A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
A distributed key assignment protocol for secure multicast based on proxy cryptography
2006
Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06
However, this raises the problem of "one affects all," whereby the actions of one member affect the whole group. ...
A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually one "group key" is shared by all approved members. ...
ASIACCS '06, March 21-24, 2006, Taipei, Taiwan Copyright 2006 ACM 1-59593-272-0/06/0003 ...$5.00. ...
doi:10.1145/1128817.1128875
dblp:conf/ccs/HuangCCL06
fatcat:cnjfnxoncrgypfcyqku6dhgjca
A general design towards secure ad-hoc collaboration
2006
Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06
However, this raises the problem of "one affects all," whereby the actions of one member affect the whole group. ...
A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually one "group key" is shared by all approved members. ...
ASIACCS '06, March 21-24, 2006, Taipei, Taiwan Copyright 2006 ACM 1-59593-272-0/06/0003 ...$5.00. ...
doi:10.1145/1128817.1128874
dblp:conf/ccs/NakaeZS06
fatcat:rbrxdc6nnjaz7kgrhdqftfncmu
A refined look at Bernstein's AES side-channel analysis
2006
Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06
It shows the correlation between the attack phase and the profiling phase for one fixed byte. ...
From this analysis we also derive a general limit on the number of derivable key bits through his technique which depends on the architecture of the underlying CPU. 2) We show the results of several important ...
To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ASIACCS '06, March 21-24, 2006, Taipei, Taiwan. ...
doi:10.1145/1128817.1128887
dblp:conf/ccs/NeveSW06
fatcat:auerxq25k5cybnjywxcwkav4za
Can machine learning be secure?
2006
Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06
important to security for machine learning, an analytical model giving a lower bound on attacker's work function, and a list of open problems. ...
Novel contributions of this paper include a taxonomy of different types of attacks on machine learning techniques and systems, a variety of defenses against those attacks, a discussion of ideas that are ...
ASIACCS'06, March 21-24, 2006 , Taipei, Taiwan Copyright 2006 ACM 1-59593-272-0/06/0003 ...$5.00 attack (known bad) traffic. ...
doi:10.1145/1128817.1128824
dblp:conf/ccs/BarrenoNSJT06
fatcat:s6y6wpq2e5bfnjw4bh73coppvm
A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
2021
Applied Sciences
Security experts in SOCs and researchers in academia can obtain useful information from our survey, as the main focus of our survey is NTA methods applicable to malware detection and family classification ...
Recently, a majority of security operations centers (SOCs) have been facing a critical issue of increased adoption of transport layer security (TLS) encryption on the Internet, in network traffic analysis ...
In Proceedings of the 15th
ACM Asia Conference on Computer and Communications Security (ACM ASIACCS), ASIA CCS ’20, Taipei, Taiwan, 5–9 October
2020; Association for Computing Machinery: New ...
doi:10.3390/app12010155
fatcat:kdkvmdkbareb7cxgy7er7ncday
An attack-localizing watermarking scheme for natural language documents
2006
Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06
The embedding and extracting algorithms are public, while the secrecy and security of the watermark depends on a secret key K. ...
Majority voting provides security against text addition, deletion, and swapping attacks, further reducing the probability of False Positives. ...
ACKNOWLEDGEMENTS We would like to thank Vijayakrishnan Pasupathinathan, Robert Dale, Krystian Matusiewicz and Christophe Tartary for their valuable contributions towards this research. ...
doi:10.1145/1128817.1128842
dblp:conf/ccs/GuptaPW06
fatcat:c6zqib7luze6dmi6dc5mnaowtu
Decentralized Deep Learning for Multi-Access Edge Computing: A Survey on Communication Efficiency and Trustworthiness
[article]
2021
arXiv
pre-print
Furthermore, we offer a comprehensive overview of the current state-of-the-art in the field by outlining the challenges of DDL and the most relevant solutions from novel perspectives of communication efficiency ...
Wider coverage and a better solution to a latency reduction in 5G necessitate its combination with multi-access edge computing (MEC) technology. ...
