Cover Art (PDF)
Title Page i (PDF)
Title Page iii (PDF)
Copyright Page (PDF)
Table of Contents (PDF)
TrustCom 2013: Message from the General Chairs (PDF)
TrustCom 2013: Message from the Program Chairs (PDF)
TrustCom 2013: Message from the Steering Chairs (PDF)
TrustCom 2013: Message from the Workshop/Symposium Chairs (PDF)
TrustCom 2013: Organizing and Program Committees (PDF)
ISPA 2013: Message from the General Chairs (PDF)
ISPA 2013: Message from the Program Chairs (PDF)
ISPA 2013: Organizing and Program Committees (PDF)
IUCC 2013: Message from the General Chairs (PDF)
IUCC 2013: Message from the Program Chairs (PDF)
IUCC 2013: Organizing and Program Committees (PDF)
TrustID 2013: Message from the Symposium Chairs (PDF)
TrustID 2013: Organizing and Program Committees (PDF)
TSCloud 2013: Message from the Chairs (PDF)
TSCloud 2013: Organizing and Program Committees (PDF)
WNM 2013: Message from the Workshop Chairs (PDF)
WNM 2013: Organizing and Program Committees (PDF)
A Privacy-Leakage-Tolerance Based Noise Enhancing Strategy for Privacy Protection in Cloud Computing (Abstract)
A Fuzzy Modeling Approach for Risk-Based Access Control in eHealth Cloud (Abstract)
KP-ABE Based Verifiable Cloud Access Control Scheme (Abstract)
Light-Weight Trust-Based On-Demand Multipath Routing Protocol for Mobile Ad Hoc Networks (Abstract)
Garbled Routing (GR): Towards Unification of Anonymous Networks (Abstract)
Secure Routing Based on Network Coding in Wireless Sensor Networks (Abstract)
AFC: An Effective Metric for Reliable Routing in Wireless Mesh Networks (Abstract)
Performance Evaluation of Trust-Based Collaborative Sanctioning in MANETs (Abstract)
Novel Physically-Embedded Data Encryption for Embedded Device (Abstract)
Server Assisted Key Establishment for WSN: A MIKEY-Ticket Approach (Abstract)
A Fully-Secure RFID Authentication Protocol from Exact LPN Assumption (Abstract)
Determining Similar Recommenders Using Improved Collaborative Filtering in MANETs (Abstract)
Privacy-Preserving Wireless Medical Sensor Network (Abstract)
A Threat to Mobile Cyber-Physical Systems: Sensor-Based Privacy Theft Attacks on Android Smartphones (Abstract)
Protocol Formats Reverse Engineering Based on Association Rules in Wireless Environment (Abstract)
Power Based Malicious Code Detection Techniques for Smartphones (Abstract)
A Privacy-Preserved Joint Group Time Scheduling Mechanism for Mobile Social Applications (Abstract)
ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain (Abstract)
Securing Domain Name System Combined with MIPv6 for Mobile Hosts (Abstract)
Securing Mobile Mashups with SCCM (Abstract)
Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks (Abstract)
Modeling Malware Propagation in Smartphone Social Networks (Abstract)
Unwanted Content Control via Trust Management in Pervasive Social Networking (Abstract)
Trust Inference Computation for Online Social Networks (Abstract)
Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web (Abstract)
Preserving Utility in Social Network Graph Anonymization (Abstract)
DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics (Abstract)
Rational Secret Sharing Information -- Theoretically Secure against Adaptive Adversaries (Abstract)
What is the Pattern of a Botnet? (Abstract)
Analyzing Malware by Abstracting the Frequent Itemsets in API Call Sequences (Abstract)
Visual Analytics Model for Intrusion Detection in Flood Attack (Abstract)
A Regional Statistics Detection Scheme against Sybil Attacks in WSNs (Abstract)
A Framework for Improving the Accuracy of Unsupervised Intrusion Detection for SCADA Systems (Abstract)
Security Aspects of Military Sensor-Based Defence Systems (Abstract)
A Secure and Efficient Fault-Tolerant Group Key Agreement Protocol (Abstract)
MDS-Based Trust Estimation of Event Reporting Node in VANET (Abstract)
sEncrypt: An Encryption Algorithm Inspired from Biological Processes (Abstract)
