Data and Applications Security and Privacy XXXIV Anoop Singhal, Jaideep Vaidya |
Front Matter |
Network and Cyber-Physical Systems Security
|
Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV) Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia |
3-23 |
Managing Secure Inter-slice Communication in 5G Network Slice Chains Luis Suarez, David Espes, Frédéric Cuppens, Cao-Thanh Phan, Philippe Bertin, Philippe Le Parc |
24-41 |
Proactively Extracting IoT Device Capabilities: An Application to Smart Homes Andy Dolan, Indrakshi Ray, Suryadipta Majumdar |
42-63 |
Security Enumerations for Cyber-Physical Systems Daniel Schlette, Florian Menges, Thomas Baumer, Günther Pernul |
64-76 |
Information Flow and Access Control
|
Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered Joachim Biskup |
79-99 |
Network Functions Virtualization Access Control as a Service Manel Smine, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens |
100-117 |
Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems Marian Zaki, Adam Lee, Panos Chrysanthis |
118-136 |
Information Flow Security Certification for SPARK Programs Sandip Ghosal, R. Shyamasundar |
137-150 |
Privacy-Preserving Computation
|
Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids Marius Stübs, Tobias Mueller, Kai Bavendiek, Manuel Loesch, Sibylle Schupp, Hannes Federrath |
153-173 |
Non-interactive Private Decision Tree Evaluation Anselme Tueno, Yordan Boev, Florian Kerschbaum |
174-194 |
Privacy-Preserving Anomaly Detection Using Synthetic Data Rudolf Mayer, Markus Hittmeir, Andreas Ekelhart |
195-207 |
Local Differentially Private Matrix Factorization with MoG for Recommendations Jeyamohan Neera, Xiaomin Chen, Nauman Aslam, Zhan Shu |
208-220 |
Visualization and Analytics for Security
|
Designing a Decision-Support Visualization for Live Digital Forensic Investigations Fabian Böhm, Ludwig Englbrecht, Günther Pernul |
223-240 |
Predictive Analytics to Prevent Voice over IP International Revenue Sharing Fraud Yoram Meijaard, Bram Cappers, Josh Mengerink, Nicola Zannone |
241-260 |
PUA Detection Based on Bundle Installer Characteristics Amir Lukach, Ehud Gudes, Asaf Shabtai |
261-273 |
ML-Supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool Andreas Schaad, Dominik Binder |
274-285 |
Spatial Systems and Crowdsourcing Security
|
Enhancing the Performance of Spatial Queries on Encrypted Data Through Graph Embedding Sina Shaham, Gabriel Ghinita, Cyrus Shahabi |
289-309 |
Crowdsourcing Under Data Poisoning Attacks: A Comparative Study Farnaz Tahmasebian, Li Xiong, Mani Sotoodeh, Vaidy Sunderam |
310-332 |
Self-enhancing GPS-Based Authentication Using Corresponding Address Tran Thao, Mhd Irvan, Ryosuke Kobayashi, Rie Yamaguchi, Toshiyuki Nakata |
333-344 |
Secure Outsourcing and Privacy
|
GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation Radu Ciucanu, Pascal Lafourcade |
346-366 |
SGX-IR: Secure Information Retrieval with Trusted Processors Fahad Shaon, Murat Kantarcioglu |
367-387 |
Readability of Privacy Policies Barbara Krumay, Jennifer Klar |
388-399 |