Skip to main content
  • Conference proceedings
  • © 2014

Network and System Security

8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8792)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): NSS: International Conference on Network and System Security

Conference proceedings info: NSS 2015.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (47 papers)

  1. Front Matter

  2. Cloud Computing

    1. An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures

      • Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette
      Pages 1-14
    2. Adopting Provenance-Based Access Control in OpenStack Cloud IaaS

      • Dang Nguyen, Jaehong Park, Ravi Sandhu
      Pages 15-27
    3. Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage

      • Yong Yu, Yi Mu, Jianbing Ni, Jiang Deng, Ke Huang
      Pages 28-40
    4. A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service

      • Khalid Zaman Bijon, Ram Krishnan, Ravi Sandhu
      Pages 41-53
  3. Access Control

    1. Extending OpenStack Access Control with Domain Trust

      • Bo Tang, Ravi Sandhu
      Pages 54-69
    2. Hierarchical Solution for Access Control and Authentication in Software Defined Networks

      • He Shuangyu, Liu Jianwei, Mao Jian, Chen Jie
      Pages 70-81
    3. A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing

      • Zhenhua Chen, Shundong Li, Yimin Guo, Yilei Wang, Yunjie Chu
      Pages 82-95
  4. Network Security

    1. psOBJ: Defending against Traffic Analysis with pseudo-Objects

      • Yi Tang, Piaoping Lin, Zhaokai Luo
      Pages 96-109
    2. Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS

      • Shijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng
      Pages 110-123
    3. Revisiting Node Injection of P2P Botnet

      • Jia Yan, Lingyun Ying, Yi Yang, Purui Su, Qi Li, Hui Kong et al.
      Pages 124-137
    4. On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification

      • Di Wu, Xiao Chen, Chao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou
      Pages 138-151
  5. Security Analysis

    1. Exploiting the Hard-Wired Vulnerabilities of Newscast via Connectivity-Splitting Attack

      • Jakub MuszyÅ„ski, Sébastien Varrette, Juan Luis Jiménez Laredo, Pascal Bouvry
      Pages 152-165
    2. Cryptanalysis on the Authenticated Cipher Sablier

      • Xiutao Feng, Fan Zhang
      Pages 198-208
    3. Security Analysis and Improvement of Femtocell Access Control

      • Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Mu-En Wu
      Pages 223-232
  6. Public Key Cryptography

    1. Identity Based Threshold Ring Signature from Lattices

      • Baodian Wei, Yusong Du, Huang Zhang, Fangguo Zhang, Haibo Tian, Chongzhi Gao
      Pages 233-245
    2. Identity-Based Transitive Signcryption

      • Shuquan Hou, Xinyi Huang, Li Xu
      Pages 246-259

Other Volumes

  1. Network and System Security

About this book

This book constitutes the proceedings of the 8th International Conference on Network and System Security, NSS 2014, held in Xi'an, China, in October 2014. The 35 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 155 initial submissions. The papers are organized in topical sections on cloud computing, access control, network security, security analysis, public key cryptography, system security, privacy-preserving systems and biometrics, and key management and distribution.

Editors and Affiliations

  • Department of Computing, Hong Kong Polytechnic University, Kowloon, Hong Kong

    Man Ho Au

  • Department of Computer Science and Communication, University of Insubria, Varese, Italy

    Barbara Carminati

  • Ming Hsieh Department of Electrical Engineering, University of Southern California, Los Angeles, USA

    C.-C. Jay Kuo

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access