A Scalable Architecture for Highly Reliable Certification (Abstract)
A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model (Abstract)
A Model for Context-Aware Location Identity Preservation Using Differential Privacy (Abstract)
P3MCF: Practical Privacy-Preserving Multi-domain Collaborative Filtering (Abstract)
Improving the Utility of Differentially Private Data Releases via k-Anonymity (Abstract)
Scheme of User Privacy Protection Applied to Online Marketing (Abstract)
An Effective Deferentially Private Data Releasing Algorithm for Decision Tree (Abstract)
An Application Security Framework for Near Field Communication (Abstract)
Scalable Attack Representation Model Using Logic Reduction Techniques (Abstract)
Formalizing and Modeling Fairness for Benefit Distribution in Collaborations (Abstract)
Attribute-Based Mining Process for the Organization-Based Access Control Model (Abstract)
Private Multiparty Set Intersection Protocol in Rational Model (Abstract)
Privacy-Enhanced Keyword Search in Clouds (Abstract)
iPEKS: Fast and Secure Cloud Data Retrieval from the Public-Key Encryption with Keyword Search (Abstract)
A Trust-Aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces (Abstract)
Reputation Attacks Detection for Effective Trust Assessment among Cloud Services (Abstract)
Access Control Management for Cloud (Abstract)
Cloud Computing: Insider Attacks on Virtual Machines during Migration (Abstract)
A Framework for Authentication and Authorization Credentials in Cloud Computing (Abstract)
On the Application of Supervised Machine Learning to Trustworthiness Assessment (Abstract)
Building Confidence in Information-Trustworthiness Metrics for Decision Support (Abstract)
Efficient Fair UC-Secure Two-Party Computation on Committed Inputs (Abstract)
Trust Enhanced Security Architecture for Detecting Insider Threats (Abstract)
An Online Query Authentication System for Outsourced Databases (Abstract)
Word N-Gram Based Classification for Data Leakage Prevention (Abstract)
Privacy Protected Data Forwarding in Human Associated Delay Tolerant Networks (Abstract)
S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance (Abstract)
A Direct Insight into Victims of Cybercrime (Abstract)
Card-Present Transactions on the Internet Using the Smart Card Web Server (Abstract)
Secure Single Sign-On Schemes Constructed from Nominative Signatures (Abstract)
Profiling Phishing Email Based on Clustering Approach (Abstract)
Developing an Empirical Algorithm for Protecting Text-Based CAPTCHAs against Segmentation Attacks (Abstract)
Distributed Group Key Management Using Multilinear Forms for Multi-privileged Group Communications (Abstract)
Research on the Anti-attack Design Principles of Low-Latency Anonymous Communication (Abstract)
Development and Analysis of Generic VoIP Attack Sequences Based on Analysis of Real Attack Traffic (Abstract)
Security Analysis of a Paillier-Based Threshold Proxy Signature Scheme (Abstract)
A Novel Evidential Evaluation for Internal Attacks with Dempster-Shafer Theory in WSN (Abstract)
Verifiable and Anonymous Encryption in Asymmetric Bilinear Maps (Abstract)
From Mini House Game to Hobby-Driven Behavioral Biometrics-Based Password (Abstract)
Towards Automation of Privacy and Security Risks Analysis in Identity Management Systems (Abstract)
Identity-Based Mediated RSA Revisited (Abstract)
Portable Personal Identity Provider in Mobile Phones (Abstract)
Multi-factor Authentication in Key Management Systems (Abstract)
A Semantic Policy Framework for Context-Aware Access Control Applications (Abstract)
Feature Based Video Watermarking Resistant to Geometric Distortions (Abstract)
Exploring the Guessability of Image Passwords Using Verbal Descriptions (Abstract)
Public Verification of Outsourced Computation of Polynomial Functions (Abstract)
