DBSec B

25 papers

YearTitle / Authors
2016A Comparison of Logical-Formula and Enumerated Authorization Policy ABAC Models.
Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan
2016A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data.
Fahad Shaon, Murat Kantarcioglu
2016Access Control for the Shuffle Index.
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati
2016CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud.
Erman Pattuk, Murat Kantarcioglu, Huseyin Ulusoy, Bradley A. Malin
2016Counteracting Active Attacks in Social Network Graphs.
Sjouke Mauw, Rolando Trujillo-Rasua, Bochuan Xuan
2016Data Governance and Transparency for Collaborative Systems.
Rauf Mahmudlu, Jerry den Hartog, Nicola Zannone
2016Data and Applications Security and Privacy XXX - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings
Silvio Ranise, Vipin Swarup
2016Deciphering Text from Touchscreen Key Taps.
Haritabh Gupta, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya
2016Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks.
Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal
2016Enhanced Functionality and Confidentiality for Database Search and Publish/Subscribe Protocols.
Giovanni Di Crescenzo, Euthimios Panagos, Brian A. Coan
2016Formalizing Threat Models for Virtualized Systems.
Daniele Sgandurra, Erisa Karafili, Emil Lupu
2016Guaranteeing Correctness of Bulk Operations in Outsourced Databases.
Luca Ferretti, Michele Colajanni, Mirco Marchetti
2016Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances.
Jason Crampton, James Sellwood
2016Mining Hierarchical Temporal Roles with Multiple Metrics.
Scott D. Stoller, Thang Bui
2016Practical Differentially Private Modeling of Human Movement Data.
Harichandan Roy, Murat Kantarcioglu, Latanya Sweeney
2016Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes.
Ibrahim Lazrig, Toan Ong, Indrajit Ray, Indrakshi Ray, Michael G. Kahn
2016Private and Secure Secret Shared MapReduce (Extended Abstract) - (Extended Abstract).
Shlomi Dolev, Yin Li, Shantanu Sharma
2016Reasoning About Firewall Policies Through Refinement and Composition.
Ultan Neville, Simon N. Foley
2016Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems.
Julien Bringer, Hervé Chabanne, Daniel Le Métayer, Roch Lescuyer
2016Role-Centric Circle-of-Trust in Multi-tenant Cloud IaaS.
Navid Pustchi, Ravi S. Sandhu
2016Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems.
Olgierd Pieczul, Simon N. Foley
2016Sharing-Habits Based Privacy Control in Social Networks.
Silvie Levy, Ehud Gudes, Nurit Gal-Oz
2016The Fréchet/Manhattan Distance and the Trajectory Anonymisation Problem.
Christof Ferreira Torres, Rolando Trujillo-Rasua
2016Towards Creating Believable Decoy Project Folders for Detecting Data Theft.
Stefan Thaler, Jerry den Hartog, Milan Petkovic
2016Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services.
Georg Merzdovnik, Klaus Falb, Martin Schmiedecker, Artemios G. Voyiatzis, Edgar R. Weippl