Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Data and Applications Security and Privacy XXXVIII
Anna Lisa Ferrara, Ram Krishnan
Front Matter

Access Control


A Graph-Based Framework for ABAC Policy Enforcement and Analysis
Mian Yang, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya
3-23
Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-materialisation
Giorgia Sirigu, Barbara Carminati, Elena Ferrari
24-43
IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence
Alexander Puchta, Thomas Baumer, Mathis Müller, Günther Pernul
44-52

Crypto Application


SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security
Tieming Geng, Chin-Tser Huang
55-70
Ensuring End-to-End IoT Data Security and Privacy Through Cloud-Enhanced Confidential Computing
Md Shihabul Islam, Mahmoud Zamani, Kevin W. Hamlen, Latifur Khan, Murat Kantarcioglu
71-91
Towards Atomicity and Composability in Cross-Chain NFTs
Yong Zhi Lim, Wen Perry, Jianying Zhou
92-100
A privacy-preserving graph encryption scheme based on oblivious RAM
Seyni Kane, Anis Bkakria
101-108

Privacy


DT-Anon: Decision Tree Target-Driven Anonymization
Sabrina de Capitani Di Vimercati, Sara Foresti, Valerio Ghirimoldi, Pierangela Samarati
111-130
Visor: Privacy-Preserving Reputation for Decentralized Marketplaces
Tassos Dimitriou
131-150

Attack


Resiliency Analysis of Mission-Critical System of Systems Using Formal Methods
Mahmoud Abdelgawad, Indrakshi Ray
153-170
Enhancing EV Charging Station Security Using a Multi-dimensional Dataset: CICEVSE2024
Emmanuel Dana Buedi, Ali A. Ghorbani, Sajjad Dadkhah, Raphael Lionel Ferreira
171-190
Optimal Automated Generation of Playbooks
Kéren A Saint-Hilaire, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens, Makhlouf Hadji
191-199

ML Attack, Vulnerability


ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning
Fariha Ishrat Rahman, Sadaf Md Halim, Anoop Singhal, Latifur Khan
203-220
VulPrompt: Prompt-Based Vulnerability Detection Using Few-Shot Graph Learning
Saquib Irtiza, Xiaodi Li, Mahmoud Zamani, Latifur Khan, Kevin W. Hamlen
221-240
All Your LLMs Belong to Us: Experiments with a New Extortion Phishing Dataset
Fatima Zahra Qachfar, Rakesh M. Verma
241-258
Adaptive Image Adversarial Example Detection Based on Class Activation Mapping
Xiujuan Wang, Qipeng Li, Shuaibing Lu
259-266

Security User Studies


From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics
Sabrina Friedl, Tobias Reittinger, Günther Pernul
269-289
User Perceptions of CAPTCHAs: University vs. Internet Users
Arun Reddy, Yuan Cheng
290-297

Differential Privacy


Incentivized Federated Learning with Local Differential Privacy Using Permissioned Blockchains
Saptarshi De Chaudhury, Likhith Reddy, Matta Varun, Tirthankar Sengupta, Sandip Chakraborty, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri
301-319
Does Differential Privacy Prevent Backdoor Attacks in Practice?
Fereshteh Razmi, Jian Lou, Li Xiong
320-340

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/