


default search action
30. DBSec 2016: Trento, Italy
- Silvio Ranise, Vipin Swarup:
Data and Applications Security and Privacy XXX - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings. Lecture Notes in Computer Science 9766, Springer 2016, ISBN 978-3-319-41482-9
Mobile Security and Privacy
- Haritabh Gupta, Shamik Sural
, Vijayalakshmi Atluri
, Jaideep Vaidya:
Deciphering Text from Touchscreen Key Taps. 3-18 - Christof Ferreira Torres
, Rolando Trujillo-Rasua
:
The Fréchet/Manhattan Distance and the Trajectory Anonymisation Problem. 19-34
Security and Privacy in Databases
- Luca Ferretti
, Michele Colajanni
, Mirco Marchetti
:
Guaranteeing Correctness of Bulk Operations in Outsourced Databases. 37-51 - Giovanni Di Crescenzo, Euthimios Panagos, Brian A. Coan:
Enhanced Functionality and Confidentiality for Database Search and Publish/Subscribe Protocols. 52-60 - Ibrahim Lazrig, Toan Ong, Indrajit Ray, Indrakshi Ray, Michael G. Kahn:
Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes. 61-76
Access Control
- Scott D. Stoller, Thang Bui:
Mining Hierarchical Temporal Roles with Multiple Metrics. 79-95 - Jason Crampton, James Sellwood:
Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances. 96-105 - Navid Pustchi, Ravi S. Sandhu:
Role-Centric Circle-of-Trust in Multi-tenant Cloud IaaS. 106-121 - Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan:
A Comparison of Logical-Formula and Enumerated Authorization Policy ABAC Models. 122-129 - Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi
, Pierangela Samarati
:
Access Control for the Shuffle Index. 130-147
Protection and Privacy of Data and Big Data
- Shlomi Dolev, Yin Li, Shantanu Sharma:
Private and Secure Secret Shared MapReduce (Extended Abstract) - (Extended Abstract). 151-160 - Stefan Thaler, Jerry den Hartog, Milan Petkovic:
Towards Creating Believable Decoy Project Folders for Detecting Data Theft. 161-169 - Harichandan Roy, Murat Kantarcioglu, Latanya Sweeney:
Practical Differentially Private Modeling of Human Movement Data. 170-178 - Fahad Shaon, Murat Kantarcioglu:
A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data. 179-195
Security and Privacy in Social Networks and Collaborative Systems
- Rauf Mahmudlu, Jerry den Hartog, Nicola Zannone
:
Data Governance and Transparency for Collaborative Systems. 199-216 - Silvie Levy, Ehud Gudes, Nurit Gal-Oz:
Sharing-Habits Based Privacy Control in Social Networks. 217-232 - Sjouke Mauw, Rolando Trujillo-Rasua
, Bochuan Xuan:
Counteracting Active Attacks in Social Network Graphs. 233-248
Reasoning about Security and Its Cost
- Daniele Sgandurra, Erisa Karafili, Emil Lupu
:
Formalizing Threat Models for Virtualized Systems. 251-267 - Ultan Neville, Simon N. Foley
:
Reasoning About Firewall Policies Through Refinement and Composition. 268-284 - Erman Pattuk, Murat Kantarcioglu, Huseyin Ulusoy, Bradley A. Malin:
CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud. 285-294 - Daniel Borbor, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks. 295-312 - Julien Bringer, Hervé Chabanne, Daniel Le Métayer, Roch Lescuyer:
Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems. 313-327
Trust and Zero-Day Vulnerabilities
- Georg Merzdovnik
, Klaus Falb, Martin Schmiedecker, Artemios G. Voyiatzis, Edgar R. Weippl:
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services. 331-346 - Olgierd Pieczul, Simon N. Foley
:
Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems. 347-363

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.