


default search action
38th DBSec 2024: San Jose, CA, USA
- Anna Lisa Ferrara

, Ram Krishnan
:
Data and Applications Security and Privacy XXXVIII - 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024, Proceedings. Lecture Notes in Computer Science 14901, Springer 2024, ISBN 978-3-031-65171-7
Access Control
- Mian Yang

, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya:
A Graph-Based Framework for ABAC Policy Enforcement and Analysis. 3-23 - Giorgia Sirigu

, Barbara Carminati
, Elena Ferrari
:
Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-materialisation. 24-43 - Alexander Puchta

, Thomas Baumer
, Mathis Müller
, Günther Pernul
:
IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence. 44-52
Crypto Application
- Tieming Geng, Chin-Tser Huang:

SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security. 55-70 - Md Shihabul Islam

, Mahmoud Zamani
, Kevin W. Hamlen
, Latifur Khan
, Murat Kantarcioglu
:
Ensuring End-to-End IoT Data Security and Privacy Through Cloud-Enhanced Confidential Computing. 71-91 - Yong Zhi Lim

, Wen Qing Ong Perry, Jianying Zhou:
Towards Atomicity and Composability in Cross-Chain NFTs. 92-100 - Seyni Kane, Anis Bkakria

:
A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM. 101-108
Privacy
- Sabrina De Capitani di Vimercati

, Sara Foresti
, Valerio Ghirimoldi
, Pierangela Samarati
:
DT-Anon: Decision Tree Target-Driven Anonymization. 111-130 - Tassos Dimitriou:

Visor: Privacy-Preserving Reputation for Decentralized Marketplaces. 131-150
Attack
- Mahmoud Abdelgawad, Indrakshi Ray:

Resiliency Analysis of Mission-Critical System of Systems Using Formal Methods. 153-170 - Emmanuel Dana Buedi

, Ali A. Ghorbani
, Sajjad Dadkhah
, Raphael Ferreira:
Enhancing EV Charging Station Security Using a Multi-dimensional Dataset: CICEVSE2024. 171-190 - Kéren Saint-Hilaire

, Christopher Neal
, Frédéric Cuppens
, Nora Boulahia-Cuppens
, Makhlouf Hadji
:
Optimal Automated Generation of Playbooks. 191-199
ML Attack, Vulnerability
- Fariha Ishrat Rahman, Sadaf Md. Halim, Anoop Singhal, Latifur Khan:

ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning. 203-220 - Saquib Irtiza

, Xiaodi Li
, Mahmoud Zamani
, Latifur Khan
, Kevin W. Hamlen
:
VulPrompt: Prompt-Based Vulnerability Detection Using Few-Shot Graph Learning. 221-240 - Fatima Zahra Qachfar

, Rakesh M. Verma
:
All Your LLMs Belong to Us: Experiments with a New Extortion Phishing Dataset. 241-258 - Xiujuan Wang

, Qipeng Li, Shuaibing Lu
:
Adaptive Image Adversarial Example Detection Based on Class Activation Mapping. 259-266
Security User Studies
- Sabrina Friedl

, Tobias Reittinger
, Günther Pernul
:
From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics. 269-289 - Arun Reddy, Yuan Cheng

:
User Perceptions of CAPTCHAs: University vs. Internet Users. 290-297
Differential Privacy
- Saptarshi De Chaudhury, Likhith Reddy, Matta Varun, Tirthankar Sengupta, Sandip Chakraborty, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:

Incentivized Federated Learning with Local Differential Privacy Using Permissioned Blockchains. 301-319 - Fereshteh Razmi, Jian Lou, Li Xiong:

Does Differential Privacy Prevent Backdoor Attacks in Practice? 320-340

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














