhangxuan Luo , Guoyan Xu N/A
Data Interface All-iN-A-Place (DIANA) for Big Data Theo Dimitrakos , Frank Zhigang Wang , Na Helian , Sining Wu , Yuhui Deng , Ling Li , Rodric Yates N/A
A Load Balancing Strategy of SDN Controller Based on Distributed Decision Yuanhao Zhou , Mingfa Zhu , Limin Xiao , Li Ruan , Wenbo Duan , Deguo Li , Rui Liu , Mingming Zhu N/A
Modeling Degrees of Fairness for Collaborations Florian Volk , Sascha Hauke , Max Mühlhäuser , Maria Pelevina , Sheikh Mahbub Habib N/A
Performance Analysis on M2M Communication Network Based on Stochastic Network Calculus Zhou Tao , Wang Quan , Wang Gao-cai N/A
Mining Specification of Insecure Browser Extension Behavior Xiaohong Li , Guangquan Xu , Zhiyong Feng , Hongbin Pei N/A
A Novel Public Key Encryption Scheme for Large Image Lingjiao Chen , Xinji Chen , Zhigang Peng N/A
Analysis of the Count-Min Sketch Based Anomaly Detection Scheme in WSN Guorui Li , Ying Liu , Ying Wang N/A
Attacks on Physically-Embedded Data Encryption for Embedded Devices Guoqiang Bai , Chaohui Du N/A
Challenge Set Designs and User Guidelines for Usable and Secured Recognition-Based Graphical Passwords Ron Poet , Hani Moaiteq Aljahdali N/A
Escrow: A Large-Scale Web Vulnerability Assessment Tool Baden Delamore , Ryan K.l. Ko N/A
Personal Data Access Based on Trust Assessment in Mobile Social Networking Zheng Yan , Raimo Kantola , Xueyun Li N/A
Synthesising End-to-End Security Protocols Charles Thevathayan , Peter Bertok , George Fernandez N/A
A Compact Hardware Implementation of SM3 Hash Function Tianyong Ao , Zhangqing He , Jinli Rao , Kui Dai , Xuecheng Zou N/A
Detection of Android Malicious Apps Based on the Sensitive Behaviors Peng Wang , Fan Yang , Daiyong Quan , Lidong Zhai N/A
Digital Trust - Trusted Computing and Beyond: A Position Paper Raja Naeem Akram , Ryan K.l. Ko N/A
Identifying P2P Network Activities on Encrypted Traffic Xiaolei Wang , Jie He , Yuexiang Yang N/A
Lightweight Security Middleware to Detect Malicious Content in NFC Tags or Smart Posters Sufian Hameed , Bilal Hameed , Syed Atyab Hussain , Waqas Khalid N/A
Survey of Integrity Detection Methods in Internet of Things Chaoliang Li , Qin Li , Guojun Wang N/A
TEEI - A Mobile Security Infrastructure for TEE Integration Hongfeng Chai , Zhijun Lu , Qingyang Meng , Jun Wang , Xiubang Zhang , Zhijian Zhang N/A
A Semantic Knowledge Base Construction Method for Information Security Yuangang Yao , Xiaoyu Ma , Hui Liu , Jin Yi , Xianghui Zhao , Lin Liu N/A
Adding Privacy to Multicast DNS Service Discovery Daniel Kaiser , Marcel Waldvogel N/A
Encrypted Program Execution Dmytro Zhuravlev , Ihor Samoilovych , Roman Orlovskyi , Ievgen Bondarenko , Yaroslav Lavrenyuk N/A
Network Traffic Anomaly Detection Using Adaptive Density-Based Fuzzy Clustering Duo Liu , Chung-horng Lung , Nabil Seddigh , Biswajit Nandy N/A
Unified Model for Data Security - A Position Paper Raja Naeem Akram , Ryan K.l. Ko N/A
A Secure Authentication Protocol for IP-Based Wireless Sensor Communications Using the Location/ID Split Protocol (LISP) Ali Raheem , Aboubaker Lasebae , Jonathan Loo N/A
Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud Quang Do , Ben Martini , Kim-kwang Raymond Choo N/A
Continuous Certification of Non-repudiation in Cloud Storage Services Maria Krotsiani , George Spanoudakis N/A
JVM-Based Dynamic Attestation in Cloud Computing Zhiying Wang , Haihe Ba , Jiangchun Ren , Huaizhe Zhou N/A
Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept Ben Martini , Kim-kwang Raymond Choo N/A