


default search action
30. DBSec 2016: Trento, Italy
- Silvio Ranise, Vipin Swarup:

Data and Applications Security and Privacy XXX - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings. Lecture Notes in Computer Science 9766, Springer 2016, ISBN 978-3-319-41482-9
Mobile Security and Privacy
- Haritabh Gupta, Shamik Sural

, Vijayalakshmi Atluri
, Jaideep Vaidya:
Deciphering Text from Touchscreen Key Taps. 3-18 - Christof Ferreira Torres

, Rolando Trujillo-Rasua
:
The Fréchet/Manhattan Distance and the Trajectory Anonymisation Problem. 19-34
Security and Privacy in Databases
- Luca Ferretti

, Michele Colajanni
, Mirco Marchetti
:
Guaranteeing Correctness of Bulk Operations in Outsourced Databases. 37-51 - Giovanni Di Crescenzo, Euthimios Panagos, Brian A. Coan:

Enhanced Functionality and Confidentiality for Database Search and Publish/Subscribe Protocols. 52-60 - Ibrahim Lazrig, Toan Ong, Indrajit Ray, Indrakshi Ray, Michael G. Kahn:

Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes. 61-76
Access Control
- Scott D. Stoller, Thang Bui:

Mining Hierarchical Temporal Roles with Multiple Metrics. 79-95 - Jason Crampton, James Sellwood:

Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances. 96-105 - Navid Pustchi, Ravi S. Sandhu:

Role-Centric Circle-of-Trust in Multi-tenant Cloud IaaS. 106-121 - Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan:

A Comparison of Logical-Formula and Enumerated Authorization Policy ABAC Models. 122-129 - Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi

, Pierangela Samarati
:
Access Control for the Shuffle Index. 130-147
Protection and Privacy of Data and Big Data
- Shlomi Dolev, Yin Li, Shantanu Sharma:

Private and Secure Secret Shared MapReduce (Extended Abstract) - (Extended Abstract). 151-160 - Stefan Thaler, Jerry den Hartog, Milan Petkovic:

Towards Creating Believable Decoy Project Folders for Detecting Data Theft. 161-169 - Harichandan Roy, Murat Kantarcioglu, Latanya Sweeney:

Practical Differentially Private Modeling of Human Movement Data. 170-178 - Fahad Shaon, Murat Kantarcioglu:

A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data. 179-195
Security and Privacy in Social Networks and Collaborative Systems
- Rauf Mahmudlu, Jerry den Hartog, Nicola Zannone

:
Data Governance and Transparency for Collaborative Systems. 199-216 - Silvie Levy, Ehud Gudes, Nurit Gal-Oz:

Sharing-Habits Based Privacy Control in Social Networks. 217-232 - Sjouke Mauw, Rolando Trujillo-Rasua

, Bochuan Xuan:
Counteracting Active Attacks in Social Network Graphs. 233-248
Reasoning about Security and Its Cost
- Daniele Sgandurra, Erisa Karafili, Emil Lupu

:
Formalizing Threat Models for Virtualized Systems. 251-267 - Ultan Neville, Simon N. Foley

:
Reasoning About Firewall Policies Through Refinement and Composition. 268-284 - Erman Pattuk, Murat Kantarcioglu, Huseyin Ulusoy, Bradley A. Malin

:
CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud. 285-294 - Daniel Borbor, Lingyu Wang, Sushil Jajodia

, Anoop Singhal:
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks. 295-312 - Julien Bringer, Hervé Chabanne, Daniel Le Métayer, Roch Lescuyer:

Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems. 313-327
Trust and Zero-Day Vulnerabilities
- Georg Merzdovnik

, Klaus Falb, Martin Schmiedecker, Artemios G. Voyiatzis, Edgar R. Weippl:
Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services. 331-346 - Olgierd Pieczul, Simon N. Foley

:
Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems. 347-363

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














