- Sponsor:
- sigsac
These proceedings contain the papers selected for presentation at the 14th ACM Conference on Computer and Communications Security (CCS 2007), held October 29 to November 2, 2007 in Alexandria, VA, USA.
In response to the call for papers 302 papers were submitted to the conference. These papers were evaluated on the basis of their significance, novelty, and technical quality. Each paper was reviewed by at least three members of the program committee. Reviewing was double-blind, meaning that the program committee was not able to see the names and affiliations of the authors, and the authors were not told which committee members reviewed which papers. After the reviews were written, the program committee met online for three weeks of intensive discussion. Of the papers submitted, 55 were selected for presentation at the conference, giving an acceptance rate of about 18%.
Assurance and evaluation: what next?
This talk presents some observations on the nature of system security and security assurance, and on processes that attempt to evaluate assurance. Over the past forty years, approaches to assuring software security have evolved from "penetrate and patch"...
Cited By
- Buczkowski P, Malacaria P, Hankin C and Fielder A Optimal Security Hardening over a Probabilistic Attack Graph Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, (21-30)
-
De Capitani di Vimercati S, Foresti S, Livraga G, Samarati P, Agaian S, DelMarco S and Asari V (2019). Data security and privacy in the cloud Mobile Multimedia/Image Processing, Security, and Applications 2019, 10.1117/12.2523603, 9781510626515, (15)
-
Yan H, Li J, Li X, Zhao G, Lee S and Shen J (2016). Secure Access Control of E-Health System with Attribute-Based Encryption, Intelligent Automation & Soft Computing, 10.1080/10798587.2015.1132586, 22:3, (345-352), Online publication date: 2-Jul-2016.
- Danezis G and Sassaman L How to Bypass Two Anonymity Revocation Schemes Proceedings of the 8th international symposium on Privacy Enhancing Technologies, (187-201)