default search action
31. DBSec 2017: Philadelphia, PA, USA
- Giovanni Livraga, Sencun Zhu:
Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings. Lecture Notes in Computer Science 10359, Springer 2017, ISBN 978-3-319-61175-4
Access Control
- Yossif Shalabi, Ehud Gudes:
Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases. 3-19 - Dieudonne Mulamba, Indrajit Ray:
Resilient Reference Monitor for Distributed Access Control via Moving Target Defense. 20-40 - Emre Uzun, Gennaro Parlato, Vijayalakshmi Atluri, Anna Lisa Ferrara, Jaideep Vaidya, Shamik Sural, David Lorenzi:
Preventing Unauthorized Data Flows. 41-62 - Maanak Gupta, Farhan Patwa, Ravi S. Sandhu:
Object-Tagged RBAC Model for the Hadoop Ecosystem. 63-81 - Masoud Narouei, Hamed Khanpour, Hassan Takabi:
Identification of Access Control Policy Sentences from Natural Language Policy Documents. 82-100 - Thang Bui, Scott D. Stoller, Shikhar Sharma:
Fast Distributed Evaluation of Stateful Attribute-Based Access Control Policies. 101-119
Privacy
- Xiaosu Tong, Bowei Xi, Murat Kantarcioglu, Ali Inan:
Gaussian Mixture Models for Classification and Hypothesis Tests Under Differential Privacy. 123-141 - Ling Chen, Ting Yu, Rada Chirkova:
Differentially Private K-Skyband Query Answering Through Adaptive Spatial Decomposition. 142-163 - Michael G. Solomon, Vaidy S. Sunderam, Li Xiong, Ming Li:
Mutually Private Location Proximity Detection with Access Control. 164-184 - Jun Zhang, Meiqi He, Siu-Ming Yiu:
Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery. 185-204 - Theodore Georgiou, Amr El Abbadi, Xifeng Yan:
Privacy-Preserving Community-Aware Trending Topic Detection in Online Social Media. 205-224 - Jonas Böhler, Daniel Bernau, Florian Kerschbaum:
Privacy-Preserving Outlier Detection for Data Streams. 225-238 - Vishwas T. Patil, R. K. Shyamasundar:
Undoing of Privacy Policies on Facebook. 239-255
Cloud Security
- Xiaoyan Sun, Anoop Singhal, Peng Liu:
Towards Actionable Mission Impact Assessment in the Context of Cloud Computing. 259-274 - Jin Han, Wanyu Zang, Songqing Chen, Meng Yu:
Reducing Security Risks of Clouds Through Virtual Machine Placement. 275-292 - Nora Cuppens, Salaheddine Zerkane, Yanhuang Li, David Espes, Philippe Le Parc, Frédéric Cuppens:
Firewall Policies Provisioning Through SDN in the Cloud. 293-310 - Bo Zhang, Boxiang Dong, Wendy Hui Wang:
Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations. 311-324 - Florian Kerschbaum, Martin Härterich:
Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases. 325-336 - Tushar Kanti Saha, Mayank, Takeshi Koshiba:
Efficient Protocols for Private Database Queries. 337-348 - Anna Lisa Ferrara, Anna Cinzia Squicciarini, Cong Liao, Truc L. Nguyen:
Toward Group-Based User-Attribute Policies in Azure-Like Access Control Systems. 349-361
Secure Storage in the Cloud
- Rouzbeh Behnia, Attila Altay Yavuz, Muslum Ozgur Ozmen:
High-Speed High-Security Public Key Encryption with Keyword Search. 365-385 - Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi:
HardIDX: Practical and Secure Index with SGX. 386-408 - Sebastian Messmer, Jochen Rill, Dirk Achenbach, Jörn Müller-Quade:
A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction. 409-429
Secure Systems
- Seth Simms, Margot Maxwell, Sara Johnson, Julian L. Rrushi:
Keylogger Detection Using a Decoy Keyboard. 433-452 - David Nuñez, Isaac Agudo, Javier López:
The Fallout of Key Compromise in a Proxy-Mediated Key Agreement Protocol. 453-472 - Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Improving Resilience of Behaviometric Based Continuous Authentication with Multiple Accelerometers. 473-485
Security in Networks and Web
- Hao Xue, Fengjun Li:
A Content-Aware Trust Index for Online Review Spam Detection. 489-508 - Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options. 509-528 - Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray:
A Distributed Mechanism to Protect Against DDoS Attacks. 529-540 - Zhaomo Yang, Kirill Levchenko:
Securing Web Applications with Predicate Access Control. 541-554
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.