index - Data and Applications Security and Privacy XXX Access content directly
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Data and Applications Security and Privacy XXX
Silvio Ranise, Vipin Swarup
Front Matter

Mobile Security and Privacy


Deciphering Text from Touchscreen Key Taps
Haritabh Gupta, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya
3-18
The Fréchet/Manhattan Distance and the Trajectory Anonymisation Problem
Christof Torres, Rolando Trujillo-Rasua
19-34

Security and Privacy in Databases


Guaranteeing Correctness of Bulk Operations in Outsourced Databases
Luca Ferretti, Michele Colajanni, Mirco Marchetti
37-51
Enhanced Functionality and Confidentiality for Database Search and Publish/Subscribe Protocols
Giovanni Crescenzo, Euthimios Panagos, Brian Coan
52-60
Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes
Ibrahim Lazrig, Toan Ong, Indrajit Ray, Indrakshi Ray, Michael Kahn
61-76

Access Control


Mining Hierarchical Temporal Roles with Multiple Metrics
Scott Stoller, Thang Bui
79-95
Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances
Jason Crampton, James Sellwood
96-105
Role-Centric Circle-of-Trust in Multi-tenant Cloud IaaS
Navid Pustchi, Ravi Sandhu
106-121
A Comparison of Logical-Formula and Enumerated Authorization Policy ABAC Models
Prosunjit Biswas, Ravi Sandhu, Ram Krishnan
122-129
Access Control for the Shuffle Index
Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati
130-147

Protection and Privacy of Data and Big Data


Private and Secure Secret Shared MapReduce (Extended Abstract)
Shlomi Dolev, Yin Li, Shantanu Sharma
151-160
Towards Creating Believable Decoy Project Folders for Detecting Data Theft
Stefan Thaler, Jerry Hartog, Milan Petkovic
161-169
Practical Differentially Private Modeling of Human Movement Data
Harichandan Roy, Murat Kantarcioglu, Latanya Sweeney
170-178
A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data
Fahad Shaon, Murat Kantarcioglu
179-195

Security and Privacy in Social Networks and Collaborative Systems


Data Governance and Transparency for Collaborative Systems
Rauf Mahmudlu, Jerry Hartog, Nicola Zannone
199-216
Sharing-Habits Based Privacy Control in Social Networks
Silvie Levy, Ehud Gudes, Nurit Gal-Oz
217-232
Counteracting Active Attacks in Social Network Graphs
Sjouke Mauw, Rolando Trujillo-Rasua, Bochuan Xuan
233-248

Reasoning about Security and its Cost


Formalizing Threat Models for Virtualized Systems
Daniele Sgandurra, Erisa Karafili, Emil Lupu
251-267
Reasoning About Firewall Policies Through Refinement and Composition
Ultan Neville, Simon Foley
268-284
CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud
Erman Pattuk, Murat Kantarcioglu, Huseyin Ulusoy, Bradley Malin
285-294
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks
Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal
295-312
Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems
Julien Bringer, Hervé Chabanne, Daniel Métayer, Roch Lescuyer
313-327

Trust and Zero-Day Vulnerabilities


Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services
Georg Merzdovnik, Klaus Falb, Martin Schmiedecker, Artemios Voyiatzis, Edgar Weippl
331-346
Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems
Olgierd Pieczul, Simon Foley
347-363

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/