Skip to Main content Skip to Navigation
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Data and Applications Security and Privacy XXXI
Giovanni Livraga, Sencun Zhu
Front Matter

Access Control


Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases
Yossif Shalabi, Ehud Gudes
3-19
Resilient Reference Monitor for Distributed Access Control via Moving Target Defense
Dieudonné Mulamba, Indrajit Ray
20-40
Preventing Unauthorized Data Flows
Emre Uzun, Gennaro Parlato, Vijayalakshmi Atluri, Anna Ferrara, Jaideep Vaidya, Shamik Sural, David Lorenzi
41-62
Object-Tagged RBAC Model for the Hadoop Ecosystem
Maanak Gupta, Farhan Patwa, Ravi Sandhu
63-81
Identification of Access Control Policy Sentences from Natural Language Policy Documents
Masoud Narouei, Hamed Khanpour, Hassan Takabi
82-100
Fast Distributed Evaluation of Stateful Attribute-Based Access Control Policies
Thang Bui, Scott Stoller, Shikhar Sharma
101-119

Privacy


Gaussian Mixture Models for Classification and Hypothesis Tests Under Differential Privacy
Xiaosu Tong, Bowei Xi, Murat Kantarcioglu, Ali Inan
123-141
Differentially Private K-Skyband Query Answering Through Adaptive Spatial Decomposition
Ling Chen, Ting Yu, Rada Chirkova
142-163
Mutually Private Location Proximity Detection with Access Control
Michael Solomon, Vaidy Sunderam, Li Xiong, Ming Li
164-184
Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery
Jun Zhang, Meiqi He, Siu-Ming Yiu
185-204
Privacy-Preserving Community-Aware Trending Topic Detection in Online Social Media
Theodore Georgiou, Amr El Abbadi, Xifeng Yan
205-224
Privacy-Preserving Outlier Detection for Data Streams
Jonas Böhler, Daniel Bernau, Florian Kerschbaum
225-238
Undoing of Privacy Policies on Facebook
Vishwas Patil, R. Shyamasundar
239-255

Cloud Security


Towards Actionable Mission Impact Assessment in the Context of Cloud Computing
Xiaoyan Sun, Anoop Singhal, Peng Liu
259-274
Reducing Security Risks of Clouds Through Virtual Machine Placement
Jin Han, Wanyu Zang, Songqing Chen, Meng Yu
275-292
Firewall Policies Provisioning Through SDN in the Cloud
Nora Cuppens, Salaheddine Zerkane, Yanhuang Li, David Espes, Philippe Parc, Frédéric Cuppens
293-310
Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations
Bo Zhang, Boxiang Dong, Wendy Wang
311-324
Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases
Florian Kerschbaum, Martin Härterich
325-336
Efficient Protocols for Private Database Queries
Tushar Saha, . Mayank, Takeshi Koshiba
337-348
Toward Group-Based User-Attribute Policies in Azure-Like Access Control Systems
Anna Ferrara, Anna Squicciarini, Cong Liao, Truc Nguyen
349-361

Secure Storage in the Cloud


High-Speed High-Security Public Key Encryption with Keyword Search
Rouzbeh Behnia, Attila Yavuz, Muslum Ozmen
365-385
HardIDX: Practical and Secure Index with SGX
Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi, Benny Fuhry, Raad Bahmani
386-408
A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction
Sebastian Messmer, Jochen Rill, Dirk Achenbach, Jörn Müller-Quade
409-429

Secure Systems


Keylogger Detection Using a Decoy Keyboard
Seth Simms, Margot Maxwell, Sara Johnson, Julian Rrushi
433-452
The Fallout of Key Compromise in a Proxy-Mediated Key Agreement Protocol
David Nuñez, Isaac Agudo, Javier Lopez
453-472
Improving Resilience of Behaviometric Based Continuous Authentication with Multiple Accelerometers
Tim Hamme, Davy Preuveneers, Wouter Joosen
473-485

Security in Networks and Web


A Content-Aware Trust Index for Online Review Spam Detection
Hao Xue, Fengjun Li
489-508
Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options
Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal
509-528
A Distributed Mechanism to Protect Against DDoS Attacks
Negar Mosharraf, Anura Jayasumana, Indrakshi Ray
529-540
Securing Web Applications with Predicate Access Control
Zhaomo Yang, Kirill Levchenko
541-554

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/