Mitigating Malicious Updates: Prevention of Insider Threat to Databases (Abstract)
De-anonymization Attack on Geolocated Data (Abstract)
Verifiable and Privacy Preserving Electronic Voting with Untrusted Machines (Abstract)
Role Mining Using Boolean Matrix Decomposition with Hierarchy (Abstract)
A Secure Social-Aware Incentive Scheme for Delay Tolerant Networks (Abstract)
A Place-Aware Stereotypical Trust Supporting Scheme (Abstract)
An Endorsement Trust Model (Abstract)
Local Monitoring and Maintenance for Operational Wireless Sensor Networks (Abstract)
A Probabilistic Model for Estimating the Power Consumption of Processors and Network Interface Cards (Abstract)
Automatic Locality Exploitation in the Codelet Model (Abstract)
GPU Acceleration of Interior Point Methods in Large Scale SVM Training (Abstract)
An Analysis of Driver Domain Offload for Paravirtualized Communication (Abstract)
Energy-Performance Modeling and Optimization of Parallel Computing in On-Chip Networks (Abstract)
SciHive: Array-Based Query Processing with HiveQL (Abstract)
Static or Dynamic: Trade-Offs for Task Dependency Analysis for Heterogeneous MPSoC (Abstract)
CFIO: A Fast I/O Library for Climate Models (Abstract)
Automatic Loop-Based Pipeline Optimization on Reconfigurable Platform (Abstract)
Register Allocation by Incremental Graph Colouring for Clustered VLIW Processors (Abstract)
TxSnoop: Power-Aware Transactional Snoop (Abstract)
Regional Consistency: Programmability and Performance for Non-cache-coherent Systems (Abstract)
A Comparative Study of Job Scheduling Strategies in Large-Scale Parallel Computational Systems (Abstract)
Bicriteria Load Balancing for Online Placement in Heterogeneous Servers with Pareto Upper Bounds (Abstract)
Collaborative Parallel Local Search for Simplified Protein Structure Prediction (Abstract)
On Change Detection of XML Schemas (Abstract)
Deadlock-Free Fully Adaptive Routing in Irregular Networks without Virtual Channels (Abstract)
Quantitative Analysis of Inter-block Dependence in Speculative Execution (Abstract)
Heterogeneous Multiconstraint Application Partitioner (HMAP) (Abstract)
KVM-Loongson: An Efficient Hypervisor on MIPS (Abstract)
The Buffered Edge Reconfigurable Cell Array and Its Applications (Abstract)
MapReduce: Limitations, Optimizations and Open Issues (Abstract)
Scenario-Based Execution Method for Massively Parallel Accelerators (Abstract)
An Iterative Optimization Framework for Adaptive Workflow Management in Computational Clouds (Abstract)
DataSteward: Using Dedicated Compute Nodes for Scalable Data Management on Public Clouds (Abstract)
A Data Prefetching Model for Desktop Grids and the Condor Use Case (Abstract)
Scalable Multi Swarm-Based Algorithms with Lagrangian Relaxation for Constrained Problems (Abstract)
Real-Time Effective Framework for Unstructured Data Mining (Abstract)
Performance Implications of Task Scheduling by Predicting Network Throughput on the Internet (Abstract)
H-PFSP: Efficient Hybrid Parallel PFSP Protected Scheduling for MapReduce System (Abstract)
Low-Cost Load Balancing for Parallel Particle-in-Cell Simulations with Thick Overlapping Layers (Abstract)
An Optimal Algorithm for Extreme Scale Job Launching (Abstract)
Power Management Support to Optimal Duty-Cycling in Stateful Multitasking WSN (Abstract)
An Efficient Task Partitioning and Scheduling Method for Symmetric Multiple GPU Architecture (Abstract)
Performance Optimization of Aho-Corasick Algorithm on a GPU (Abstract)
Tuning SPMD Applications in Order to Increase Performability (Abstract)
A Parallel Runtime Framework for Communication Intensive Stream Applications (Abstract)
A Path-Adaptive Opto-electronic Hybrid NoC for Chip Multi-processor (Abstract)
A Study of Leveraging Memory Level Parallelism for DRAM System on Multi-core/Many-Core Architecture (Abstract)
Multi-core Deployment Optimization Using Simulated Annealing and Ant Colony Optimization (Abstract)