ACM, 2020, pp. ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006. ACM, 2006, pp.
113–131. [Online]. Available: https://doi.org/10.1145/3372297.3423362 16–25. [Online]. ...
arXiv:2108.03980v4
fatcat:3chrjozkxrdzljthkjzlagg6uy
Fortifying password authentication in integrated healthcare delivery systems
2006
Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06
However, existing password systems (under either the single-server model or the multi-server model) do not provide adequate security when applied to IDSs. ...
We generalize the two-server model to an architecture of a single control server supporting multiple service servers, tailored to the organizational structure of IDSs. ...
ASIACCS'06, March 21-24, 2006 (such as hospitals and primary care clinics) that serve different aspects of the care continuum. ...
doi:10.1145/1128817.1128855
dblp:conf/ccs/YangDB06
fatcat:76hdzdhkj5bnfcefloqmvsz6ja
Supporting location-based conditions in access control policies
2006
Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06
Based on these parameters, we present the formal definition of a number of location-based predicates, their management, evaluation, and enforcement. ...
Our LBAC model includes a novel way of taking into account the limitations of the technology used to ascertain the location of the requester. ...
The definitive version was published in Proceedings of the 2006 ACM Symposium on Information, computer and communications security, Taipei, Taiwan,March 21-24, 2006, http://doi.acm.org/10.1145/1128817.1128850 ...
doi:10.1145/1128817.1128850
dblp:conf/ccs/ArdagnaCDVS06
fatcat:75s3aeimcra7tkkwy73psvdtdq
An efficient key establishment scheme for secure aggregating sensor networks
2006
Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06
This results in unnecessary expensive communication and memory consumption, growing linearly with the size of the network, and guarantees secure connections only with a certain probability. ...
This work presents a novel approach for efficient and secure key establishment of nodes joining the network by utilizing the fact that communication in sensor networks follows a paradigm called aggregation ...
ASIACCS'06 March 21-24, 2006, Taipei, Taiwan Copyright 2006 ACM 1-59593-272-0/06/0003 ...$5.00. ...
doi:10.1145/1128817.1128863
dblp:conf/ccs/BlassZ06
fatcat:sk6vpm3ttzhbhoxotgq4wjwzgm
Application security support in the operating system kernel
2006
Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06
The mechanisms are oriented towards providing authorization properties, and this goal drives the design of permissions and protection mechanisms. ...
This reduces the need for users and applications to be aware of protection mechanism, since the protection mechanism provides the user with more freedom in how they do things. ...
ACKNOWLEDGEMENTS The authors would like to thank Damian Roqueiro for his careful reading of an earlier draft of this paper as well as Ashley Poole, Prof. V. N. ...
doi:10.1145/1128817.1128848
dblp:conf/ccs/RadhakrishnanS06
fatcat:uhprbihbi5estogqobzijhz3fa
Dynamic rule-ordering optimization for high-speed firewall filtering
2006
Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06
Packet filtering plays a critical role in many of the current high speed network technologies such as firewalls and IPSec devices. ...
The optimization of firewall policies is critically important to provide high performance packet filtering particularly for high speed network security. ...
To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ASIACCS'06, March 21-24, 2006 , Taipei, Taiwan. ...
doi:10.1145/1128817.1128867
dblp:conf/ccs/HamedA06
fatcat:dfuxt4uzgzagtb2oazicfmcfkm
Safety analysis of usage control authorization models
2006
Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06
In UCONA, an access control decision is based on the subject and/or the object attributes, which can be changed as the side-effects of using the access right, resulting in possible changes to future access ...
While the policy specification flexibility and expressive power of this model have been studied in previous work, as a related and fundamental problem, the safety analysis of UCON has not been explored ...
This completes our undecidability proof. 2 ASIACCS '06 March 21-24, 2006, Taipei, Taiwan. Copyright 2006 ACM 1-59593-272-0/06/0003 ...$5.00. ...
doi:10.1145/1128817.1128853
dblp:conf/ccs/ZhangSP06
fatcat:dfbp24awozae7cpjtxexciw25a