


default search action
32nd DBSec 2018: Bergamo, Italy
- Florian Kerschbaum, Stefano Paraboschi:

Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings. Lecture Notes in Computer Science 10980, Springer 2018, ISBN 978-3-319-95728-9
Administration
- Nawaf Alhebaishi

, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds. 3-20 - Hoang Long Nguyen, Jean-Philippe Eisenbarth

, Claudia-Lavinia Ignat, Olivier Perrin:
Blockchain-Based Auditing of Transparent Log Servers. 21-37 - Edwin Bourget, Frédéric Cuppens, Nora Cuppens-Boulahia, Samuel Dubus, Simon N. Foley, Youssef Laarouchi:

Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes. 38-47
Access Control Policies
- Gunjan Batra, Vijayalakshmi Atluri

, Jaideep Vaidya, Shamik Sural
:
Enabling the Deployment of ABAC Policies in RBAC Systems. 51-68 - Martin Kolár

, M. Carmen Fernández Gago, Javier López:
Policy Languages and Their Suitability for Trust Negotiation. 69-84 - Vishwas T. Patil, Nivia Jatain, R. K. Shyamasundar:

Role of Apps in Undoing of Privacy Policies on Facebook. 85-98 - Luciano Argento

, Andrea Margheri
, Federica Paci
, Vladimiro Sassone
, Nicola Zannone
:
Towards Adaptive Access Control. 99-109
Privacy-Preserving Access and Computation
- Thang Hoang, Attila A. Yavuz

, F. Betül Durak, Jorge Guajardo:
Oblivious Dynamic Searchable Encryption on Distributed Cloud Systems. 113-130 - Guy Barshap, Tamir Tassa:

Privacy-Preserving Planarity Testing of Distributed Graphs. 131-147 - Liyue Fan:

Image Pixelization with Differential Privacy. 148-162
Integrity and User Interaction
- Grisha Weintraub

, Ehud Gudes:
Data Integrity Verification in Column-Oriented NoSQL Databases. 165-181 - Ian Mackie, Merve Yildirim:

A Novel Hybrid Password Authentication Scheme Based on Text and Image. 182-197 - Majid Hatamian

, Agnieszka Kitkowska
, Jana Korunovska, Sabrina Kirrane:
"It's Shocking!": Analysing the Impact and Reactions to the A3: Android Apps Behaviour Analyser. 198-215
Security Analysis and Private Evaluation
- B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar:

FlowConSEAL: Automatic Flow Consistency Analysis of SEAndroid and SELinux Policies. 219-231 - Md Zakir Hossen, Mohammad Mannan:

On Understanding Permission Usage Contextuality in Android Apps. 232-242 - Marc Joye, Fariborz Salehi:

Private yet Efficient Decision Tree Evaluation. 243-259
Fixing Vulnerabilities
- Cédric Van Rompay, Melek Önen

:
Breaking and Fixing the Security Proof of Garbled Bloom Filters. 263-277 - Sebastian Neuner, Artemios G. Voyiatzis, Spiros Fotopoulos, Collin Mulliner, Edgar R. Weippl:

USBlock: Blocking USB-Based Keypress Injection Attacks. 278-295
Networked Systems
- Jia Xu

, Jianying Zhou
:
Virtually Isolated Network: A Hybrid Network to Achieve High Level Security. 299-311 - Amine Boukhtouta, Makan Pourzandi, Richard Brunner, Stéphane Dault:

Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology. 312-329 - Chen Cao, Lun-Pin Yuan, Anoop Singhal, Peng Liu, Xiaoyan Sun, Sencun Zhu:

Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs. 330-348

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