A Next Generation Object-Oriented Environment for Real-Time Database Application Development (Abstract)
Genome Assembly on a Multicore System (Abstract)
The Value of Automation: A Study of MPI Application Migration Methods (Abstract)
Advanced Validation of the DVMS Approach to Fully Distributed VM Scheduling (Abstract)
Partitioned Fixed-Priority Real-Time Scheduling Based on Dependent Task-Split on Multicore Platform (Abstract)
Enhanced Method for the Signature Adaptability to the Application Behavior (Abstract)
Saving Time in a Program Robustness Evaluation (Abstract)
SeaRum: A Cloud-Based Service for Association Rule Mining (Abstract)
TurboSockets: Democratizing Distributed Deduplication (Abstract)
Dependency-Based Energy-Efficient Scheduling for Homogeneous Multi-core Clusters (Abstract)
Context-Aware Routing Algorithm for WSNs Based on Unequal Clustering (Abstract)
SMC: A Shared Memory Based SpaceWire Controller Solution (Abstract)
LogicCrowd: A Declarative Programming Platform for Mobile Crowdsourcing (Abstract)
Conflict and Interference Resolution for Physical Annotation Systems (Abstract)
Normal Vector Based Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks (Abstract)
Characterization of OSPF Convergence with Correlated Failures (Abstract)
Fast Intra Mode Decision Algorithm Based on Spatial-Domain Energy for H.264/AVC (Abstract)
A Location Management Algorithm for LEO Satellite Networks (Abstract)
A Distributed Routing Algorithm for LEO Satellite Networks (Abstract)
Communication and Collaboration Service Components for Ubiquitous Communication Applications (Abstract)
Thermal-Aware On-Chip Memory Architecture Exploration (Abstract)
Quality Assessment for Stereoscopic Image Based on DCT Frequency Information (Abstract)
Hope: A Fault-Tolerant Distributed Pub/Sub Architecture for Large-Scale Dynamic Network Environment (Abstract)
Design of the Farmer's Experience Based Greenhouse Operating Systems (Abstract)
Validation of a Rowing Oar Angle Measurement System Based on an Inertial Measurement Unit (Abstract)
Platform Zero: A Context-Based Computing Platform for Collaboration (Abstract)
A Methodology to Transform an OS-Based Application to a Bare Machine Application (Abstract)
Impact of Mobility Models on Social Structure Formation in Opportunistic Networks (Abstract)
Comparison SIP and IAX to Voice Packet Signaling over VOIP (Abstract)
Reinventing Mobile Community Computing and Communication (Abstract)
Measuring Walking and Running Cadence Using Magnetometers (Abstract)
VoIP Spam Prevention (Abstract)
An Energy-Aware Task Scheduling Algorithm for a Heterogeneous Data Center (Abstract)
An OpenFlow-Based Dynamic Path Adjustment Algorithm for Multicast Spanning Trees (Abstract)
High Radix Montgomery Modular Multiplier on Modern FPGA (Abstract)
A Model-Based Approach for RFID Application Testing (Abstract)
A Trust Evaluation Method for Supplier Selection (Abstract)
A Trusted Remote Attestation Model Based on Trusted Computing (Abstract)
Achieving Collaborative Wi-Fi Sharing without Changing Current Technologies (Abstract)
Multivalued Trust Routing Based on Topology Level for Wireless Sensor Networks (Abstract)
A Research Model for Trustworthy Pervasive Social Networking (Abstract)
Disability Parking Permit -- Lightweight But Trustworthy Identity Documents (Abstract)
Continuous Mobile Authentication Using Virtual Key Typing Biometrics (Abstract)
Studies in Socio-technical Security Analysis: Authentication of Identities with TLS Certificates (Abstract)
Complete Privacy Preserving Auditing for Data Integrity in Cloud Computing (Abstract)
On the Complexity of Authorization of Temporal RBAC in Cloud Computing Service (Abstract)
On Subjective Trust for Privacy Policy Enforcement in Cloud Computing (Abstract)
A Reliability-Based Trust Management Mechanism for Cloud Services (Abstract)
