Table of Contents
|
Data and Applications Security and Privacy XXXI Giovanni Livraga, Sencun Zhu |
Front Matter |
Access Control
|
Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases Yossif Shalabi, Ehud Gudes |
3-19 |
Resilient Reference Monitor for Distributed Access Control via Moving Target Defense Dieudonné Mulamba, Indrajit Ray |
20-40 |
Preventing Unauthorized Data Flows Emre Uzun, Gennaro Parlato, Vijayalakshmi Atluri, Anna Ferrara, Jaideep Vaidya, Shamik Sural, David Lorenzi |
41-62 |
Object-Tagged RBAC Model for the Hadoop Ecosystem Maanak Gupta, Farhan Patwa, Ravi Sandhu |
63-81 |
Identification of Access Control Policy Sentences from Natural Language Policy Documents Masoud Narouei, Hamed Khanpour, Hassan Takabi |
82-100 |
Fast Distributed Evaluation of Stateful Attribute-Based Access Control Policies Thang Bui, Scott Stoller, Shikhar Sharma |
101-119 |
Privacy
|
Gaussian Mixture Models for Classification and Hypothesis Tests Under Differential Privacy Xiaosu Tong, Bowei Xi, Murat Kantarcioglu, Ali Inan |
123-141 |
Differentially Private K-Skyband Query Answering Through Adaptive Spatial Decomposition Ling Chen, Ting Yu, Rada Chirkova |
142-163 |
Mutually Private Location Proximity Detection with Access Control Michael Solomon, Vaidy Sunderam, Li Xiong, Ming Li |
164-184 |
Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery Jun Zhang, Meiqi He, Siu-Ming Yiu |
185-204 |
Privacy-Preserving Community-Aware Trending Topic Detection in Online Social Media Theodore Georgiou, Amr El Abbadi, Xifeng Yan |
205-224 |
Privacy-Preserving Outlier Detection for Data Streams Jonas Böhler, Daniel Bernau, Florian Kerschbaum |
225-238 |
Undoing of Privacy Policies on Facebook Vishwas Patil, R. Shyamasundar |
239-255 |
Cloud Security
|
Towards Actionable Mission Impact Assessment in the Context of Cloud Computing Xiaoyan Sun, Anoop Singhal, Peng Liu |
259-274 |
Reducing Security Risks of Clouds Through Virtual Machine Placement Jin Han, Wanyu Zang, Songqing Chen, Meng Yu |
275-292 |
Firewall Policies Provisioning Through SDN in the Cloud Nora Cuppens, Salaheddine Zerkane, Yanhuang Li, David Espes, Philippe Parc, Frédéric Cuppens |
293-310 |
Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations Bo Zhang, Boxiang Dong, Wendy Wang |
311-324 |
Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases Florian Kerschbaum, Martin Härterich |
325-336 |
Efficient Protocols for Private Database Queries Tushar Saha, . Mayank, Takeshi Koshiba |
337-348 |
Toward Group-Based User-Attribute Policies in Azure-Like Access Control Systems Anna Ferrara, Anna Squicciarini, Cong Liao, Truc Nguyen |
349-361 |
Secure Storage in the Cloud
|
High-Speed High-Security Public Key Encryption with Keyword Search Rouzbeh Behnia, Attila Yavuz, Muslum Ozmen |
365-385 |
HardIDX: Practical and Secure Index with SGX Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi, Benny Fuhry, Raad Bahmani |
386-408 |
A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction Sebastian Messmer, Jochen Rill, Dirk Achenbach, Jörn Müller-Quade |
409-429 |
Secure Systems
|
Keylogger Detection Using a Decoy Keyboard Seth Simms, Margot Maxwell, Sara Johnson, Julian Rrushi |
433-452 |
The Fallout of Key Compromise in a Proxy-Mediated Key Agreement Protocol David Nuñez, Isaac Agudo, Javier Lopez |
453-472 |
Improving Resilience of Behaviometric Based Continuous Authentication with Multiple Accelerometers Tim Hamme, Davy Preuveneers, Wouter Joosen |
473-485 |
Security in Networks and Web
|
A Content-Aware Trust Index for Online Review Spam Detection Hao Xue, Fengjun Li |
489-508 |
Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal |
509-528 |
A Distributed Mechanism to Protect Against DDoS Attacks Negar Mosharraf, Anura Jayasumana, Indrakshi Ray |
529-540 |
Securing Web Applications with Predicate Access Control Zhaomo Yang, Kirill Levchenko |
541-554 |