default search action
35th DBSec 2021: Calgary, Canada
- Ken Barker, Kambiz Ghazinour:
Data and Applications Security and Privacy XXXV - 35th Annual IFIP WG 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021, Proceedings. Lecture Notes in Computer Science 12840, Springer 2021, ISBN 978-3-030-81241-6
Differential Privacy
- Liyue Fan, Akarsh Pokkunuru:
DPNeT: Differentially Private Network Traffic Synthesis with Generative Adversarial Networks. 3-21 - Daniel Bernau, Jonas Robl, Philip-William Grassal, Steffen Schneider, Florian Kerschbaum:
Comparing Local and Central Differential Privacy Using Membership Inference Attacks. 22-42 - Fumiyuki Kato, Yang Cao, Masatoshi Yoshikawa:
Preventing Manipulation Attack in Local Differential Privacy Using Verifiable Randomization Mechanism. 43-60
Cryptology I
- Jiafan Wang, Sherman S. M. Chow:
Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-maps - (A Slot in Need is a Slot Indeed). 63-83 - Alexandros Bakas, Antonis Michalas:
Nowhere to Leak: A Multi-client Forward and Backward Private Symmetric Searchable Encryption Scheme. 84-95 - Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
Distributed Query Evaluation over Encrypted Data. 96-114
Cryptology II
- Sara Ramezanian, Tommi Meskanen, Valtteri Niemi:
Multi-party Private Set Operations with an External Decider. 117-135 - Giovanni Di Crescenzo, Lisa Bahler, Brian A. Coan, Kurt Rohloff, David Bruce Cousins, Yuriy Polyakov:
Encrypted-Input Obfuscation of Image Classifiers. 136-156 - D. V. N. Siva Kumar, P. Santhi Thilagam:
Preserving Privacy of Co-occurring Keywords over Encrypted Data. 157-168
Machine Learning
- John Heaps, Ram Krishnan, Yufei Huang, Jianwei Niu, Ravi S. Sandhu:
Access Control Policy Generation from User Stories Using Machine Learning. 171-188 - Wojciech Ozga, Do Le Quoc, Christof Fetzer:
Perun: Confidential Multi-stakeholder Machine Learning Framework with Hardware Acceleration Support. 189-208 - Ching-Yuan Liu, Min-Yi Chiu, Qi-Xian Huang, Hung-Min Sun:
PDF Malware Detection Using Visualization and Machine Learning. 209-220 - Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Deep Learning for Detecting Network Attacks: An End-to-End Approach. 221-234
Potpourri I
- Mina Alishahi, Nicola Zannone:
Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Datasets. 237-258 - Ioannis Chrysakis, Giorgos Flouris, Maria Makridaki, Theodore Patkos, Yannis Roussakis, Georgios Samaritakis, Nikoleta Tsampanaki, Elias Tzortzakakis, Elisjana Ymeralli, Tom Seymoens, Anastasia Dimou, Ruben Verborgh:
A Rewarding Framework for Crowdsourcing to Increase Privacy Awareness. 259-277 - Na Shi, Bo Tang, Ravi S. Sandhu, Qi Li:
DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things. 278-290
Potpourri II
- Manfred Vielberth, Magdalena Glas, Marietheres Dietz, Stylianos Karagiannis, Emmanouil Magkos, Günther Pernul:
A Digital Twin-Based Cyber Range for SOC Analysts. 293-311 - Kalvin Eng, Eleni Stroulia:
The ${tkl}\hbox {-}\mathrm {Score}$ for Data-Sharing Misuseability. 312-324 - Salimeh Dashti, Amir Sharif, Roberto Carbone, Silvio Ranise:
Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 Deployments. 325-337 - Sanaz Eidizadehakhcheloo, Bizhan Alipour Pijani, Abdessamad Imine, Michaël Rusinowitch:
Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks. 338-354
Access Control
- Anna Lisa Ferrara, Federica Paci, Chiara Ricciardi:
Verifiable Hierarchical Key Assignment Schemes. 357-376 - Adi Swissa, Ehud Gudes:
An ABAC Model with Trust and Gossiping (ABAC-TG) for Online Social Networks. 377-392 - Shuvra Chakraborty, Ravi S. Sandhu:
On Feasibility of Attribute-Aware Relationship-Based Access Control Policy Mining. 393-405
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.