


default search action
32nd DBSec 2018: Bergamo, Italy
- Florian Kerschbaum, Stefano Paraboschi:
Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings. Lecture Notes in Computer Science 10980, Springer 2018, ISBN 978-3-319-95728-9
Administration
- Nawaf Alhebaishi
, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds. 3-20 - Hoang Long Nguyen, Jean-Philippe Eisenbarth
, Claudia-Lavinia Ignat, Olivier Perrin:
Blockchain-Based Auditing of Transparent Log Servers. 21-37 - Edwin Bourget, Frédéric Cuppens, Nora Cuppens-Boulahia, Samuel Dubus, Simon N. Foley, Youssef Laarouchi:
Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes. 38-47
Access Control Policies
- Gunjan Batra, Vijayalakshmi Atluri
, Jaideep Vaidya, Shamik Sural
:
Enabling the Deployment of ABAC Policies in RBAC Systems. 51-68 - Martin Kolár
, M. Carmen Fernández Gago, Javier López:
Policy Languages and Their Suitability for Trust Negotiation. 69-84 - Vishwas T. Patil, Nivia Jatain, R. K. Shyamasundar:
Role of Apps in Undoing of Privacy Policies on Facebook. 85-98 - Luciano Argento
, Andrea Margheri
, Federica Paci
, Vladimiro Sassone
, Nicola Zannone
:
Towards Adaptive Access Control. 99-109
Privacy-Preserving Access and Computation
- Thang Hoang, Attila A. Yavuz
, F. Betül Durak, Jorge Guajardo:
Oblivious Dynamic Searchable Encryption on Distributed Cloud Systems. 113-130 - Guy Barshap, Tamir Tassa:
Privacy-Preserving Planarity Testing of Distributed Graphs. 131-147 - Liyue Fan:
Image Pixelization with Differential Privacy. 148-162
Integrity and User Interaction
- Grisha Weintraub
, Ehud Gudes:
Data Integrity Verification in Column-Oriented NoSQL Databases. 165-181 - Ian Mackie, Merve Yildirim:
A Novel Hybrid Password Authentication Scheme Based on Text and Image. 182-197 - Majid Hatamian, Agnieszka Kitkowska
, Jana Korunovska, Sabrina Kirrane:
"It's Shocking!": Analysing the Impact and Reactions to the A3: Android Apps Behaviour Analyser. 198-215
Security Analysis and Private Evaluation
- B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar:
FlowConSEAL: Automatic Flow Consistency Analysis of SEAndroid and SELinux Policies. 219-231 - Md Zakir Hossen, Mohammad Mannan:
On Understanding Permission Usage Contextuality in Android Apps. 232-242 - Marc Joye, Fariborz Salehi:
Private yet Efficient Decision Tree Evaluation. 243-259
Fixing Vulnerabilities
- Cédric Van Rompay, Melek Önen
:
Breaking and Fixing the Security Proof of Garbled Bloom Filters. 263-277 - Sebastian Neuner, Artemios G. Voyiatzis, Spiros Fotopoulos, Collin Mulliner, Edgar R. Weippl:
USBlock: Blocking USB-Based Keypress Injection Attacks. 278-295
Networked Systems
- Jia Xu
, Jianying Zhou
:
Virtually Isolated Network: A Hybrid Network to Achieve High Level Security. 299-311 - Amine Boukhtouta, Makan Pourzandi, Richard Brunner, Stéphane Dault:
Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology. 312-329 - Chen Cao, Lun-Pin Yuan, Anoop Singhal, Peng Liu, Xiaoyan Sun, Sencun Zhu:
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs. 330-348

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.