Towards Building an Automated Security Compliance Tool for the Cloud (Abstract)
A Defense Security Approach for Infrastructures against Hacking (Abstract)
A Lightweight Design of Malware Behavior Representation (Abstract)
Use of Role Based Access Control for Security-Purpose Hypervisors (Abstract)
A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers (Abstract)
Crime Toolkits: The Productisation of Cybercrime (Abstract)
Shear-Based Spatial Transformation to Protect Proximity Attack in Outsourced Database (Abstract)
Case Study: On the Security of Key Storage on PCs (Abstract)
A Power Model Combined of Architectural Level and Gate Level for Multicore Processors (Abstract)
Defend against Collusive SSDF Attack Using Trust in Cooperative Spectrum Sensing Environment (Abstract)
Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs (Abstract)
Exposing Clone RFID Tags at the Reader (Abstract)
ProTACD: A Generic Privacy Process for Vehicle Development (Abstract)
Mutual Chip Authentication (Abstract)
Toward Coercion-Resistant End-to-End Verifiable Electronic Voting Systems (Abstract)
Server-Aided Verification Proxy Re-signature (Abstract)
Cryptanalysis of "An Improved Remote Password Authentication Scheme with Smartcard" (Abstract)
Trust and Adaptation in STRATUS (Abstract)
Using Secure Multiparty Computation for Collaborative Information Exchange (Abstract)
Pseudonymous Smart Metering without a Trusted Third Party (Abstract)
TARS: Trusted Adaptive Routing Strategy with Back-Off Observing Mechanism (Abstract)
Formal Verification of the Coordinated Robust Authentication Protocol for Wireless Networks (Abstract)
TimSim: A Timestep-Based Wireless Ad-Hoc Network Simulator (Abstract)
HIWL: An Unsupervised Learning Algorithm for Indoor Wireless Localization (Abstract)
A Multi-agent Model for Fire Detection in Coal Mines Using Wireless Sensor Networks (Abstract)
A Novel Device-Device Beam Discovery Scheme with Cross-Layer Design for Millimeter-Wave WPAN (Abstract)
A Distributed Localization Algorithm Based on Random Diffusion in WSN (Abstract)
A Matrix Transformation Algorithm for Virtual Machine Placement in Cloud (Abstract)
Big Data Real-Time Processing Based on Storm (Abstract)
Detecting Associations in Large Dataset on MapReduce (Abstract)
Protecting Cumulative Node Constraint during XML Update (Abstract)
An Algorithmic Approach to Securing the Three-Stage Quantum Cryptography Protocol (Abstract)
Social Spam Discovery Using Bayesian Network Classifiers Based on Feature Extractions (Abstract)
The Role of Trust in Absorptive Capacity Operationalization (Abstract)
An Adaptive Rating System for Service Computing (Abstract)
An Automatic Parallel-Stage Decoupled Software Pipelining Parallelization Algorithm Based on OpenMP (Abstract)
Mobile Parallel Computing Algorithms for Single-Buffered, Speed-Scalable Processors (Abstract)
Probabilistic Analysis of Parallel Program with Partially Eliminated Barriers (Abstract)
Simulator Implementation and Performance Study of a Polymorphous Array Computer (Abstract)
Multicore Parallel Implementation of Agent Emotional Processes (Abstract)
COSCHED: A Scheduling Agent Maximizing Cloud Broker's Revenues under the CompatibleOne Architecture (Abstract)
Performance Analysis of Load-Aware Anycasting Based on OpenFlow (Abstract)
Parallel Realization of Cognitive Cells on Film Mammography (Abstract)
Fast and Accurate On-line Prediction of Performance and Power Consumption in Multicore-based Systems (Abstract)
Performance Evaluation of the Time Analysable On-Demand Coherent Cache (Abstract)
Communication Pipelining for Code Generation from Simulink Models (Abstract)
An Optimizing Strategy Research of LDPC Decoding Based on GPGPU (Abstract)
Environmental Spatio-temporal Ontology for the Linked Open Data Cloud (Abstract)
Author Index (PDF)
Publisher's Information (PDF)