Table of Contents
|
Data and Applications Security and Privacy XXXVIII Anna Lisa Ferrara, Ram Krishnan |
Front Matter |
Access Control
|
A Graph-Based Framework for ABAC Policy Enforcement and Analysis Mian Yang, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya |
3-23 |
Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-materialisation Giorgia Sirigu, Barbara Carminati, Elena Ferrari |
24-43 |
IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence Alexander Puchta, Thomas Baumer, Mathis Müller, Günther Pernul |
44-52 |
Crypto Application
|
SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security Tieming Geng, Chin-Tser Huang |
55-70 |
Ensuring End-to-End IoT Data Security and Privacy Through Cloud-Enhanced Confidential Computing Md Shihabul Islam, Mahmoud Zamani, Kevin W. Hamlen, Latifur Khan, Murat Kantarcioglu |
71-91 |
Towards Atomicity and Composability in Cross-Chain NFTs Yong Zhi Lim, Wen Perry, Jianying Zhou |
92-100 |
A privacy-preserving graph encryption scheme based on oblivious RAM Seyni Kane, Anis Bkakria |
101-108 |
Privacy
|
DT-Anon: Decision Tree Target-Driven Anonymization Sabrina de Capitani Di Vimercati, Sara Foresti, Valerio Ghirimoldi, Pierangela Samarati |
111-130 |
Visor: Privacy-Preserving Reputation for Decentralized Marketplaces Tassos Dimitriou |
131-150 |
Attack
|
Resiliency Analysis of Mission-Critical System of Systems Using Formal Methods Mahmoud Abdelgawad, Indrakshi Ray |
153-170 |
Enhancing EV Charging Station Security Using a Multi-dimensional Dataset: CICEVSE2024 Emmanuel Dana Buedi, Ali A. Ghorbani, Sajjad Dadkhah, Raphael Lionel Ferreira |
171-190 |
Optimal Automated Generation of Playbooks Kéren A Saint-Hilaire, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens, Makhlouf Hadji |
191-199 |
ML Attack, Vulnerability
|
ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning Fariha Ishrat Rahman, Sadaf Md Halim, Anoop Singhal, Latifur Khan |
203-220 |
VulPrompt: Prompt-Based Vulnerability Detection Using Few-Shot Graph Learning Saquib Irtiza, Xiaodi Li, Mahmoud Zamani, Latifur Khan, Kevin W. Hamlen |
221-240 |
All Your LLMs Belong to Us: Experiments with a New Extortion Phishing Dataset Fatima Zahra Qachfar, Rakesh M. Verma |
241-258 |
Adaptive Image Adversarial Example Detection Based on Class Activation Mapping Xiujuan Wang, Qipeng Li, Shuaibing Lu |
259-266 |
Security User Studies
|
From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics Sabrina Friedl, Tobias Reittinger, Günther Pernul |
269-289 |
User Perceptions of CAPTCHAs: University vs. Internet Users Arun Reddy, Yuan Cheng |
290-297 |
Differential Privacy
|
Incentivized Federated Learning with Local Differential Privacy Using Permissioned Blockchains Saptarshi De Chaudhury, Likhith Reddy, Matta Varun, Tirthankar Sengupta, Sandip Chakraborty, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri |
301-319 |
Does Differential Privacy Prevent Backdoor Attacks in Practice? Fereshteh Razmi, Jian Lou, Li Xiong |
320-340 |